Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The following topics are general guidelines for the content likely to be included on the
exam. However, other related topics may also appear on any specific delivery of the
exam. In order to better reflect the contents of the exam and for clarity purposes, the
guidelines below may change at any time without notice.
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 1
1.4.c Hub 2.4
1.4.d Bridge 2.4
1.4.e Wireless access point (WAP) 2.7
1.4.f Wireless LAN Controller (WLC) 2.7
1.7 Describe the relationship between VLANs and data visibility 2.5
1.8 Describe the operation of ACLs applied as packet filters on the interfaces of
network devices 2.12
1.9 Compare and contrast deep packet inspection with packet filtering and
stateful firewall operation 11.6
1.10 Compare and contrast inline traffic interrogation and taps or traffic
mirroring 11.7 - 11.9
1.11 Compare and contrast the characteristics of data obtained from taps or
traffic mirroring and NetFlow in the analysis of network traffic 11.7 - 11.9
1.12 Identify potential data loss from provided traffic profiles 13.6
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 2
2.2.b Threat 5.4
2.2.c Vulnerability 5.5, 5.4
2.2.d Exploit (to use a vulnerability)
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 3
2.7 Describe these concepts:
2.7.a Asset management 5.9
2.7.b Configuration management 5.9
2.7.c Mobile device management 5.9
2.7.d Patch management 5.9
2.7.e Vulnerability management 5.9
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 4
3.7.h SSL/TLS 4.14
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 5
4.3.a Host-based intrusion detection 12.4
4.3.b Antimalware and antivirus 12.3
4.3.c Host-based firewall 12.2
4.3.d Application-level whitelisting/blacklisting 12.5
4.3.e Systems-based sandboxing (such as Chrome, Java, Adobe reader) 12.7
5.5 Describe the function of these protocols in the context of security monitoring:
5.5.a DNS 1.12, 1.17
5.5.b NTP 1.12
5.5.c SMTP/POP/IMAP 6.9
5.5.d HTTP/HTTPS 6.5 - 6.6
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 7
6.3.b Command injections 7.10
6.3.c Cross-site scripting 7.12
6.8 Compare and contrast remote exploit and a local exploit 10.2
2016 Cisco Systems, Inc. This document is Cisco Public. (210-250-SECFND Exam Help2). 8