Cisco Security Literacy (Beginner Level)

  • 30m
  • 20 questions
The Cisco Security Fundamentals benchmark will measure your ability to recognize key terms and concepts related to key Cisco security concepts. You will be evaluated on common security concepts, AAA security, VPNs, ACLs, port security, and DHCP snooping. A learner who scores high on this benchmark demonstrates that they have the skills related to fundamental Cisco security concepts.

Topics covered

  • configure DHCP snooping and Dynamic ARP Inspection and describe why both are used and configured on switches
  • configure port security to learn the MAC address of attached devices and describe the steps and options necessary to configure and verify this dynamic port security
  • describe AAA security, differentiate between authentication, authorization, and accounting, and configure a router to use a RADIUS server and verify that it is working
  • describe extended ACLs and configure source and destination addresses, protocols and even ports
  • describe named ACLs and their advantages over and differences from numbered ACLs, and configure and verify named ACLs
  • describe security concepts a CCNA professional should be aware of
  • describe security program basics, including end user security components, user awareness, training, and physical access controls
  • describe the use of ACLs on Cisco devices and configure and verify standard ACLs
  • describe VPN types, when to use remote access VPNs and site-to-site VPNs, and the elements involved
  • describe why port security is important and the steps and options necessary to configure and verify port security set with a static MAC address
  • establish and manage a security password policy and describe complexity requirements and alternatives
  • identify common security terms relating to unauthorized access
  • Identify principles of the CIA Triad in a given scenario
  • recognize key security concepts and terminology
  • recognize security terms and concepts used in threat detection and remediation
  • recognize security zones and trust levels
  • recognize the characteristics of security terms and concepts
  • recognize the purposes of security policies in an enterprise environment
  • specify common security zones in a networking environment
  • specify the primary objectives of SIEM technology