{"id":469,"date":"2019-02-28T10:00:32","date_gmt":"2019-02-28T16:00:32","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=469"},"modified":"2020-02-25T09:32:01","modified_gmt":"2020-02-25T15:32:01","slug":"ccna-cyberops-secfnd-objectives-1-0-1-5","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/","title":{"rendered":"CCNA CyberOps SECFND Objectives 1.0 &#8211; 1.5"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">1.1<\/h2>\n\n\n\n<p>Describe the function of the network layers as specified by the OSI and the TCP\/IP network models.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">OSI Model<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Application: HTTP, SSH, IMAP<\/li><li>Presentation: Encoding<\/li><li>Session: Sockets, Winsock<\/li><li>Transport: UDP\/TCP<\/li><li>Network: Packets, IP, Routers (Layer-3 Switches)<\/li><li>Data-Link: Switches, MAC Address, Frames<\/li><li>Physical: Cabling, Media, Hubs<\/li><\/ul>\n\n\n\n<p>Acrostic to remember in order, All People Seem To Need Data Processing or Please Do Not Throw Sausage Pizza Away<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">TCP\/IP Model<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Application: Maps to top three OSI layers<\/li><li>Transport<\/li><li>Network<\/li><li>Physical: Maps to bottom two OSI layers<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1.2<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Describe the operation of the following:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>IP: Internet Protocol, used to define the addressing of hosts and network<\/li><li>TCP: Connection oriented using a three way handshake to establish communication. Packets must be acknowledged or they are retransmitted.<\/li><li>UDP: Connectionless, no retransmission<\/li><li>ICMP: Internet Control Message Protocol, allows for testing routes and host availability, also can communicate issues along a path<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1.3<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Describe the operation of these network services<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>ARP: Address Resolution Protocol<ul><li>ARP Request Made by a host to broadcast address FF:FF:FF:FF:FF:FF<\/li><li>Either a gateway or the host with the IP responds with the MAC Address<\/li><\/ul><\/li><li>DNS: Domain Name System, allows computers to resolve names like www to an IP address<\/li><li>DHCP: Dynamic Host Configuration Protocol, allows a host to request an IP address along with other parameters like default gateway and DNS server addresses. <ul><li>DHCP Discover: Find a DHCP server by a broadcast packet<\/li><li>DHCP Offer: DHCP server offers an IP<\/li><li>DHCP Request: Client requests offered IP<\/li><li>DHCP Acknowledge: Server acknowledges the IP assignment.<\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1.4<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Describe the basic operation of these network device types<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Router: Operates at Layer 3 of the OSI Model. Each interface is it&#8217;s own broadcast domain. Connects multiple networks.<\/li><li>Switch: Operates at Layer 2 of the OSI Model. Many interfaces, each with its own collision domain.<\/li><li>Hub: Operates at Layer 1 of the OSI Model. Shared medium with a single collision domain.<\/li><li>Bridge: Divides a network into two collision domains, similar to a switch with less ports.<\/li><li>Wireless Access Point (WAP): Device that bridges the wireless media to wired.<\/li><li>Wireless LAN Controller (WLC): Controls WAPs using CAPWAP protocol<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1.5<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Describe the functions of these network security systems as deployed on the host, network, or the cloud:<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Firewall: permits or denies traffic based on L3\/L4 information in the packet, some NG Firewalls function up to L7.<\/li><li>Cisco Intrusion Prevention System (IPS): denies traffic that matches rules that can either be compound or atomic.<\/li><li>Cisco Advanced Malware Protection (AMP): determines if files are malicious<\/li><li>Web Security Appliance (WSA)\/Cisco Cloud Web Security (CWS): Provides web filtering and security scanning<\/li><li>Email Security Appliance (ESA) \/ Cisco Cloud Email Security (CES): protects against e-mail attack vectors and spam<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">NOTE:<\/h4>\n\n\n\n<p>While I&#8217;ve briefly covered many of the topics, if you are less familiar with network basics, I would suggest reviewing the information in the certification guide or in the CCENT curriculum.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.1 Describe the function of the network layers as specified by the OSI and the TCP\/IP network models. OSI Model Application: HTTP, SSH, IMAP Presentation: Encoding Session: Sockets, Winsock Transport: UDP\/TCP Network: Packets, IP, Routers (Layer-3 Switches) Data-Link: Switches, MAC Address, Frames Physical: Cabling, Media, Hubs Acrostic to remember in order, All People Seem To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CCNA CyberOps SECFND - Objectives 1.0 - 1.5 Study Notes #cisco #ccnacyberops #cybersecurity #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,105,31,24],"tags":[107,90,106,149],"class_list":["post-469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ccna-cyberops","category-certification","category-cisco","tag-ccna-cyberops","tag-certification","tag-cisco","tag-cisco-certified-cyber-ops-associate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CCNA CyberOps SECFND Objectives 1.0 - 1.5 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CCNA CyberOps SECFND Objectives 1.0 - 1.5 -\" \/>\n<meta property=\"og:description\" content=\"1.1 Describe the function of the network layers as specified by the OSI and the TCP\/IP network models. OSI Model Application: HTTP, SSH, IMAP Presentation: Encoding Session: Sockets, Winsock Transport: UDP\/TCP Network: Packets, IP, Routers (Layer-3 Switches) Data-Link: Switches, MAC Address, Frames Physical: Cabling, Media, Hubs Acrostic to remember in order, All People Seem To [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-28T16:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-25T15:32:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CCNA CyberOps SECFND Objectives 1.0 &#8211; 1.5\",\"datePublished\":\"2019-02-28T16:00:32+00:00\",\"dateModified\":\"2020-02-25T15:32:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/\"},\"wordCount\":481,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1\",\"keywords\":[\"CCNA CyberOps\",\"certification\",\"cisco\",\"Cisco Certified Cyber Ops Associate\"],\"articleSection\":[\"Blog\",\"CCNA CyberOps\",\"Certification\",\"cisco\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/\",\"name\":\"CCNA CyberOps SECFND Objectives 1.0 - 1.5 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1\",\"datePublished\":\"2019-02-28T16:00:32+00:00\",\"dateModified\":\"2020-02-25T15:32:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/02\\\/28\\\/ccna-cyberops-secfnd-objectives-1-0-1-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CCNA CyberOps SECFND Objectives 1.0 &#8211; 1.5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CCNA CyberOps SECFND Objectives 1.0 - 1.5 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/","og_locale":"en_US","og_type":"article","og_title":"CCNA CyberOps SECFND Objectives 1.0 - 1.5 -","og_description":"1.1 Describe the function of the network layers as specified by the OSI and the TCP\/IP network models. OSI Model Application: HTTP, SSH, IMAP Presentation: Encoding Session: Sockets, Winsock Transport: UDP\/TCP Network: Packets, IP, Routers (Layer-3 Switches) Data-Link: Switches, MAC Address, Frames Physical: Cabling, Media, Hubs Acrostic to remember in order, All People Seem To [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-02-28T16:00:32+00:00","article_modified_time":"2020-02-25T15:32:01+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CCNA CyberOps SECFND Objectives 1.0 &#8211; 1.5","datePublished":"2019-02-28T16:00:32+00:00","dateModified":"2020-02-25T15:32:01+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/"},"wordCount":481,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","keywords":["CCNA CyberOps","certification","cisco","Cisco Certified Cyber Ops Associate"],"articleSection":["Blog","CCNA CyberOps","Certification","cisco"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/","name":"CCNA CyberOps SECFND Objectives 1.0 - 1.5 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","datePublished":"2019-02-28T16:00:32+00:00","dateModified":"2020-02-25T15:32:01+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/ccna-cyberops-secfnd-objectives-1-0-1-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CCNA CyberOps SECFND Objectives 1.0 &#8211; 1.5"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/02\/play-stone-network-networked-interactive-163064.jpeg?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-7z","jetpack-related-posts":[{"id":797,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/08\/ccna-cyberops-secops-objective-2-4\/","url_meta":{"origin":469,"position":0},"title":"CCNA CyberOps SECOPS &#8211; Objective 2.4","author":"Ben Story","date":"August 8, 2019","format":false,"excerpt":"Identify these key elements in an intrusion from a given PCAP file : Source address, Destination address, Source port, Destination port, Protocols, and Payloads Implementing Cisco Cybersecurity Operations (210-255) PCAP files are a way of storing packet data captured using a packet sniffer like Wireshark. The Wireshark website has dozens\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/pcap-3.png?fit=1030%2C422&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/pcap-3.png?fit=1030%2C422&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/pcap-3.png?fit=1030%2C422&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/pcap-3.png?fit=1030%2C422&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":847,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/16\/ccna-cyberops-secops-objective-3-5\/","url_meta":{"origin":469,"position":1},"title":"CCNA CyberOps SECOPS &#8211; Objective 3.5","author":"Ben Story","date":"August 16, 2019","format":false,"excerpt":"Identify these elements used for network profiling: total throughput, session duration, ports used, critical asset address spaceImplementing Cisco Cybersecurity Operations (210-255) Total Throughput: How much data was sent between hosts or networks in a given amount of time.Session duration: How long a TCP session was active.Ports used: What ports did\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/fibre-1515964_1920.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/fibre-1515964_1920.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/fibre-1515964_1920.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/fibre-1515964_1920.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/fibre-1515964_1920.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":483,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","url_meta":{"origin":469,"position":2},"title":"CCNA CyberOps SECFND Objective 2.1","author":"Ben Story","date":"March 4, 2019","format":false,"excerpt":"Describe the principles of the defense in depth strategy\u00a0 Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following:\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":520,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/14\/ccna-cyberops-secfnd-objective-5-1\/","url_meta":{"origin":469,"position":3},"title":"CCNA CyberOps SECFND Objective 5.1","author":"Ben Story","date":"March 14, 2019","format":false,"excerpt":"Identify the types of data provided by these technologies: TCP Dump, NetFlow, Next-Gen firewall, Traditional stateful firewall, Application visibility and control, web content filtering and email content filtering.Understanding Cisco Cybersecurity Fundamentals (210-250) TCP Dump The application tcpdump is a command line packet capture tool. An example of a packet displayed\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":794,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/07\/ccna-cyberops-secops-objective-2-3\/","url_meta":{"origin":469,"position":4},"title":"CCNA CyberOps SECOPS &#8211; Objective 2.3","author":"Ben Story","date":"August 7, 2019","format":false,"excerpt":"Identify the elements from a NetFlow v5 record from a security event Implementing Cisco Cybersecurity Operations (210-255) When it comes to Netflow, the 5-tuple is king. Be sure to know the 5-tuple. Source IP AddressDestination IP AddressSource PortDestination PortProtocol10.1.1.2192.168.1.323343443TCP10.1.3.3192.168.3.24323253UDP192.168.4.5172.16.3.23232125TCP Beyond the 5-tuple, Netflow v9 and IPFIX (Industry Standard) allow for\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":890,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/28\/ccna-cyberops-secops-objective-4-10\/","url_meta":{"origin":469,"position":5},"title":"CCNA CyberOps SECOPS &#8211; Objective 4.10","author":"Ben Story","date":"August 28, 2019","format":false,"excerpt":"Compare and contrast deterministic and probabilistic analysis Implementing Cisco Cybersecurity Operations (210-255) Deterministic Analysis Deterministic analysis uses data that is known beforehand. One example is using port-based analysis to establish what application is being used in network communication. Basically, deterministic analysis uses known facts. Probabilistic Analysis Probabilistic analysis looks at\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Skitterphoto from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=469"}],"version-history":[{"count":1,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/469\/revisions"}],"predecessor-version":[{"id":1088,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/469\/revisions\/1088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/471"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}