Bash, the Crucial Exams Chat Bot
AI Bot

Security Devices and Architectures (CCNACBR) Flashcards

Cisco CCNA Cybersecurity 200-201 CCNACBR Flashcards

Study our Security Devices and Architectures (CCNACBR) flashcards for the Cisco CCNA Cybersecurity 200-201 CCNACBR exam with 56+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCNA Cybersecurity 200-201 CCNACBR Course Header Image
FrontBack
802.1X componentsSupplier authenticator and authentication server are required for port based network access control
Active active firewall HABoth firewalls process traffic often requires session synchronization and load balancing
Active passive firewall HAPassive unit stands by while active unit handles traffic and sessions failover on fault
Application layer gateway definitionDevice that understands and translates specific application protocols to apply security controls
Benefits of segmentation for compliance and securityReduces scope of breaches and helps meet regulatory separation requirements
Best firewall placement for defense in depthPerimeter edge internal segmentation points and host level controls for layered protection
Best placement for IDS using a SPAN portUse SPAN on a core or aggregation switch to mirror traffic to the IDS sensor
Best placement for IPS inlinePlace IPS inline at choke points such as internet edge or between trust zones
Best practices for router hardeningDisable unused services use ACLs limit management access and apply patching and strong credentials
Certificate based device authentication benefitProvides strong non repudiable identity and enables secure automated mutual TLS connections
Default deny principleExplicitly deny all then allow only required traffic to minimize exposure
Difference between remote access VPN and site to site VPNRemote access VPNs connect users site to site VPNs connect networks
Difference between stateful firewall and stateless firewallStateful tracks connection state and enforces context while stateless filters each packet independently
False positive versus false negativeFalse positive is benign activity flagged as malicious false negative is malicious activity missed
Firewall deployment mode routed versus transparentRouted mode acts as L3 hop transparent mode bridges at L2 without IP routing
Function of Network Access Control NACEnforces pre admission checks posture assessment and remediation for endpoints
Host based IDS versus network based IDSHost IDS monitors a single host while network IDS monitors traffic on a network segment
How does NAT affect firewall rulesNAT may change packet addresses so rules must match post NAT addresses or use NAT aware policies
How to mitigate ARP spoofing on switchesEnable DHCP snooping DAI and use static IP MAC bindings where possible
IDS versus IPSIDS is passive and alerts IPS is inline and blocks traffic
IPS inline risk factorsInline IPS can introduce latency and may block legitimate traffic causing availability issues
Logging and SIEM integration best practicesCentralize logs normalize and correlate events for detection and compliance
Management plane separation benefitUse out of band management to protect device management from data plane compromise
Microsegmentation technologies comparedVLANs provide coarse separation host firewalls enable granular control and software overlays add flexibility
Mitigating asymmetric NAT with IDS and IPSUse network taps or route return traffic through the same inspection path and enable NAT aware sensors
Order of ACL evaluation on many devicesACLs are processed top down with first match applied and implicit deny at end
Out of band management purposeSeparate management network limits exposure of device control plane to the production network
Packet filtering firewall versus application firewallPacket filter inspects headers while application firewall inspects application layer data and protocol semantics
Port mirroring limitations on high throughputSPAN can drop packets and lacks precise timing compared to hardware TAPs
Primary features of a Next Generation FirewallApplication awareness SSL inspection intrusion prevention and user identification
Proxy firewall behaviourActs as an intermediary terminates client connections and inspects application layer data
Purpose of a DMZIsolate public facing services from internal networks to reduce exposure of internal hosts
Purpose of a VPN concentratorTerminate many VPN tunnels centrally and manage encryption and authentication for remote sites
Purpose of port security on switchesRestrict MAC addresses per port to prevent unauthorized devices from connecting
Rate limiting and traffic shaping use casesProtect critical links mitigate floods and ensure fair bandwidth distribution
Role of access control lists ACLs on routersEnforce traffic filtering at network edges or interfaces for simple stateless control
Role of state table in stateful inspectionTracks TCP UDP and ICMP sessions to allow return traffic without extra rules
Screened subnet architectureUses a DMZ with bastion host and external and internal firewalls for layered protection
Segmenting IoT best practicesPlace IoT on separate VLANs apply strict ACLs and limit internet access to necessary services
Signature based detection versus anomaly detectionSignature uses known patterns anomaly looks for deviations from baseline
TLS interception purpose and riskInspect encrypted traffic to detect threats but introduces privacy legal and certificate management risks
Use of AAA for device accessAuthentication authorization and accounting centralize control and auditing of administrative access
Use of choke point for network securityCentralize inspection at a small number of enforced points to simplify monitoring and control
Use of TAP versus SPAN for monitoringTAP provides full duplex copy with no packet loss SPAN may drop packets under load
VLAN segmentation benefitLimits broadcast domains reduces attack surface and enables policy based separation
WAF role versus traditional firewallWAF protects web applications from layer7 attacks like SQL injection and XSS
What is a bastion hostA hardened server placed in a DMZ to provide external services with minimal attack surface
What is DHCP snoopingSwitch feature that builds a binding table and prevents rogue DHCP servers
What is Dynamic ARP InspectionValidates ARP packets against DHCP snooping table to prevent ARP spoofing
What is microsegmentationFine grained segmentation often enforced by host based controls to limit lateral movement
Why avoid asymmetric routing with inline devicesAsymmetric paths can prevent devices from seeing full flow breaking stateful inspection
Why disable TELNET and use SSHSSH provides encrypted management preventing credential exposure over the network
Why enable BPDU guard on edge portsProtect against rogue switches and topology changes by disabling ports that receive bridge protocol data units
Why synchronize sessions across firewall HAPreserves active connections during failover for seamless user experience
Why use a hardened bastion host in DMZMinimize installed services and lock down configuration to reduce attack surface on internet facing services
Zero trust principle in architecturesAssume no implicit trust verify every access and enforce least privilege across network and workloads

About the Flashcards

Flashcards for the Cisco CCNA Cybersecurity exam help you quickly review core network security terminology and concepts. Cards cover firewall types and deployment (stateful vs stateless, packet filters, application firewalls, NGFW features), IDS versus IPS behavior and placement, and inspection strategies including TAP versus SPAN and TLS interception tradeoffs.

Additional cards cover segmentation and hardening: DMZs and bastion hosts, VLANs and microsegmentation, and layer 2 protections such as DHCP snooping, Dynamic ARP Inspection, BPDU guard, and port security. Operational topics include ACL processing, NAT impacts, firewall HA and session synchronization, AAA and out of band management, VPN types, logging/SIEM, and zero trust principles.

Topics covered in this flashcard deck:

  • Firewall types and modes
  • IDS and IPS placement
  • VLANs and microsegmentation
  • Layer 2 security controls
  • Access control lists (ACLs)
  • VPNs, NAT, TLS risks
Share on...
Follow us on...