Layer 2 Security Threats Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What are some examples of Layer 2 security threats?

MAC Table Attacks, VLAN Attacks, DHCP Attacks, ARP Attacks, Address Spoofing Attacks, STP Attacks

How can Port Security help prevent attacks?

Prevents MAC address flooding attacks and DHCP starvation attacks

What is the purpose of Dynamic ARP Inspection (DAI)?

Prevents ARP spoofing and ARP poisoning attacks

What is the main vulnerability exploited in MAC address table flooding attacks?

<p>Switch MAC address tables have a fixed size and can run out of resources</p> Signup and view all the answers

What are some recommended strategies for securing management protocols?

<p>Use secure variants of management protocols, consider out-of-band management network, use a dedicated management VLAN, and use ACLs to filter unwanted access</p> Signup and view all the answers

What is the significance of Layer 2 security in a network?

<p>If Layer 2 is compromised, then all the layers above it are also affected.</p> Signup and view all the answers

How can a threat actor's access to Layer 2 frames affect network security?

<p>It would render all the security implemented on the layers above useless.</p> Signup and view all the answers

Why is Layer 2 considered the weakest link in the system?

<p>LANs were traditionally under the administrative control of a single organization.</p> Signup and view all the answers

What security solutions do network administrators use to protect layers 3 through 7?

<p>VPNs, firewalls, and IPS devices</p> Signup and view all the answers

Why is it important for network administrators to routinely implement security solutions?

<p>To protect the elements in Layer 3 up through Layer 7.</p> Signup and view all the answers

MAC address flooding attacks take advantage of this limitation by bombarding the switch with fake source MAC addresses until the switch MAC address table is full. When this occurs, the switch treats the frame as an unknown unicast and begins to flood all incoming ______.

<p>traffic</p> Signup and view all the answers

To make forwarding decisions, a Layer 2 LAN switch builds a table based on the source MAC addresses in received ______. This is called a MAC address table.

<p>frames</p> Signup and view all the answers

These Layer 2 solutions will not be effective if the management protocols are not ______.

<p>secured</p> Signup and view all the answers

Always use secure variants of management protocols such as SSH, Secure Copy Protocol (SCP), Secure FTP (SFTP), and Secure Socket Layer/Transport Layer Security (SSL/TLS). Consider using out-of-band management network to manage devices. Use a dedicated management VLAN where nothing but management ______ resides.

<p>traffic</p> Signup and view all the answers

Use ACLs to filter unwanted ______.

<p>access</p> Signup and view all the answers

Network administrators routinely implement ______ solutions to protect the elements in Layer 3 up through Layer 7. They use VPNs, firewalls, and IPS devices to protect these elements. However, if Layer 2 is compromised, then all the layers above it are also affected. For example, if a threat actor with access to the internal network captured Layer 2 frames, then all the ______ implemented on the layers above would be useless. The threat actor could cause a lot of damage on the Layer 2 LAN networking infrastructure.

<p>security</p> Signup and view all the answers

Security is only as strong as the ______est link in the system, and Layer 2 is considered to be that ______ link. This is because LANs were traditionally under the administrative control of a single organization.

<p>weak</p> Signup and view all the answers

The figure shows the function of each layer and the core ______ that can be exploited. Network administrators routinely implement security solutions to protect the ______ in Layer 3 up through Layer 7. They use VPNs, firewalls, and IPS devices to protect these ______. However, if Layer 2 is compromised, then all the layers above it are also affected. For example, if a threat actor with access to the internal network captured Layer 2 frames, then all the security implemented on the layers above would be useless. The threat actor could cause a lot of damage on the Layer 2 LAN networking infrastructure.

<p>elements</p> Signup and view all the answers

If Layer 2 is compromised, then all the layers above it are also ______. For example, if a threat actor with access to the internal network captured Layer 2 frames, then all the security implemented on the layers above would be useless. The threat actor could cause a lot of damage on the Layer 2 LAN networking infrastructure.

<p>affected</p> Signup and view all the answers

Security is only as strong as the weakest link in the system, and Layer 2 is considered to be that weak link. This is because LANs were traditionally under the ______ control of a single organization.

<p>administrative</p> Signup and view all the answers

Flashcards

Layer 2 Security Threats

Attacks targeting the MAC address table, VLANs, DHCP, ARP, along with address spoofing and STP exploits.

Port Security

It prevents MAC address flooding and DHCP starvation attacks.

Dynamic ARP Inspection (DAI)

Prevents ARP spoofing and ARP poisoning attacks.

MAC Table Attack Vulnerability

Switch MAC address tables have a fixed size and thus limited resources.

Signup and view all the flashcards

Securing Management Protocols

Use secure protocols (SSH, SCP), out-of-band networks, dedicated VLANs, and ACLs.

Signup and view all the flashcards

Significance of Layer 2 Security

Compromising Layer 2 affects all layers above it.

Signup and view all the flashcards

Compromised Layer 2 Frames

Makes all security on higher layers ineffective.

Signup and view all the flashcards

Layer 2 Weakness

Traditionally LANs were under single administrative control.

Signup and view all the flashcards

Layer 3-7 Security Solutions

VPNs, firewalls, and IPS devices.

Signup and view all the flashcards

Routine Security Implementation

Protects elements in Layer 3 up through Layer 7.

Signup and view all the flashcards

MAC Flooding Result

Traffic

Signup and view all the flashcards

Building MAC Address Table

Frames

Signup and view all the flashcards

Layer 2 Security Reliance

Secured

Signup and view all the flashcards

Dedicated Management VLAN

Traffic

Signup and view all the flashcards

ACL Filtering

Access

Signup and view all the flashcards

Network Administrator Protections

Security

Signup and view all the flashcards

Security Chain Strength

Weakest

Signup and view all the flashcards

Exploitable Core

Elements

Signup and view all the flashcards

Layer 2 Compromise Impact

Affected

Signup and view all the flashcards

LAN Control Type

Administrative

Signup and view all the flashcards

Study Notes

  • The OSI reference model consists of seven layers, with Layer 2 being a weak link in network security.
  • LANs were historically under the control of a single organization, making them vulnerable to attacks.
  • Layer 2 security threats include MAC table attacks, VLAN attacks, DHCP attacks, ARP attacks, and address spoofing attacks, among others.
  • MAC table attacks, such as flooding, can make a switch treat frames as unknown unicasts and flood all incoming traffic.
  • Port security, DHCP snooping prevention, dynamic ARP inspection (DAI), and IP source guard (IPSG) are Layer 2 security solutions to prevent various attacks.
  • Management protocols must be secured to ensure effectiveness of Layer 2 security solutions.
  • Recommended strategies for securing management protocols include using secure variants, out-of-band management networks, dedicated management VLANs, and access control lists (ACLs).
  • A MAC address table is a table built by a Layer 2 switch to make forwarding decisions based on source MAC addresses, and it has a fixed size.
  • MAC address flooding attacks take advantage of the fixed size of MAC address tables by bombarding the switch with fake source MAC addresses until the table is full.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Campus LAN Design and Network Security
2 questions
Network Security and Device Management Policy
40 questions
Connecting Networks v6.0 Chapter 5
40 questions
Use Quizgecko on...
Browser
Browser