思科认证网络工程师CCNA安全认证考试大纲_第1页
思科认证网络工程师CCNA安全认证考试大纲_第2页
思科认证网络工程师CCNA安全认证考试大纲_第3页
思科认证网络工程师CCNA安全认证考试大纲_第4页
思科认证网络工程师CCNA安全认证考试大纲_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

思科认证网络工程师CCNA平安认证考试大纲CA平安认证可满足那些负责网络平安的IT专业人员的需求。它表示通过认证的专业人士拥有相应的专业技能,可以胜任网络平安专家、网络平安管理员和网络平安支持工程师等职位。该认证所验证的技能包括:在保持数据和设备的完好性、保密性和可用性的条件下安装、故障排除和监控网络设备,以及使用思科在平安架构中所采用的技术进展开发的才能。施行思科网络平安210-260IINS考试时间为90分钟,考生需要完成60-70到考题。210-260IINS考试验证考生是否具备网络平安架构,理解网络平安核心概念,管理平安访问,加密,防火墙,平安入侵防御,网页及邮件内容平安及终端设备平安等知识。通过210-260IINS考试证明考生拥有在思科平安网络架构中施行操作的才能。考生可以通过参加施行思科网络平安(IINS)课程来准备参加考试。1.1Commonsecurityprinciples1.1.aDescribeconfidentiality,integrity,availability(CIA)1.1.bDescribeSIEMtechnology1.1.cIdentifymonsecurityterms1.1.dIdentifymonworksecurityzones1.2Commonsecuritythreats1.2.aIdentifymonworkattacks1.2.bDescribesocialengineering1.2.cIdentifymalware1.2.dClassifythevectorsofdataloss/exfiltration1.3Cryptographyconcepts1.3.aDescribekeyexchange1.3.bDescribehashalgorithm1.3.cCompareandcontrastsymmetricandasymmetricencryption1.3.dDescribedigitalsignatures,certificates,andPKI1.4Describeworktopologies1.4.aCampusareawork(CAN)1.4.bCloud,wideareawork(WAN)1.4.cDatacenter1.4.dSmalloffice/homeoffice(SOHO)1.4.eNetworksecurityforavirtualenvironment2.1Securemanagement2.1.aComparein-bandandout-ofband2.1.bConfiguresecureworkmanagement2.1.cConfigureandverifysecureaessthroughSNMPv3usinganACL2.1.dConfigureandverifysecurityforNTP2.1.eUseSCPforfiletransfer2.2AAAconcepts2.2.aDescribeRADIUSandTACACS+technologies2.2.bConfigureadministrativeaessonaCiscorouterusingTACACS+2.2.cVerifyconnectivityonaCiscoroutertoaTACACS+server2.2.dExplaintheintegrationofActiveDirectorywithAAA2.2.eDescribeauthenticationandauthorizationusingACSandISE2.3802.1Xauthentication2.3.aIdentifythefunctions802.1Xponents2.4BYOD2.4.aDescribetheBYODarchitectureframework2.4.bDescribethefunctionofmobiledevicemanagement(MDM)3.1concepts3.1.aDescribeIPsecprotocolsanddeliverymodes(IKE,ESP,AH,tunnelmode,transportmode)3.1.bDescribehairpinning,splittunneling,always-on,NATtraversal3.2Remoteaess3.2.aImplementbasicclientlessSSLusingASDM3.2.bVerifyclientlessconnection3.2.cImplementbasicAnyConnectSSLusingASDM3.2.dVerifyAnyConnectconnection3.2.eIdentifyendpointpostureassessment3.3Site-to-site3.3.aImplementanIPsecsite-to-sitewithpre-sharedkeyauthenticationonCiscoroutersandASAfirewalls3.3.bVerifyanIPsecsite-to-site4.1SecurityonCiscorouters4.1.aConfiguremultipleprivilegelevels4.1.bConfigureCiscoIOSrole-basedCLIaess4.1.cImplementCiscoIOSresilientconfiguration4.2Securingroutingprotocols4.2.aImplementroutingupdateauthenticationonOSPF4.3Securingthecontrolplane4.3.aExplainthefunctionofcontrolplanepolicing4.4CommonLayer2attacks4.4.aDescribeSTPattacks4.4.bDescribeARPspoofing4.4.cDescribeMACspoofing4.4.dDescribeCAMtable(MACaddresstable)overflows4.4.eDescribeCDP/LLDPreconnaissance4.4.fDescribeVLANhopping4.4.gDescribeDHCPspoofing4.5Mitigationprocedures4.5.aImplementDHCPsnooping4.5.bImplementDynamicARPInspection4.5.cImplementportsecurity4.5.dDescribeBPDUguard,rootguard,loopguard4.5.eVerifymitigationprocedures4.6VLANsecurity4.6.aDescribethesecurityimplicationsofaPVLAN4.6.bDescribethesecurityimplicationsofanativeVLAN5.1Describeoperationalstrengthsandweaknessesofthedifferentfirewalltechnologies5.1.aProxyfirewalls5.1.bApplicationfirewall5.1.cPersonalfirewall5.2Comparestatefulvs.statelessfirewalls5.2.aOperations5.2.bFunctionofthestatetable5.3ImplementNATonCiscoASA9.x5.3.aStatic5.3.bDynamic5.3.cPAT5.3.dPolicyNAT5.3eVerifyNAToperations5.4Implementzone-basedfirewall5.4.aZonetozone5.4.bSelfzone5.5FirewallfeaturesontheCiscoAdaptiveSecurityAppliance(ASA)9.x5.5.aConfigureASAaessmanagement5.5.bConfiguresecurityaesspolicies5.5.cConfigureCiscoASAinterfacesecuritylevels5.5.dConfiguredefaultCiscoModularPolicyFramework(MPF)5.5.eDescribemodesofdeployment(routedfirewall,transparentfirewall)5.5.fDescribemethodsofimplementinghighavailability5.5.gDescribesecuritycontexts5.5.hDescribefirewallservices6.1DescribeIPSdeploymentconsiderations6.1.aNetwork-basedIPSvs.host-basedIPS6.1.bModesofdeployment(inline,promiscuous-SPAN,tap)6.1.cPlacement(positioningoftheIPSwithinthework)6.1.dFalsepositives,falsenegatives,truepositives,truenegatives6.2DescribeIPStechnologies6.2.aRules/signatures6.2.bDetection/signatureengines6.2.cTriggeractions/responses(drop,reset,block,alert,monitor/log,shun)6.2.dBlacklist(staticanddynamic)7.1Describemitigationtechnologyforemail-basedthreats7.1.aSPAMfiltering,anti-malwarefiltering,DLP,blacklisting,emailencryption7.2Describemitigationtechnologyforweb-basedthreats7.2.aLocalandcloud-basedwebproxies7.2.bBlacklist

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论