When you're ready to get serious about preparing for the exam, this book gives you the advantage of complete coverage, real-world application, and extensive learning aids to help you pass with confidence. This eBook does not include the companion practice exam that comes with the print edition. CCNA Security Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.
Expert networking professionals Keith Barker and Scott Morris share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. See the last page of the eBook file for instructions on downloading the videos. Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
The official study guide helps you. Note that the eBook does not provide access to the practice test software that accompanies the print book. Best-selling authors and internationally respected cybersecurity experts Omar Santos and Joseph Muniz share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
The study guide helps you master all the topics on the SECOPS exam, including: Threat analysis Forensics Intrusion analysis NetFlow for cybersecurity Incident response and the incident handling process Incident response teams Compliance frameworks Network and host profiling Data and event analysis Intrusion event categories.
The interactive eBook includes informative text, tables, step-by-step lists, images, video. Gauge your readiness with a pre-assessment exam with questions specifically designed to identify your deficiencies.
Then after you have worked through the course material practice with two complete exam simulations to see if you are ready or where you need to study more.
Finally there is a post assessment to get you ready for exam day. In total there are over practice exam questions. All of the content--the complete textbook, the practice questions, the exercises, and the activities--is focused around the official CCNA Security exam objectives.
It also tests your skills for installing, troubleshooting, and monitoring secure networks to maintain the integrity, confidentiality, and availability of data and devices. Each day in this guide breaks down an exam topic into a manageable bit of information to review using short summaries. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.
Score: 3. Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Long-time Cisco expert and trainer Michael Valentine shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition. CCNA Official Cert Guide, Volume 2 presents you with an organized test preparation routine through the use of proven series elements and techniques.
Compare and contrast the strengths and weak- nesses of the various firewall technologies. You can take the exam at Pearson VUE testing centers. BYOD 2. VPN 3. VPN Concepts 3. Remote Access VPN 3. Stateless Firewalls 5. Objectives and Methods This book uses several key methodologies to help you discover the exam topics for which you need more review, to help you fully understand and remember those details, and to help you prove to yourself that you have retained your knowledge of those topics.
So, this book does not try to help you pass the exams only by memorization, but by truly learning and understanding the topics. They explain the con- cepts for the topics in that chapter. Although the contents of the entire chapter could be on the exam, you should defi- nitely know the information listed in each key topic, so you should review these. This document lists only partial information, allowing you to complete the table or list. This section lists the most important terms from the chapter, asking you to write a short definition and compare your answer to the glossary at the end of the book.
Use these to prepare with a sample exam and to pinpoint topics where you need more study. Chapter 20 includes some preparation tips and sug- gestions for how to approach the exam. The core chapters are organized into parts. It provides coverage of different threat landscape topics and common attacks such as distributed denial-of-service DDoS attacks, social engineering, malware identi- fication tools, data loss, and exfiltration.
It also covers configuration of a router to interoperate with an ACS server and configuration of the ACS server to inter- operate with a router.
The chapter also covers router tools to verify and troubleshoot router-to-ACS server interactions. This chapter covers the fundamentals of mobile device management MDM , its function, and the deployment options. This chapter also covers the concepts, components, and operations of the public key infrastructure PKI and includes an example of putting the pieces of PKI to work.
It provides details on how to secure the control plane of network infrastructure devices. Cisco has added advanced malware protection AMP to the ESA and WSA to enable security adminis- trators to detect and block malware and perform continuous analysis and retrospective alerting.
This chapter covers these technologies and solu- tions in detail. It details mitigation technologies such as spam and antimalware filtering, data loss prevention DLP , blacklisting, e-mail encryption, and web application filtering.
It covers introductory concepts of endpoint threats to advanced malware protection capabilities provided by Cisco security products. This chapter covers the different antivirus and antimalware solutions, personal firewalls and host intrusion prevention systems HIPS , Cisco AMP for endpoints, and hardware and software encryption of endpoint data. You can print this appendix and, as a memory exercise, complete the tables and lists. The goal is to help you memo- rize facts that can be useful on the exams.
You also get an enhanced practice test that contains an addi- tional two full practice tests of unique questions. In addition, all the practice test questions are linked to the PDF eBook, allowing you to get more detailed feedback on each ques- tion instantly.
To take advantage of this offer, you need the coupon code included on the paper in the CD sleeve. Just follow the purchasing instructions that accompany the code to download and start using your Premium Edition today. Cisco has added advanced malware protection AMP to the ESA and WSA to allow security administra- tors to detect and block malware and perform continuous analysis and retrospective alerting.
This chapter covers these technologies and solutions in detail. You will learn mitigation technologies such as spam and antimalware filtering, data loss pre- vention DLP , blacklisting, e-mail encryption, and web application filtering. Table details the major topics discussed in this chap- ter and their corresponding quiz questions. Which of the following features does the Cisco ESA provide? Choose all that apply. Network antivirus capabilities b.
E-mail encryption c. Threat outbreak prevention d. Which of the following Cisco ESA models are designed for mid-sized organizations? Cisco C b. Cisco C c. Cisco C d. What is a spear phishing attack? Unsolicited e-mails sent to an attacker. A denial-of-service DoS attack against an e-mail server. E-mails that are directed to specific individuals or organizations.
An attacker may obtain information about the targeted individual or organization from social media sites and other sources. Spam e-mails sent to numerous victims with the purpose of making money.
Which of the following e-mail authentication mechanisms are supported by the Cisco ESA? Which of the following is the operating system used by the Cisco WSA?
Cisco AsyncOS operating system b. Cisco IOS Software e. Cisco ASA Software 6. Which of the following connectors are supported by the Cisco CWS service? Cisco ASA c. Cisco ISR G2 routers d. Cisco WSA 7. Which of the following features are supported by the Cisco WSA? File reputation b. File sandboxing c.
Layer 4 traffic monitor d. Real-time e-mail scanning e. Third-party DLP integration 8. Multiple context mode b. Explicit proxy mode c. Transparent proxy mode d. Cisco provides cloud-based, hybrid, and on-premises ESA-based solutions that can help protect any dynamic environment. This section introduces these solutions and technologies explaining how users can use threat intelligence to detect, analyze, and protect against both known and emerging threats. E-mail-Based Threats There are several types of e-mail-based threats.
E-mail spam continuous to be a major threat because 18 it can be used to spread malware. These phishing e-mails are directed to specific individuals or organizations. For instance, an attacker may perform a passive reconnaissance on the individual or organization by gathering information from social media sites for example, Twitter, LinkedIn, Facebook and other online resources.
Then the attacker may tailor a more directed and relevant message to the victim increasing the probability of such user being fooled to follow a malicious link, click an attachment containing malware, or simply reply to the e-mail providing sensitive information. There is another phishing-based attack called whaling. These attacks specifically target executives and high-profile users within a given organization. Cisco Cloud E-mail Security Cisco cloud e-mail security provides a cloud-based solution that allows companies to out- source the management of their e-mail security management.
The service provides e-mail security instances in multiple Cisco data centers to enable high availability. Figure illus- trates the Cisco cloud e-mail security solution. In Figure , three organizations a large enterprise, a university, and a small- to medium- size business leverage the Cisco hosted cloud environment. The solution also supports mobile workers. This hybrid solution helps Cisco customers reduce their on-site e-mail security foot- print, outsourcing a portion of their e-mail security to Cisco, while still allowing them to maintain control of confidential information within their physical boundaries.
Many organi- zations need to stay compliant to many regulations that may require them to keep sensitive data physically on their premises. The Cisco hybrid e-mail security solution allows network security administrators to remain compliant and to maintain advanced control with encryp- tion, data loss prevention DLP , and on-site identity-based integration. The Cisco AsyncOS supports numerous features that will help mitigate e-mail-based threats. Cisco partnered with Sophos and McAfee, supporting their antivirus scanning engines.
Cisco ESAs that are only running outbound messages and are not running antispam and antivirus may experience a significant performance decline. The administrator can configure an encryption policy on the Cisco ESA and use a local key server or hosted key service to encrypt the message. The Cisco ESA acts as the e-mail gateway to the organization, handling all e-mail connec- tions, accepting messages, and relaying them to the appropriate systems.
The Cisco ESA can service e-mail connections from the Internet to users inside your network, and from systems inside your network to the Internet. A listener defines an e-mail processing service that is configured on an interface in the Cisco ESA. Listeners apply to e-mail entering the appliance from either the Internet or from internal systems.
Figure illustrates the concept of Cisco ESA listeners. The listener properties must also indicate whether it is a public or a private listener. An administrator can specify which remote hosts can connect to the listener. Log in to the Cisco ESA. The default username is admin, and the default pass- word is ironport. Step 2. Are you sure you wish to continue? Management PrivateNet PublicNet Hostnames such as "example. Partial hostnames such as ".
Usernames such as "postmaster " are allowed. Full email addresses such as "joe example. Separate multiple entries with commas.
0コメント