{"id":506,"date":"2019-03-12T12:00:22","date_gmt":"2019-03-12T17:00:22","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=506"},"modified":"2020-02-25T09:31:40","modified_gmt":"2020-02-25T15:31:40","slug":"ccna-cyberops-scfnd-objective-3-0","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/","title":{"rendered":"CCNA CyberOps SECFND Objective 3.0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">3.1 Describe the uses of a hash algorithm<\/h2>\n\n\n\n<p>Hash algorithms are a one way function that produces a unique mapping from a piece of a data to a string. This string can then be used to verify that the data has not been altered. Security software also uses hashes to compare a file to a list of known good or bad files.<\/p>\n\n\n\n<p>Hashed Message Authentication Code (HMAC) uses hashing with a secret key to allow for a message to be validated. This is then used for digital signature.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.2 Describe the uses of encryption algorithms<\/h2>\n\n\n\n<p>Encryption algorithms are used to protect the confidentiality of data. It can be used to encrypt a file like in an encrypted zip file. Alternatively encryption can be applied to a stream like in TLS(or SSL) or in an IPSec VPN. Either way the goal is the same to keep the data from being read by someone without the proper key.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.3 Compare and contrast symmetric and asymmetric encryption algorithms<\/h2>\n\n\n\n<p>Symmetric encryption algorithms include DES, 3DES, AES, IDEA and Blowfish. Most data in VPNs are protected with symmetric algorithms because they are faster and use less CPU. The longer the key used with symmetric algorithms, the higher level of encryption is achieved. <\/p>\n\n\n\n<p>Asymmetric encryption is generally associated with public key infrastructure. One key, the private key, is used for encryption and the other public key is used for decryption. Examples are RSA, DH, ElGamal, DSA and ECC.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.4 Describe the processes of digital signature creation and verification<\/h2>\n\n\n\n<p>A digital signature is created by using a public\/private key pair generated by a trusted CA. The public key is used to sign the message and the person on the other end uses their private key to validate the signature. Digital signatures provide non-repudiation for messages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"PKCS\">3.5 Describe the operation of a Private Key Infrastructure (PKI)<\/h2>\n\n\n\n<p>PKI requires there be a certificate authority to sign certificates and validate them. These CAs can be public or private. They can also have a chain of CAs with a root and intermediate CAs. The public keys are presented in the form of a signed certificate that allows things like web browsers to trust and decrypt the traffic signed with the private key. <\/p>\n\n\n\n<p>There are several public key cryptography standards (PKCS):<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>PKCS #1: RSA<\/li><li>PKCS #3: DH<\/li><li>PKCS #7: CA response to PKCS #10<\/li><li>PKCS #10: Certificate request<\/li><li>PKCS #12: Storage for public and private key with a password.<\/li><\/ul>\n\n\n\n<p>Revocation of certificates can be done by a certificate revocation list (CRL), Online Certificate Status Protocol (OCSP) or by AAA.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.6 Describe the security impact of these commonly used hash algorithms<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">MD5<\/h3>\n\n\n\n<p>MD5 hashing should no longer be used for security applications. It is easily defeated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SHA-1<\/h3>\n\n\n\n<p>SHA-1 is better than MD5, but has also been deprecated due to security issues and should not be used.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SHA-256 (SHA-2)<\/h3>\n\n\n\n<p>SHA-256 (SHA-2) is still considered secure and can be used for security applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SHA-3<\/h3>\n\n\n\n<p>SHA-3 has the longest key length and is considered currently to be the most secure hashing algorithm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.7 Describe the security impact of these commonly used encryption algorithms and secure communications protocols<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">DES<\/h3>\n\n\n\n<p>DES is a symmetric encryption algorithm that uses 56-bit keys. It is easily cracked and is no longer used.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3DES<\/h3>\n\n\n\n<p>3DES is a symmetric encryption algorithm that uses 168-bit keys. It is easily cracked and is no longer recommended.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AES<\/h3>\n\n\n\n<p>AES is a symmetric encryption algorithm  that uses 128\/256\/512-bit keys. It is a block cipher.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AES256-CTR<\/h3>\n\n\n\n<p>AES256-CTR is an adaptation of AES for use with streaming data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">RSA<\/h3>\n\n\n\n<p>RSA is an asymmetric encryption algorithm that uses a key pair for encryption and decryption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DSA<\/h3>\n\n\n\n<p>Digital Signature Algorithm is used for digital signatures using a key pair.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SSH<\/h3>\n\n\n\n<p>Secure SHell (SSH) is used to encrypt the stream of data between a client and a server. It is the secure alternative to telnet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SSL\/TLS<\/h3>\n\n\n\n<p>Secure Sockets Layer(SSL) and Transport Layer Security (TLS) are used by HTTPS, FTP\/S and other similar protocols to encrypt traffic using private\/public key pairs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.8 Describe how <g class=\"gr_ gr_54 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-del replaceWithoutSep\" id=\"54\" data-gr-id=\"54\">the success<\/g> or failure of a cryptographic exchange impacts security investigation<\/h2>\n\n\n\n<p>If the key exchanges are secure and successful there is no problem; however, if the key exchange is compromised, the encryption done can also be compromised. Any security investigation that finds issues with PKI or the key exchanges must suspect any data may have been compromised as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.9 Describe these items in regards to SSL\/TLS<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Cipher-suite: The cipher-suite defines what encryption algorithms are used.<\/li><li>X.509 Certificates: Format for digital certificates issued by the CA<\/li><li>Key exchange: process of exchanging the keys needed for encryption<\/li><li>Protocol Version:  SSL versions are all deprecated along with TLS 1.0 and 1.1. 1.2 and soon 1.3 are secure<\/li><li><a href=\"#pkcs\">PKCS<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>3.1 Describe the uses of a hash algorithm Hash algorithms are a one way function that produces a unique mapping from a piece of a data to a string. This string can then be used to verify that the data has not been altered. Security software also uses hashes to compare a file to a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CCNA CyberOps Objective 3.0 - Study Notes #ccnacyberops #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,105,31,24],"tags":[107,90,106,149],"class_list":["post-506","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ccna-cyberops","category-certification","category-cisco","tag-ccna-cyberops","tag-certification","tag-cisco","tag-cisco-certified-cyber-ops-associate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CCNA CyberOps SECFND Objective 3.0 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CCNA CyberOps SECFND Objective 3.0 -\" \/>\n<meta property=\"og:description\" content=\"3.1 Describe the uses of a hash algorithm Hash algorithms are a one way function that produces a unique mapping from a piece of a data to a string. This string can then be used to verify that the data has not been altered. Security software also uses hashes to compare a file to a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-12T17:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-25T15:31:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CCNA CyberOps SECFND Objective 3.0\",\"datePublished\":\"2019-03-12T17:00:22+00:00\",\"dateModified\":\"2020-02-25T15:31:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/\"},\"wordCount\":781,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1\",\"keywords\":[\"CCNA CyberOps\",\"certification\",\"cisco\",\"Cisco Certified Cyber Ops Associate\"],\"articleSection\":[\"Blog\",\"CCNA CyberOps\",\"Certification\",\"cisco\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/\",\"name\":\"CCNA CyberOps SECFND Objective 3.0 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1\",\"datePublished\":\"2019-03-12T17:00:22+00:00\",\"dateModified\":\"2020-02-25T15:31:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/12\\\/ccna-cyberops-scfnd-objective-3-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CCNA CyberOps SECFND Objective 3.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CCNA CyberOps SECFND Objective 3.0 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/","og_locale":"en_US","og_type":"article","og_title":"CCNA CyberOps SECFND Objective 3.0 -","og_description":"3.1 Describe the uses of a hash algorithm Hash algorithms are a one way function that produces a unique mapping from a piece of a data to a string. This string can then be used to verify that the data has not been altered. Security software also uses hashes to compare a file to a [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-03-12T17:00:22+00:00","article_modified_time":"2020-02-25T15:31:40+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CCNA CyberOps SECFND Objective 3.0","datePublished":"2019-03-12T17:00:22+00:00","dateModified":"2020-02-25T15:31:40+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/"},"wordCount":781,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","keywords":["CCNA CyberOps","certification","cisco","Cisco Certified Cyber Ops Associate"],"articleSection":["Blog","CCNA CyberOps","Certification","cisco"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/","name":"CCNA CyberOps SECFND Objective 3.0 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","datePublished":"2019-03-12T17:00:22+00:00","dateModified":"2020-02-25T15:31:40+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/12\/ccna-cyberops-scfnd-objective-3-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CCNA CyberOps SECFND Objective 3.0"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-8a","jetpack-related-posts":[{"id":483,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","url_meta":{"origin":506,"position":0},"title":"CCNA CyberOps SECFND Objective 2.1","author":"Ben Story","date":"March 4, 2019","format":false,"excerpt":"Describe the principles of the defense in depth strategy\u00a0 Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following:\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":745,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/03\/ccna-cyberops-secops-objective-1-4\/","url_meta":{"origin":506,"position":1},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.4","author":"Ben Story","date":"August 3, 2019","format":false,"excerpt":"Define these items as they pertain to the Microsoft Windows file system: FAT32, NTFS, Alternative Data Streams, MACE, EFI, Freespace, Timestamps on a filesystem Implementing Cisco Cybersecurity Operations (210-255) FAT32: A file system that uses a file allocation table (FAT) to store pointers to the files in the file system.\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/black-and-white-blur-chrome-209666.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/black-and-white-blur-chrome-209666.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/black-and-white-blur-chrome-209666.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":890,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/28\/ccna-cyberops-secops-objective-4-10\/","url_meta":{"origin":506,"position":2},"title":"CCNA CyberOps SECOPS &#8211; Objective 4.10","author":"Ben Story","date":"August 28, 2019","format":false,"excerpt":"Compare and contrast deterministic and probabilistic analysis Implementing Cisco Cybersecurity Operations (210-255) Deterministic Analysis Deterministic analysis uses data that is known beforehand. One example is using port-based analysis to establish what application is being used in network communication. Basically, deterministic analysis uses known facts. Probabilistic Analysis Probabilistic analysis looks at\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Skitterphoto from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/dice-gamble-game-33968.jpg?fit=640%2C431&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":755,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/04\/ccna-cyberops-secops-objective-1-7\/","url_meta":{"origin":506,"position":3},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.7","author":"Ben Story","date":"August 4, 2019","format":false,"excerpt":"Compare and contrast two types of image Implementing Cisco Cybersecurity Operations (210-255) Disk Images There are two types of disk images when dealing with forensic evidence. Unaltered images can be compared to the original using a hash like MD5 or SHA256 and will return the same hash as the original.\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Andre Mouton from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/animal-animal-photography-blurred-background-1207875.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/animal-animal-photography-blurred-background-1207875.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/animal-animal-photography-blurred-background-1207875.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":549,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/25\/ccna-cyberops-secfnd-objective-6-6\/","url_meta":{"origin":506,"position":4},"title":"CCNA CyberOps SECFND Objective 6.6","author":"Ben Story","date":"March 25, 2019","format":false,"excerpt":"Describe these evasion methodsImplementing Cisco Cybersecurity Operations (210-255) Encryption and Tunneling: Attackers use encryption and tunneling to obfuscate their attacks. VPN technologies like IPSec can be used to keep IPS\/IDS from seeing the command and control traffic or even the attack traffic.Resource Exhaustion: A denial of service attack against security\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/pexels-photo-225769.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":528,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/16\/ccna-cyberops-secfnd-objective-5-3-5-5\/","url_meta":{"origin":506,"position":5},"title":"CCNA CyberOps SECFND Objective 5.3 &#8211; 5.5","author":"Ben Story","date":"March 16, 2019","format":false,"excerpt":"5.3 Describe these concepts as they relate to security monitoring Access Control List: ACLs are used to filter traffic based on source and\/or destination. Logs created by ACLs can be useful to monitor for certain types of traffic.NAT\/PAT: Network Address Translation and Port Address Translation hide internal addresses behind public\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Microscope","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=506"}],"version-history":[{"count":1,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/506\/revisions"}],"predecessor-version":[{"id":1075,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/506\/revisions\/1075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/507"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}