This chapter is from the book
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
- boot loader page 36
- switch virtual interface (SVI) page 40
- automatic medium-dependent interface crossover (auto-MDIX) page 46
- runt page 51
- giant page 51
- CRC error page 52
- late collision page 52
- Secure Shell (SSH) page 55
- MAC address table overflow attack page 60
- MAC flooding attack page 60
- DHCP starvation attack page 63
- denial-of-service (DoS) attack page 63
- DHCP spoofing attacks page 63
- Cisco Discovery Protocol (CDP) page 64
- brute force password attack page 65
- Telnet DoS attack page 65
- security audit page 67
- penetration testing page 67
- DHCP snooping page 69
- trusted port page 69
- untrusted port page 69
- port security page 71
- static secure MAC address page 71
- dynamic secure MAC address page 72
- sticky secure MAC address page 72
- Network Time Protocol (NTP) page 78