CCNA 200-301 Official Cert Guide, Volume 2-38

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

With the introduction of the new CCNA certification in early 2020, Cisco expanded the

number of security topics in comparison to the old CCNA Routing and Switching certifica-
tion. Part II includes the majority of the new security topics added to the new CCNA 200-
301 certification as well as a few of the classic topics found in previous CCNA R&S exams.

Chapter 4 kicks off Part II with a wide description of security threats, vulnerabilities, and
exploits. This introductory chapter sets the stage to help you think more like a security
engineer.

Chapters 5, 6, and 8 then focus on a wide range of short security topics. Those topics
include Chapter 5’s discussion of how to protect router and switch logins and passwords,
along with an introduction to the functions and roles of firewalls or intrusion protection
systems (IPSs). Chapters 6 and 8 then get into three separate security features built into
Cisco switches: port security (Chapter 6), DHCP Snooping (Chapter 8), and Dynamic ARP
Inspection (DAI). All three security features require a switch to examine frames as they
enter the switch interface. This information enables port security, DHCP Snooping, and DAI
to decide whether to allow the message to continue on its way.

Chapter 7 discusses the Dynamic Host Configuration Protocol (DHCP) as an end to itself.
While this topic is actually an IP Service and would be a great fit for Part III (IP Services),
the topics in Chapter 8 require that you know DHCP, so Chapter 7 sets that stage.
Part II
Security Services

Chapter 4: Security Architectures

Chapter 5: Securing Network Devices

Chapter 6: Implementing Switch Port Security

Chapter 7: Implementing DHCP

Chapter 8: DHCP Snooping and ARP Inspection

Part II Review
CHAPTER 4

Security Architectures
This chapter covers the following exam topics:
5.0 Security Fundamentals
5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
5.2 Describe security program elements (user awareness, training, and physical access
control)
5.4 Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
5.8 Differentiate authentication, authorization, and accounting concepts

As you have learned about various networking technologies, your attention has probably
been focused on using network devices to build functional networks. After all, networks
should let data flow freely so that all connected users have a good experience, right? The
unfortunate fact is that not all connected users can be trusted to obey the rules and be good
network citizens. In this chapter, you will learn about many aspects of an enterprise network
that can be exploited, as well as some ways you can protect them.

“Do I Know This Already?” Quiz


Take the quiz (either here or use the PTP software) if you want to use the score to help you
decide how much time to spend on this chapter. The letter answers are listed at the bottom
of the page following the quiz. Appendix C, found both at the end of the book as well as
on the companion website, includes both the answers and explanations. You can also find
both answers and explanations in the PTP testing software.

Table 4-1 “Do I Know This Already?” Section-to-Question Mapping


Foundation Topics Section Questions
Security Terminology 1–2
Common Security Threats 3–7
Controlling and Monitoring User Access 8
Developing a Security Program to Educate Users 9

1. Which one of the following terms means anything that can be considered to be a
weakness that can compromise security?
a. Exploit
b. Vulnerability
c. Attack
d. Threat

You might also like