Home > Articles

  • Print
  • + Share This
This chapter is from the book

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

  • boot loader page 36
  • switch virtual interface (SVI) page 40
  • automatic medium-dependent interface crossover (auto-MDIX) page 46
  • runt page 51
  • giant page 51
  • CRC error page 52
  • late collision page 52
  • Secure Shell (SSH) page 55
  • MAC address table overflow attack page 60
  • MAC flooding attack page 60
  • DHCP starvation attack page 63
  • denial-of-service (DoS) attack page 63
  • DHCP spoofing attacks page 63
  • Cisco Discovery Protocol (CDP) page 64
  • brute force password attack page 65
  • Telnet DoS attack page 65
  • security audit page 67
  • penetration testing page 67
  • DHCP snooping page 69
  • trusted port page 69
  • untrusted port page 69
  • port security page 71
  • static secure MAC address page 71
  • dynamic secure MAC address page 72
  • sticky secure MAC address page 72
  • Network Time Protocol (NTP) page 78
  • + Share This
  • 🔖 Save To Your Account