Cover Page

CCNA®

Security
Study Guide
Exam 210-260

Wiley Logo

Troy McMillan



Wiley Logo









For my best friend, Wade Long, for just being a good friend.

Acknowledgments

Special thanks go to David Clark for keeping me on schedule and ensuring all the details are correct. Also, I’d like to thank Jon Buhagiar for the excellent technical edit that saved me from myself at times. Finally, as always, I’d like to acknowledge Kenyon Brown for his continued support of all my writing efforts.

About the Author

Troy McMillan  writes practice tests, study guides, and online course materials for Kaplan IT Training, while also running his own consulting and training business. He holds more than 30 industry certifications and also appears in training videos for OnCourse Learning and Pearson Press. Troy can be reached at mcmillantroy@hotmail.com.

Introduction

The CCNA Security certification program is one of the elective paths you can take when achieving the CCNA. It requires passing the CCENT exam (100-105) and then passing the CCNA Security exam (210-260).

The Cisco Security exam objectives are periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a technician must be able to work on the latest equipment. The most recent revisions to the objectives—and to the whole program—were introduced in 2016 and are reflected in this book.

This book and the Sybex CCNA Security+ Complete Study Guide (both the Standard and Deluxe editions) are tools to help you prepare for this certification—and for the new areas of focus of a modern server technician’s job.

What Is the CCNA Security Certification?

Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies; the installation, troubleshooting, and monitoring of network devices to maintain integrity, confidentiality, and availability of data and devices; and competency in the technologies that Cisco uses in its security structure.

The CCNA Security certification isn’t awarded until you’ve passed the two tests. For the latest pricing on the exams and updates to the registration procedures, call Pearson VUE at (877) 551-7587. You can also go to Pearson VUE’s website at www.vue.com for additional for information or to register online. If you have further questions about the scope of the exams, see https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-security.html.

What Does This Book Cover?

Here is a glance at what’s in each chapter.

Interactive Online Learning Environment and Test Bank

We’ve put together some really great online tools to help you pass the CCNA Security exam. The interactive online learning environment that accompanies the CCNA Security exam certification guide provides a test bank and study tools to help you prepare for the exam. By using these tools you can dramatically increase your chances of passing the exam on your first try.

The online test bank includes the following:

Sample Tests Many sample tests are provided throughout this book and online, including the Assessment Test, which you’ll find at the end of this introduction, and the Chapter Tests that include the review questions at the end of each chapter. In addition, there are two bonus practice exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards The online text bank includes 100 flashcards specifically written to hit you hard, so don’t get discouraged if you don’t ace your way through them at first! They’re there to ensure that you’re really ready for the exam. And no worries—armed with the review questions, practice exams, and flashcards, you’ll be more than prepared when exam day comes! Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Resources A glossary of key terms from this book and their definitions are available as a fully searchable PDF.

Who Should Read This Book

If you want to acquire a solid foundation in managing security on Cisco devices or your goal is to prepare for the exams by filling in any gaps in your knowledge, this book is for you. You’ll find clear explanations of the concepts you need to grasp and plenty of help to achieve the high level of professional competency you need in order to succeed in your chosen field.

If you want to become certified as a CCNA Security professional, this book is definitely what you need. However, if you just want to attempt to pass the exam without really understanding the basics of personal computers, this guide isn’t for you. It’s written for people who want to acquire skills and knowledge of servers and storage systems.

How to Use This Book

If you want a solid foundation for the serious effort of preparing for the Cisco CCNA Security exam, then look no further. We’ve spent hundreds of hours putting together this book with the sole intention of helping you to pass the exam as well as really learn about the exciting field of network security!

This book is loaded with valuable information, and you will get the most out of your study time if you understand why the book is organized the way it is.

So, to maximize your benefit from this book, I recommend the following study method:

  1. Take the assessment test that’s provided at the end of this introduction. (The answers are at the end of the test.) It’s okay if you don’t know any of the answers; that’s why you bought this book! Carefully read over the explanations for any questions you get wrong and note the chapters in which the material relevant to them is covered. This information should help you plan your study strategy.
  2. Study each chapter carefully, making sure you fully understand the information and the test objectives listed at the beginning of each one. Pay extra-close attention to any chapter that includes material covered in questions you missed.
  3. Complete all hands-on labs in each chapter, referring to the text of the chapter so that you understand the reason for each step you take.
  4. Answer all of the review questions related to each chapter. (The answers appear in Appendix.) Note the questions that confuse you, and study the topics they cover again until the concepts are crystal clear. And again—do not just skim these questions! Make sure you fully comprehend the reason for each correct answer. Remember that these will not be the exact questions you will find on the exam, but they’re written to help you understand the chapter material and ultimately pass the exam!
  5. Try your hand at the practice questions that are exclusive to this book. The questions can be found at http://www.sybex.com/go/ccnasecuritystudyguide.
  6. Test yourself using all the flashcards, which are also found at the download link. These are brand-new and updated flashcards to help you prepare for the CCNA Security exam and a wonderful study tool!

To learn every bit of the material covered in this book, you’ll have to apply yourself regularly, and with discipline. Try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. I’m confident that if you work hard, you’ll be surprised at how quickly you learn this material!

If you follow these steps and really study in addition to using the review questions, the practice exams, and the electronic flashcards, it would actually be hard to fail the CCNA Security exam. But understand that studying for the Cisco exams is a lot like getting in shape—if you do not go to the gym every day, it’s not going to happen!

According to the Cisco website the Cisco CCNA Security exam details are as follows:

Exam code: 210-260

Exam description: This exam tests the candidate’s knowledge of secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security using Cisco routers and the ASA 9x.

Number of questions: 60–70

Type of questions: multiple choice, drag and drop, testlet, simulation

Length of test: 90 minutes

Passing score: 860 (on a scale of 100–900)

Language: English

How Do You Go About Taking the Exam?

When the time comes to schedule your exam you will need to create an account at http://www.pearsonvue.com/cisco/ and register for your exam. Cisco testing is provided by their global testing partner Pearson VUE. You can locate your closest testing center at https://home.pearsonvue.com/. You can schedule at any of the listed testing centers.

To purchase the exam, you will need to buy an exam voucher from Cisco. The voucher is a code they provide you to use to schedule the exam. Information on purchasing a voucher can be found at: http://www.pearsonvue.com/vouchers/pricelist/cisco.asp.

When you have a voucher and have selected a testing center, you can schedule the Cisco 210-260 exam by following this link: http://www.pearsonvue.com/cisco/. This will take you to the Pearson VUE website and from here you can also locate a testing center or purchase vouchers if you have not already done so.

When you have registered for the CCNA Security certification exam you will receive a confirmation e-mail that supplies you with all of the information you will need to take the exam. Remember to take a printout of this e-mail with you to the testing center.

Certification Exam Policies

For the most current information regarding Cisco exam policies, it is recommended that you follow the https://www.cisco.com/c/en/us/training-events/training-certifications/exams/policies.html link to become familiar with Cisco policies. It contains a large amount of useful information regarding:

Tips for Taking Your Exam

The Cisco CCNA Security exam contains 60–90 multiple choice, drag and drop, testlet, and simulation item questions, and must be completed in 90 minutes or less. This information may change over time and it is advised to check www.cisco.com for the latest updates.

Many questions on the exam offer answer choices that at first glance look identical—especially the syntax questions! So remember to read through the choices carefully because close just doesn’t cut it. If you get information in the wrong order or forget one measly character, you may get the question wrong. So, to practice, do the practice exams and hands-on exercises in this book’s chapters over and over again until they feel natural to you; also, and this is very important, do the online sample test until you can consistently answer all the questions correctly. Relax, read the question over and over until you are 100% clear on what it is asking, and then you can usually eliminate a few of the obviously wrong answers.

Here are some general tips for exam success:

  • Arrive early at the exam center so you can relax and review your study materials.
  • Read the questions carefully. Don’t jump to conclusions. Make sure you’re clear about exactly what each question asks. “Read twice, answer once!”
  • Ask for a piece of paper and pencil if it is offered to take down quick notes and make sketches during the exam.
  • When answering multiple-choice questions that you’re not sure about, use the process of elimination to get rid of the obviously incorrect answers first. Doing this greatly improves your odds if you need to make an educated guess.

After you complete an exam, you’ll get immediate notification of your pass or fail status, a printed examination score report that indicates your pass or fail status, and your exam results by section. (The test administrator will give you the printed score report.) Test scores are automatically forwarded to Cisco after you take the test, so you don’t need to send your score to them. If you pass the exam, you’ll receive confirmation from Cisco and a package in the post with a nice document suitable for framing showing that you are now a Cisco certified engineer.

Exam Objectives

Cisco goes to great lengths to ensure that its certification programs accurately reflect the IT industry’s best practices. The company does this by establishing Cornerstone Committees for each of its exam programs. Each committee comprises a small group of IT professionals, training providers, and publishers who are responsible for establishing the exam’s baseline competency level and who determine the appropriate target audience level.

Once these factors are determined, Cisco shares this information with a group of hand-selected subject-matter experts (SMEs). These folks are the true brainpower behind the certification program. They review the committee’s findings, refine them, and shape them into the objectives you see before you. Cisco calls this process a job task analysis (JTA).

Finally, Cisco conducts a survey to ensure that the objectives and weightings truly reflect the job requirements. Only then can the SMEs go to work writing the hundreds of questions needed for the exam. And, in many cases, they have to go back to the drawing board for further refinements before the exam is ready to go live in its final state. So, rest assured, the content you’re about to learn will serve you long after you take the exam.

Cisco also publishes relative weightings for each of the exam’s objectives. The following table lists the objective domains and the extent to which they’re represented on each exam.

210-260 Exam Domains % of Exam
1.0 Security Concepts 12%
2.0 Secure Access4.0 Security 14%
3.0 VPN 17%
4.0 Secure Routing and Switching 18%
5.0 Cisco Firewall Technologies 18%
6.0 IPS 9%
7.0 Content and Endpoint Security 12%
Total 100%
210-260 Sub Domains Chapters
1.2 Common security threats 2
1.3 Cryptography concepts 2
1.4 Describe network topologies 3
2.1 Secure management 8
2.2 AAA concepts 9
2.3 802.1x authentication 9
2.4 BYOD 10
3.1 VPN concepts 11
3.2 Remote access VPN 12
3.3 Site-to-site VPN 12
4.1 Security on Cisco routers 4
4.2 Securing routing protocols 4
4.3 Securing the control plane 4
4.4 Common Layer 2 attacks 5
4.5 Mitigation procedures 6
4.6 VLAN security 7
5.1 Describe operational strengths and weaknesses of the different firewall technologies 13
5.2 Compare stateful vs. stateless firewalls 13
5.3 Implement NAT on Cisco ASA 9.x 14
5.4 Implement zone-based firewall 14
5.5 Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x 15
6.1 Describe IPS deployment considerations 16
6.2 Describe IPS technologies 16
7.1 Describe mitigation technology for email-based threats 17
7.2 Describe mitigation technology for web-based threats 17
7.3 Describe mitigation technology for endpoint threats 17

Assessment Test

  1. When you are concerned with preventing data from unauthorized edits you are concerned with which of the following?

    1. integrity
    2. confidentiality
    3. availability
    4. authorization
  2. When a systems administrator is issued both an administrative-level account and a normal user account and uses the administrative account only when performing an administrative task, it is an example of which concept?

    1. least privilege
    2. split knowledge
    3. dual control
    4. separation of duties
  3. What is the purpose of mandatory vacations?

    1. cross training
    2. fraud prevention
    3. improves morale
    4. employee retention
  4. Which of the following occurs when an organizational asset is exposed to losses?

    1. risk
    2. threat
    3. exposure
    4. vulnerability
  5. Which of the following is a standard used by the security automation community to enumerate software flaws and configuration issues?

    1. CSE
    2. SCAP
    3. CVE
    4. CWE
  6. Which hacker type hacks for a political cause?

    1. black hats
    2. white hats
    3. script kiddies
    4. hacktivists
  7. Which of the following is an email validation system that works by using DNS to determine whether an email sent by someone has been sent by a host sanctioned by that domain’s administrator?

    1. PGP
    2. S/MIME
    3. SMTP
    4. SPF
  8. What does the following command do?

    nmap -sP 192.168.0.0-100

    1. port scan
    2. ping scan
    3. vulnerability scan
    4. penetration test
  9. You just executed a half open scan and got no response. What does that tell you?

    1. the port is open
    2. the port is closed
    3. the port is blocked
    4. it cannot be determined
  10. Which of the following is a mitigation for a buffer overflow?

    1. antivirus software
    2. IOS updates
    3. input validation
    4. encryption
  11. Which of the following is a Layer 2 attack?

    1. buffer overflow
    2. DoS
    3. ARP poisoning
    4. IP spoofing
  12. Which of the following is not intellectual property?

    1. designs
    2. advertisements
    3. recipes
    4. contact lists
  13. What is the best countermeasure to social engineering?

    1. training
    2. access lists
    3. HIDS
    4. encryption
  14. Which of the following is a mitigation for ARP poisoning?

    1. VLANs
    2. DAI
    3. DNSSec
    4. STP
  15. In which cryptographic attack does the attacker use recurring patterns to reverse engineer the message?

    1. side channel
    2. frequency
    3. plaintext only
    4. ciphertext only
  16. You have five users in your department. These five users only need to encrypt information with one another. If you implement a symmetric encryption algorithm, how many keys will be needed to support the department?

    1. 5
    2. 8
    3. 10
    4. 12
  17. Which statement is true with regard to asymmetric encryption?

    1. less expensive than symmetric
    2. slower than symmetric
    3. harder to crack than symmetric
    4. key compromise can occur more easily than with symmetric
  18. Which of the following is a stream-based cipher?

    1. RC4
    2. DES
    3. 3DES
    4. AES
  19. What is the purpose of an IV?

    1. doubles the encryption
    2. adds randomness
    3. performs 16 rounds of transposition
    4. hashes the message
  20. Which step is not required to configure SSH on a router?

    1. Set the router name
    2. Set the router ID
    3. Set the router domain name
    4. Generate the RSA key
  21. Which of the following allows you to assign a technician sets of activities that coincide with the level they have been assigned?

    1. access levels
    2. job parameters
    3. privilege levels
    4. rules
  22. Which of the following is a way to prevent unwanted changes to the configuration?

    1. router lockdown
    2. resilient configuration
    3. secure IOS
    4. config-sec
  23. Which of the following is used to hold multiple keys used in OSPF Routing Update Authentication?

    1. key store
    2. keychain
    3. keydb
    4. keyauth
  24. Which of the following characteristics of a rogue switch could cause it to become the root bridge?

    1. higher MAC address
    2. higher IP address
    3. a superior BPDU
    4. lower router ID
  25. Which of the following is used by a malicious individual to pollute the ARP cache of other machines?

    1. ping of death
    2. buffer overflow
    3. bound violation
    4. gratuitous ARP
  26. What happens when the CAM table of a switch is full of fake MAC addresses and can hold no other MAC addresses?

    1. it gets dumped
    2. the switch shuts down
    3. the switch start forwarding all traffic out of all ports
    4. all ports are shut down
  27. Which switch feature uses the concept of trusted and untrusted ports?

    1. DAI
    2. DHCP snooping
    3. STP
    4. Root Guard
  28. Which command enables port security on the switch?

    1. SW70(config-if)#switchport mode access
    2. SW70(config-if)# switchport port-security maximum 2
    3. SW70(config-if)#switchport port-security
    4. SW70(config-if)# switchport port-security violation shutdown
  29. Which switch feature prevents the introduction of a rogue switch to the topology?

    1. Root Guard
    2. BPDU Guard
    3. Loop Guard
    4. DTP
  30. What prevents switching loops?

    1. DAI
    2. DHCP snooping
    3. STP
    4. Root Guard

Answers to Assessment Test

  1. A. Integrity, the second part of the CIA triad, ensures that data is protected from unauthorized modification or data corruption. The goal of integrity is to preserve the consistency of data, including data stored in files, databases, systems, and networks.

  2. A. The principle of least privilege requires that a user or process is given only the minimum access privilege needed to perform a particular task.

  3. B. With mandatory vacations, all personnel are required to take time off, allowing other personnel to fill their position while gone. This detective administrative control enhances the opportunity to discover unusual activity.

  4. C. An exposure occurs when an organizational asset is exposed to losses.

  5. B. Security Content Automation Protocol (SCAP) is a standard used by the security automation community to enumerate software flaws and configuration issues. It standardized the nomenclature and formats used.

  6. D. Hacktivists are those who hack not for personal gain, but to further a cause. For example, the Anonymous group hacks from time to time for various political reasons.

  7. D. Sender Policy Framework (SPF) is an email validation system that works by using DNS to determine whether an email sent by someone has been sent by a host sanctioned by that domain’s administrator. If it can’t be validated, it is not delivered to the recipient’s box.

  8. B. 0–100 is the range of IP addresses to be scanned in the 192.168.0.0 network.

  9. C. If you receive no response the port is blocked on the firewall.

  10. C. With proper input validation, a buffer overflow attack will cause an access violation. Without proper input validation, the allocated space will be exceeded, and the data at the bottom of the memory stack will be overwritten.

  11. C. One of the ways a man-in-the-middle attack is accomplished is by poisoning the ARP cache on a switch. The attacker accomplishes this poisoning by answering ARP requests for another computer’s IP address with his own MAC address. Once the ARP cache has been successfully poisoned, when ARP resolution occurs, both computers will have the attacker’s MAC address listed as the MAC address that maps to the other computer’s IP address. As a result, both are sending to the attacker, placing him “in the middle.”

  12. B. An advertisement would be publicly available.

  13. A. The best countermeasure against social engineering threats is to provide user security awareness training. This training should be required and must occur on a regular basis because social engineering techniques evolve constantly.

  14. B. Dynamic ARP inspection (DAI) is a security feature that intercepts all ARP requests and responses and compares each response’s MAC address and IP address information against the MAC–IP bindings contained in a trusted binding table.

  15. B. One of the issues with substitution ciphers is that if the message is of sufficient length, patterns in the encryption begin to become noticeable, which makes it vulnerable to a frequency attack. A frequency attack is when the attacker uses these recurring patterns to reverse engineer the message.

  16. C. To calculate the number of keys that would be needed in this example, you would use the following formula:

    # of users × (# of users – 1) / 2

    Using our example, you would calculate 5 ×(4) / 2 or 10 needed keys.

  17. B. Asymmetric encryption is more expensive than symmetric, it is slower than symmetric, it is easier to crack than symmetric, and key compromise can occur less easily than with symmetric.

  18. A. Only RC4 is a stream cipher.

  19. B. Some modes of symmetric key algorithms use initialization vectors (IVs) to ensure that patterns are not produced during encryption. These IVs provide this service by using random values with the algorithms.

  20. B. A router ID is not a part of the configuration.

  21. C. Privilege levels allow you to assign a technician sets of activities that coincide with the level they have been assigned. There are 16 levels from 0 to 15.

  22. B. The IOS Resilient Configuration feature can provide a way to easily recover from an attack on the configuration, and it can also help to recover from an even worse attack in which the attacker deletes not only the startup configuration but also the boot image.

  23. B. A keychain can be used to hold multiple keys if required.

  24. C. When a malicious individual introduces a rogue switch to the switching network and the rogue switch has a superior BPDU to the one held by the current root bridge, the new switch assumes the position of root bridge.

  25. A. Gratuitous ARP is called gratuitous because the ARP message sent is an answer to a question that the target never asks and it cause the target to change its ARP cache.

  26. C. The result of this attack is that the attacker is now able to receive traffic that he would not have been able to see otherwise because in this condition the switch is basically operating as a hub and not a switch.

  27. B. DHCP snooping is implemented on the switches in the network, so it is a Layer 2 solution. The switch ports on the switch are labeled either trusted or untrusted. Trusted ports are those that will allow a DHCP message to traverse.

  28. C. Without executing this command the other commands will have no effect.

  29. B. The BPDU Guard feature is designed to prevent the reception of superior BPDUs on access ports by preventing the reception of any BPDU frames on access ports.

  30. Spanning Tree Protocol (STP), prevents switching loops in redundant switching networks.