Bash, the Crucial Exams Chat Bot
AI Bot

Network Security Fundamentals (CCNACBR) Flashcards

Cisco CCNA Cybersecurity 200-201 CCNACBR Flashcards

Study our Network Security Fundamentals (CCNACBR) flashcards for the Cisco CCNA Cybersecurity 200-201 CCNACBR exam with 50+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCNA Cybersecurity 200-201 CCNACBR Course Header Image
FrontBack
Access port versus trunk port on a switchAccess port carries a single VLAN; trunk port carries multiple VLANs using VLAN tagging
Common port numbers HTTP HTTPS DNS and RDPHTTP 80 HTTPS 443 DNS 53 RDP 3389
Common protocol at the Transport layer beyond TCP and UDPICMP used for diagnostics and error messages
Common secure remote admin protocol and portSSH uses TCP port 22 for secure encrypted administrative sessions
Defense in depth definitionLayered security controls across network endpoints and infrastructure to reduce risk of single point failures
Difference between broadcast and multicastBroadcast goes to all devices in a domain; multicast goes only to subscribed group members
Difference between static and dynamic routingStatic routes are manually configured fixed paths; dynamic routes are learned and adjusted by routing protocols
Difference between static NAT and PATStatic NAT maps one internal IP to one public IP; PAT maps multiple internal IPs to one public IP using port numbers
Difference between TCP and UDPTCP is connection oriented reliable with flow control; UDP is connectionless low overhead and unreliable
Encapsulation order from application to wireApplication then Transport then Network then Data Link then Physical
Given IP 192.168.10.130 with mask 255.255.255.192 what is the network and broadcastNetwork 192.168.10.128 Broadcast 192.168.10.191
How does Dynamic ARP Inspection workValidates ARP packets against DHCP snooping table to drop invalid ARP responses
How many usable hosts in a /24 network254 usable hosts
How many usable hosts in a /26 network62 usable hosts
How OSI layers map to TCP IP modelApplication Presentation Session map to Application; Transport to Transport; Network to Internet; Data Link and Physical to Network Access
How to calculate hosts in a subnet from prefix lengthHosts = 2^(32 minus prefix) minus 2 for network and broadcast
Inter VLAN routing purposeEnables communication between different VLANs using a router or layer 3 switch
Mitigation for MAC floodingEnable port security and set MAC address limits and aging to protect the CAM table
Mitigations against VLAN hoppingDisable unused ports set correct native VLAN and use access ports and trunk pruning
Mitigations for ARP spoofingDHCP snooping and Dynamic ARP Inspection block forged ARP entries and validate DHCP bindings
Native VLAN on a trunkThe VLAN that is untagged on a trunk link typically VLAN 1 by default unless changed
Order and implicit deny in ACL processingACLs are processed top to bottom first match applies and there is an implicit deny at the end
OSI layer responsible for end to end reliabilityTransport layer - manages segmentation flow control and error recovery using TCP or UDP
OSI layer that handles logical addressing and routingNetwork layer - provides IP addressing and routing between networks
OSI layer that hands physical transmission of bitsPhysical layer - defines electrical optical and physical media specifications
OSI model top layer and functionApplication layer - provides services to end user applications such as HTTP DNS and SMTP
Principle of least privilegeGrant users and services only the minimum access required to perform their tasks
Purpose of a DMZDemilitarized Zone isolates public facing services from internal network to reduce attack surface
Purpose of a VLANVirtual LAN segments switch ports to create separate broadcast domains for security and traffic control
Purpose of ARPAddress Resolution Protocol maps IPv4 addresses to MAC addresses on a local network
Purpose of BPDU guard on switchesBPDU guard disables ports that receive Bridge Protocol Data Units to prevent rogue switches and loops
Secure management plane best practiceUse out of band management SSH AAA and management ACLs to restrict admin access
Three way TCP handshake stepsSYN then SYN-ACK then ACK to establish a TCP connection
What defines a broadcast domainAll devices that receive broadcast frames - typically bounded by routers or layer 3 devices
What defines a collision domainA segment where frames can collide - typically a single switch port or hub segment
What is a firewall stateful versus statelessStateful firewalls track connection state and make decisions based on state; stateless firewalls filter each packet independently
What is a MAC addressA hardware 48 bit address used for frame forwarding at the Data Link layer
What is an ACL on routers and basic typesAccess Control List filters traffic by permit or deny rules; standard ACLs filter by source IP only; extended ACLs filter by protocol source and destination
What is ARP spoofing attackAn attacker sends forged ARP replies to associate their MAC with another IP causing man in the middle
What is default gateway roleThe default gateway forwards traffic from a host to destinations outside the local network
What is DHCP snoopingSwitch feature that tracks trusted DHCP servers and prevents rogue DHCP servers on untrusted ports
What is MAC flooding attackAttacker overwhelms switch CAM table causing it to broadcast frames to all ports enabling sniffing
What is NATNetwork Address Translation modifies IP addresses and ports for traffic crossing a boundary to conserve addresses and hide internal IPs
What is NAT overloadNAT overload is PAT where many private hosts share a single public IP via different source ports
What is route summarizationAggregating contiguous routes into a single advertisement to reduce routing table size and improve efficiency
What is STP and why importantSpanning Tree Protocol prevents switching loops by blocking redundant paths until needed
What is SYN flood attack and basic mitigationSYN flood exhausts server resources with half open connections; mitigations include SYN cookies rate limiting and firewalls
What is VLAN hopping attackAn attacker sends double tagged frames or uses a trunk to access VLANs they should not reach
When to use NAT over no NATUse NAT when private addressing must be translated to public addresses for internet access
Why implement port security on switchesTo limit MAC addresses per port and prevent unauthorized devices and MAC flooding attacks

About the Flashcards

Flashcards for the Cisco CCNA Cybersecurity exam strengthen your grasp of essential networking theory and terminology. The deck walks you through the OSI and TCP/IP layers, dives into protocol behavior and port numbers, and clarifies the flow of data from application to physical media-key knowledge areas the exam loves to probe.

You'll also practice calculating subnets, configuring VLANs and trunking, distinguishing static versus dynamic routing, and applying NAT. Security flashcards highlight ACL logic, port security, STP safeguards, DHCP snooping, and defense-in-depth principles, ensuring you can recognize threats and choose the right mitigation. Frequent review sharpens recall and builds the troubleshooting mindset demanded on test day.

Topics covered in this flashcard deck:

  • OSI & TCP/IP models
  • Switching & VLANs
  • Routing & NAT
  • Subnetting calculations
  • Network security controls
  • Protocols & port numbers
Share on...
Follow us on...