Professional Documents
Culture Documents
Apendix C Secfnd
Apendix C Secfnd
Table 1-3 Message Unit Naming at Each Layer of the TCP/IP Model
TCP/IP Layer Protocols
Link Frame
Internet Packet
Transport Segment
Application Application data
Table 1-4 Protocols and Devices Mapping to the OSI Layer Model and the TCP/IP
Model
OSI Layer Model TCP/IP Model Protocols Devices
Application Application FTP, HTTP, SMTP Host, servers
Presentation
Session
Transport Transport TCP, UDP Stateful firewalls
Network IP IP Router
Data Link Link Ethernet, PPP, ATM Switches
Physical Ethernet (physical Repeater
layer), cable, optical
4 CCNA Cyber Ops SECFND 210-250 Official Cert Guide
1 Mbps 20000000
10 Mbps 2000000
1 Gbps 20000
10 Gbps 2000
Service Description
Reliability Data lost due to error or from the underlying
datagram can be recovered by asking the
remote device to send the information again.
Flow control TCP uses a windowing system to adjust the
speed of transmission.
Chapter 2
Table 2-1 RFC 1918 Private Address Ranges
Class IP Address Range Networks Number of Hosts
Class A 10.0.0.0 to 1 16,777,214
10.255.255.255
C
Class B 172.16.0.0 to 16 65,534
172.31.255.255
Class C 192.168.0.0 to 256 254
192.168.255.255
Chapter 4
Table 4-2 Authentication Methods
Authentication Method Description Examples
Authentication by knowledge Something the user knows Password, PIN
Authentication by ownership Something the user owns Smart card, badge, token
Authentication by Something the user is or does Fingerprint, hand geometry,
characteristic keystroke dynamic
NIDS/NIPS HIDS/HIPS
Do not have visibility into whether an attack Can verify whether an attack has been
was successful. successful on a host.
Do not have visibility into encrypted packets. Have visibility after encryption and can block
an attack delivered via encrypted packets.
Can block an attack at the entry point. The attacker is able to reach the target before
being blocked.
Chapter 5
Table 5-2 Summary of Password-Generation Methods
Method Description Pros Cons
User-generated The user generates the Simple to remember. Usually leads to an easily
password password himself. guessable password.
Users may reuse the same
password on multiple
systems.
System- The password is Strong password. Difficult to remember.
generated generated by the
Compliant with Users tend to write
Password system.
security policy. down the password, thus
defeating the purpose.
Appendix C: Memory Tables Answer Key 9
Chapter 7
Table 7-2 IPsec Attributes
Attribute Possible Values
Encryption None, DES, 3DES, AES128, AES192, AES256
Hashing MD5, SHA, null
Identity information Network, protocol, port number
10 CCNA Cyber Ops SECFND 210-250 Official Cert Guide
Chapter 9
Table 9-2 List of Permission Values
Column Value Permissions Represented By
0 None ---
1 Execution-only --x
2 Write -w-
3 Execution and write -wx
4 Read-only r--
5 Read and execution r-x
6 Read and write rw-
7 Read, write, and execution rwx
Appendix C: Memory Tables Answer Key 11
Chapter 11
Table 11-2 Syslog Severity Logging Levels
Level System Description
Emergency 0 System unusable messages
Alert 1 Immediate action required
messages
Critical 2 Critical condition messages
Error 3 Error condition messages
Warning 4 Warning condition messages
Notification 5 Normal but significant
messages
Information 6 Informational messages
Debugging 7 Debugging messages