SEC501 - VLAN Flashcards

(26 cards)

1
Q

What are the two primary methods of performing a VLAN Hopping attack?

A
  1. Switch Spoofing; 2. Double Tagging (Double Encapsulation).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does an attacker initiate a Switch Spoofing attack?

A

By configuring their device to act as a switch and using Dynamic Trunking Protocol (DTP) to negotiate a trunk link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main security risk of leaving a port in ‘Dynamic Desirable’ or ‘Dynamic Auto’ mode?

A

It allows an attacker to negotiate a trunk via DTP and access all VLANs permitted on that trunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which command prevents a switch port from negotiating a trunk link?

A

switchport nonegotiate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which specific 802.1Q feature does a Double Tagging attack exploit?

A

The Native VLAN feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is a Double Tagging attack considered ‘unidirectional’?

A

The attacker can send traffic to a victim in a different VLAN but return traffic cannot traverse back using the same double-tag method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the ‘Outer Tag’ in a Double Tagging attack?

A

It must match the Native VLAN of the trunk link so the first switch strips it and forwards the frame with the ‘Inner Tag’ intact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens when the second switch receives a double-tagged frame after the first switch strips the outer tag?

A

It sees the inner tag and forwards the frame to the target VLAN specified by that tag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two critical steps to mitigate VLAN Hopping?

A
  1. Disable DTP on all ports; 2. Place unused ports into a common, unrouted VLAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you prevent Double Tagging on a trunk link?

A

Change the Native VLAN to an unused ID and force the switch to tag the native VLAN using ‘vlan dot1q tag native’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Disabling DTP is enough to stop a Double Tagging attack.

A

False. Double Tagging exploits native VLAN behavior, not trunk negotiation protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Switch Spoofing attack?

A

An attack where a threat actor acts as a switch and uses DTP to negotiate a trunk link to gain access to all VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Cisco protocol is exploited during a Switch Spoofing attack?

A

Dynamic Trunking Protocol (DTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you prevent Switch Spoofing on an access port?

A

Configure the port manually with ‘switchport mode access’ to disable trunk negotiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the command to stop a port from sending DTP messages?

A

switchport nonegotiate.

17
Q

What is the primary goal of an STP attack?

A

To spoof the Root Bridge, forcing network traffic to flow through the attacker’s device for interception.

18
Q

How does an attacker become the Root Bridge in an STP attack?

A

By sending a superior BPDU with a lower Bridge Priority (e.g., 0) than the current Root Bridge.

19
Q

What happens to a port if BPDU Guard is enabled and it receives a BPDU?

A

The port is immediately placed into the ‘err-disabled’ state and shut down.

20
Q

Where should BPDU Guard be typically applied?

A

On access ports connected to end-user devices (where no switch should ever be connected).

21
Q

What is the purpose of Root Guard?

A

To prevent a port from becoming a Root Port if it receives a superior BPDU, keeping the Root Bridge in a controlled location.

22
Q

What state does a port enter if Root Guard detects a superior BPDU?

A

Root-inconsistent state (effectively blocking traffic until the superior BPDUs stop).

23
Q

True or False: Root Guard should be enabled on all ports of every switch.

A

False. It should only be enabled on designated ports leading to switches you do not control.

24
Q

What does PortFast do for a switch port?

A

It allows an access port to bypass the listening and learning states, moving immediately to the forwarding state.

25
What two symptoms indicate a successful STP loop or attack?
1. High CPU utilization on switches; 2. Frequent MAC address table flapping.
26
Which command enables Root Guard on a specific interface?
spanning-tree guard root.