CompTIA Security+ (SY0-601): Network Design
This section covers network attack techniques like MAC flooding and MAC spoofing, which exploit switch vulnerabilities and address manipulation. It also explains network segmentation strategies such as DMZs and extranets, designed to isolate public-facing servers and provide controlled partner access while protecting internal networks.
MAC Flooding
Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port
Switches can fail-open when flooded and begin to act like a hub
Key Terms
MAC Flooding
Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port
MAC Spoofing
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device
MAC Spoofi...
DMZ
De-Militarized Zone:
A segment isolated from the rest of a private network by one or more firewalls that accepts conn...
Extranet
Specialized type of DMZ that is created for your partner organizations to access over a wide area network
Bastion Hosts
Hosts or servers in the DMZ which are not configured with any services that run on the local network
Jumpbox
A hardened server that provides access to other hosts within the DMZ
An administrator c...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
MAC Flooding | Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port Switches can fail-open when flooded and begin to act like a hub |
MAC Spoofing | Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device Limit static MAC addresses accepted |
DMZ | De-Militarized Zone: Focused on providing controlled access to publicly available servers that are hosted within your organizational network Sub-zones can be created to provide additional protection for some servers |
Extranet | Specialized type of DMZ that is created for your partner organizations to access over a wide area network Intranets are used when only one company is involved |
Bastion Hosts | Hosts or servers in the DMZ which are not configured with any services that run on the local network To configure devices in the DMZ, a jumpbox is utilized |
Jumpbox | A hardened server that provides access to other hosts within the DMZ An administrator connects to the jumpbox and the jumpbox connects to hosts in the DMZ The jumpbox and management workstation should only have the minimum required software to perform their job and be well hardened |
NAC | Network Access Control: If a device fails the inspection, it is placed into digital quarantine |
NAC: Persistent Agents | A piece of software that is installed on the device requesting access to the network |
NAC: Non-Persistent Agents | Uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan |
VLAN Benefits | Segment the network Reduce collisions Organize the network Boost performance Increase security |
VLANs: Switch Spoofing | Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN |
VLANs: Double Tagging | Attacker adds an additional VLAN tag to create an outer and inner tag Prevent double tagging by moving all ports out of the default VLAN group |
Benefits of Subnetting | Efficient use of IP addresses Subnet’s policies and monitoring can aid in the security of your network |
NAT/PAT | Network Address Translation: Port Address Translation: |
Telephony | Term used to describe devices that provide voice communication to users |
Modem | A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line |
War Dialing | Basically brute-force dialing numbers until you get a modem’s number Protect dial-up resources by using the callback feature |
PBX | Public Branch Exchange: Internal phone system used in large organizations |
Zigbee | IoT networking (IEEE 802.15.4 PAN) |