CIS 26B Module 10

12345678910111213141516171819202122232425262728
Across
  1. 4. spoofing the root bridge and changing the topology of a network
  2. 7. ARP spoofing and ARP poisoning are mitigated by
  3. 8. Remote Authentication Dial-In User Service for network security
  4. 11. ransomware such as WannaCry
  5. 12. Disable auto trunking on trunk links
  6. 13. 802.1x
  7. 16. DHCP server is connected to the network and provides false IP
  8. 19. provides stateful packet inspection, application visibility and control
  9. 20. This is a coordinated attack from many devices, called zombies
  10. 21. Prevents MAC and IP address spoofing
  11. 22. intermediary between the client and the authentication server
  12. 24. DHCP starvation attack tool
  13. 25. can manage access policies across a wide variety of users and device types
  14. 27. This is a device running 802.1X-compliant client software
Down
  1. 1. who is permitted to access a network
  2. 2. hosts are compromised to steal confidential information
  3. 3. primary framework to set up access control on a network device
  4. 5. dsniff, Cain & Abel, ettercap, Yersinia
  5. 6. enables traffic from one VLAN to be seen by another VLAN
  6. 9. attempt to extract a monetary payment from the victim
  7. 10. MAC address flooding tool for network vulnerability testing
  8. 14. what they can do while they are there
  9. 15. what actions they performed while accessing the network
  10. 17. mitigation technology for web-based threats
  11. 18. IP and MAC address spoofing can be mitigated by
  12. 23. device that is designed to monitor Simple Mail Transfer Protocol (SMTP)
  13. 26. used by a threat actor to discover network infrastructure vulnerabilities
  14. 28. Terminal Access Controller Access-Control System for authentication management