1. An architect needs flow-level visibility across a multi-vendor environment including cloud workloads. Which technology is the best fit?
NetFlow v9
sFlow
IPFIX
Full packet capture
2. Cisco Encrypted Traffic Analytics (ETA) detects malware in encrypted flows primarily by analyzing which of the following?
Decrypted packet payloads after inline TLS termination
Metadata such as IDP, SPLT, and JA3 fingerprints without decryption
DNS query patterns correlated with known threat intelligence feeds
Certificate transparency logs and OCSP responses
3. Which combination forms the SOC Visibility Triad?
Firewall, IDS/IPS, and VPN
SIEM, EDR, and NDR
NetFlow, sFlow, and IPFIX
WAF, DLP, and CASB
4. What is the primary advantage of a hybrid policy enforcement model (centralized definition, distributed enforcement)?
It eliminates the need for a policy controller entirely
It combines consistency of centralized policy with performance and resilience of local enforcement
It ensures all traffic is routed through a central inspection point
It removes the requirement for telemetry feedback from enforcement points
5. During microsegmentation deployment, what is the recommended first phase according to CISA guidance?
Enforce default-deny policies on all segments immediately
Deploy identity-based SGTs across the campus
Discover and map all traffic flows and application dependencies
Configure firewall rules at every segmentation boundary
6. In Cisco ISE dynamic authorization, what happens when a corporate laptop connects but fails posture assessment (e.g., missing critical patches)?
The connection is dropped and the user must call the help desk
Full network access is granted with a warning notification
The device is placed in a quarantine VLAN with access to remediation resources only
The device is assigned a guest SGT with internet-only access
7. Which CIA triad principle is most directly addressed by deploying VRRP/HSRP and ECMP in a network design?
Confidentiality
Integrity
Availability
Non-repudiation
8. PCI-DSS v4.0 requires segmentation validation at what frequency?
Annually
Quarterly
Semi-annually (every 6 months)
Monthly
9. How does GDPR Article 32 differ from PCI-DSS in its approach to security controls?
GDPR mandates specific technologies while PCI-DSS is principles-based
GDPR is principles-based requiring measures proportional to risk, while PCI-DSS prescribes specific technical requirements
GDPR does not address encryption, unlike PCI-DSS
GDPR applies only to financial data while PCI-DSS covers all personal data
10. What key change does HIPAA's 2026 update make regarding multi-factor authentication?
MFA is removed as a requirement to reduce operational burden
MFA becomes mandatory, upgraded from the previous "addressable" status
MFA is required only for remote access VPN connections
MFA is required only for administrator accounts
11. An architect is designing NDR sensor placement. Which location provides visibility into east-west lateral movement within the data center?
Internet perimeter only
Between the core and data center boundary
On the WAN edge router
At the DNS resolver
12. In a SIEM log aggregation architecture, what is the purpose of the normalization tier?
To encrypt all log data before storage
To convert diverse log formats into a common schema for correlation
To compress logs and reduce storage requirements
To filter out all non-security events before analysis
13. Why is identity-based segmentation (using SGTs) preferred over IP-based ACLs in modern enterprise networks?
SGTs are faster to process in hardware than ACLs
Policy follows the user/device identity regardless of network location, without requiring re-architecture
SGTs eliminate the need for any firewall in the network
IP-based ACLs cannot be applied to encrypted traffic
14. Which ETA metadata element uses the rhythm of packet sizes and timing to identify malware command-and-control traffic?
Initial Data Packet (IDP)
JA3/JA4 fingerprints
Sequence of Packet Lengths and Times (SPLT)
Server Name Indication (SNI)
15. When designing a network that must comply with both PCI-DSS and HIPAA, what is the recommended architectural strategy?
Build separate physical networks for each compliance requirement
Design to meet the most stringent overlapping requirements across both frameworks
Implement PCI-DSS controls only since they are more prescriptive
Apply HIPAA controls only since healthcare data is more sensitive
Network visibility is the foundation of any security architecture. You cannot protect what you cannot see. This section covers the technologies and architectural patterns that give security teams actionable intelligence about network behavior.
1.1 NetFlow, IPFIX, and Telemetry for Security Analytics
Flow-based monitoring provides a lightweight, scalable method for understanding traffic patterns without full packet capture. Think of it as reading the envelopes of every letter in a post office -- you learn who is communicating with whom, how often, and how much data is exchanged, without opening any of them.
NetFlow (Cisco) collects flow information defined as unidirectional packet sequences sharing common attributes (source/destination IP, ports, protocol). NetFlow v9 supports approximately 100 information elements with a template-based export format.
IPFIX (IETF standard, RFC 7011) extends NetFlow v9 with nearly 500 information elements, vendor-specific extensions, variable-length fields, and support for UDP, TCP, and SCTP transport. IPFIX is the preferred choice for multi-vendor and cloud environments.
| Feature | NetFlow v9 | IPFIX |
| Standardization | Cisco proprietary | IETF standard (RFC 7011) |
| Information elements | ~100 | ~500 |
| Vendor extensions | Limited | Full support |
| Transport protocol | UDP | UDP, TCP, SCTP |
| Best suited for | Cisco-centric environments | Multi-vendor, cloud, virtualized |
Strategic Deployment: A mature visibility architecture deploys NetFlow on border routers, sFlow on core switches, and IPFIX in virtualized environments -- all feeding into a central analytics platform for correlation.
Animation: Flow data collection from multiple network domains aggregating into a central analytics platform, showing the journey from packet to flow record to correlated insight.
1.2 Encrypted Traffic Analytics (ETA)
With over 90% of web traffic now encrypted, traditional deep packet inspection is increasingly blind. ETA detects malware in encrypted traffic without decryption by analyzing three categories of metadata:
- Initial Data Packet (IDP): TLS handshake information including cipher suites, TLS version, SNI, and certificate details -- the "return address on a sealed envelope."
- Sequence of Packet Lengths and Times (SPLT): Payload sizes and inter-arrival times of early packets. Malware C2 traffic shows distinctive short, regular bursts -- like recognizing Morse code by rhythm.
- JA3/JA4 Fingerprints: Unique hashes from TLS handshake parameters that identify client implementations. A legitimate browser and a malware implant often produce different JA3 hashes even when using the same cipher suites.
ETA also provides Cryptographic Audit capability to identify systems using outdated TLS versions or weak cipher suites -- valuable for PCI-DSS compliance.
Animation: Side-by-side comparison of legitimate HTTPS browsing vs. malware C2 traffic, highlighting how SPLT patterns differ in packet size rhythm and timing even when both are encrypted.
1.3 SIEM Integration and Log Aggregation
A SIEM platform is the central nervous system of security operations -- ingesting logs from network devices, servers, applications, and security tools; normalizing events; and generating correlated alerts.
The SOC Visibility Triad combines three complementary pillars: SIEM (log-based events), EDR (endpoint processes and behavior), and NDR (network traffic patterns). No single pillar provides complete visibility.
flowchart TD
subgraph SOC["SOC Visibility Triad"]
SIEM["SIEM\nLog-based events\nAuthentication & config changes"]
EDR["EDR\nEndpoint processes\nFile system & user behavior"]
NDR["NDR\nNetwork traffic patterns\nLateral movement & exfiltration"]
end
SIEM -->|Alert correlation| ANALYTICS["Unified Security Analytics"]
EDR -->|Host-level context| ANALYTICS
NDR -->|Network-level context| ANALYTICS
ANALYTICS --> DETECT["Threat Detection & Response"]
A scalable SIEM architecture follows a tiered model: Collection (syslog servers, forwarders close to sources), Normalization (parsing into common schema like CEF or ECS), Analytics (correlation rules, UEBA, ML), and Storage (hot/warm/cold tiers based on retention requirements).
1.4 Network Detection and Response (NDR) Placement
NDR solutions analyze network traffic in real time using behavioral analytics, signatures, and machine learning. Key placement points include the network perimeter, data center boundary, internal core, and cloud on-ramps. NDR integrates bidirectionally with SIEM (alert correlation), EDR (host context), SOAR (automated response), and firewalls (enforcement actions).
Animation: NDR sensor placement diagram showing sensors at internet edge, data center boundary, and campus core, with arrows depicting threat detection triggering automated firewall isolation of a compromised segment.
Visibility tells you what is happening; policy enforcement determines what is allowed to happen. This section covers enforcement models for consistent security across campus, WAN, data center, and cloud domains.
2.1 Centralized vs. Distributed Policy Enforcement
The two fundamental models each have distinct trade-offs:
| Characteristic | Centralized | Distributed |
| Policy decision point | Single controller/manager | Local to each device |
| Consistency | High -- single source of truth | Risk of drift across devices |
| Latency | Higher (controller consultation) | Lower (local decision) |
| Scalability | Controller can be bottleneck | Scales with the network |
| Resilience | Single point of failure risk | Operates if controller unreachable |
The optimal enterprise design is a hybrid model: centralized policy definition and distribution with distributed enforcement. Think of a national legal system -- laws written centrally by a legislature, enforced locally by officers in every town.
flowchart TD
CTRL["Policy Controller\n(ISE / Catalyst Center / SASE)"]
CTRL -->|"Push policies"| CAMPUS["Campus Switches\nLocal enforcement"]
CTRL -->|"Push policies"| WAN["WAN Edge Routers\nLocal enforcement"]
CTRL -->|"Push policies"| DC["Data Center Firewalls\nLocal enforcement"]
CTRL -->|"Push policies"| CLOUD["Cloud Security Groups\nLocal enforcement"]
CAMPUS -->|"Telemetry & status"| CTRL
WAN -->|"Telemetry & status"| CTRL
DC -->|"Telemetry & status"| CTRL
CLOUD -->|"Telemetry & status"| CTRL
2.2 Policy Consistency Across Domains
SASE converges networking and security into a unified cloud-delivered service for single-pane-of-glass policy management. For WAN/branch environments, SD-WAN enforces consistent security via a controller (e.g., Cisco vManage).
Cisco Catalyst SD-WAN implements a four-layer security stack applied uniformly: microsegmentation, enterprise firewall, secure web gateway, and DNS-layer security.
Cross-Domain Identity Propagation: The integration between SD-Access (campus) and SD-WAN extends identity-based segmentation from the campus edge through the WAN to remote branches, enabling a single policy to follow users and devices everywhere.
2.3 Microsegmentation and Zero Trust
Microsegmentation divides a network into granular secure zones, each with its own access controls. It is a core component of Zero Trust where no implicit trust is granted based on network location.
Enforcement models:
- Default-deny (whitelist): All traffic blocked unless explicitly permitted -- the gold standard but requires thorough flow analysis first.
- Default-permit with logging: Used during discovery to build a baseline before transitioning to default-deny.
- Identity-based segmentation: Policy tied to user/device identity via Scalable Group Tags (SGTs), not IP addresses.
flowchart LR
D["1. Discover\nMap traffic flows"] --> DEF["2. Define\nCreate policies"]
DEF --> T["3. Test\nAudit/monitor mode"]
T --> E["4. Enforce\nActivate policies"]
E --> M["5. Maintain\nContinuous monitoring"]
M -.->|"Iterate"| D
Animation: Phased microsegmentation rollout showing traffic flows being discovered, policies being tested in monitor mode, then enforced -- with a before/after comparison of allowed vs. blocked lateral movement.
2.4 Dynamic Policy with ISE and Catalyst Center
ISE provides context-aware authorization considering identity, device posture, location, and time of day. The flow: user connects, NAD sends RADIUS request to ISE, ISE evaluates context, returns authorization (VLAN, dACL, SGT, or remediation redirect), and the NAD enforces locally.
flowchart TD
USER["User/Device Connects"] --> NAD["Network Access Device"]
NAD -->|"RADIUS request"| ISE["Cisco ISE"]
ISE --> EVAL{"Evaluate Context:\nIdentity, Posture,\nLocation, Time"}
EVAL -->|"Compliant"| AUTH_OK["Full Access:\nVLAN + SGT + dACL"]
EVAL -->|"Non-compliant"| AUTH_LIMIT["Quarantine VLAN\nor URL Redirect"]
AUTH_OK --> NAD_ENF["NAD Enforces in Data Plane"]
AUTH_LIMIT --> NAD_ENF
| Condition | Policy Action |
| Corporate laptop, compliant, on-premises | Full access with SGT "Employee" |
| Corporate laptop, non-compliant (missing patches) | Quarantine VLAN, patch servers only |
| Personal BYOD device | Internet-only via SGT "Guest" |
| IoT sensor (profiled by ISE) | Restricted segment, controller access only |
| After-hours VPN from unusual location | Step-up MFA, limited access |
The CIA triad -- Confidentiality, Integrity, and Availability -- is the foundational model for information security. Every regulatory framework maps back to these three principles.
3.1 The CIA Triad in Network Design
Confidentiality (authorized access only): Encryption in transit/at rest, 802.1X, RADIUS/TACACS+, SGTs, data classification and segmentation.
Integrity (data not altered): Hashing/digital signatures, secure routing protocol authentication (OSPF/BGP MD5/SHA), control plane protection (CoPP, RPKI), configuration integrity verification.
Availability (accessible when needed): Redundant paths/devices (ECMP), HA protocols (VRRP, HSRP, NSF/SSO), DDoS mitigation (RTBH, FlowSpec), disaster recovery.
The bank vault analogy: Confidentiality is the vault door (only authorized entry). Integrity is the tamper-evident seal (you know if something changed). Availability is operating hours and backup power (accessible even during outages).
graph TD
CIA["CIA Triad"]
CIA --- C["Confidentiality\nAuthorized access only"]
CIA --- I["Integrity\nData accuracy & completeness"]
CIA --- A["Availability\nAccessible when needed"]
C --- C1["Encryption: TLS, IPsec, MACsec"]
C --- C2["Access Control: 802.1X, SGTs"]
I --- I1["Hashing: SHA-256, HMAC"]
I --- I2["Routing Auth: OSPF/BGP MD5"]
A --- A1["Redundancy: ECMP, VRRP/HSRP"]
A --- A2["DDoS Mitigation: RTBH, FlowSpec"]
Animation: Interactive CIA triad triangle where clicking each pillar reveals the specific network technologies that implement it, with examples of design trade-offs between pillars.
3.2 PCI-DSS v4.0
PCI-DSS v4.0 establishes strict requirements for networks handling payment card data. Key network design impacts include:
- Firewalls/NSCs at every CDE connection point
- CDE isolated from all other networks with semi-annual segmentation validation (shifted from annual)
- TLS 1.2 minimum for all cardholder data transmissions
- Centralized audit trails for all CDE access
- IDS/IPS at CDE perimeter and critical internal points
The semi-annual validation requirement drives the need for automated tools using flow telemetry and NDR to continuously verify segmentation effectiveness.
3.3 HIPAA (2026 Updates)
HIPAA's Security Rule protects ePHI. The 2026 updates significantly strengthen requirements:
- MFA becomes mandatory -- upgraded from "addressable" (organizations could previously document why they chose not to implement it)
- All ePHI systems must encrypt data at rest, including cloud and backup
- Real-time audit logging from all systems creating, storing, or transmitting ePHI
- ePHI systems must be isolated from general-purpose networks
3.4 GDPR Article 32
GDPR is principles-based rather than prescriptive. Article 32 explicitly references the CIA triad ("ensure ongoing confidentiality, integrity, availability and resilience"). Security measures must be proportional to the risk and scope of data processing. Data protection by design (Article 25) requires privacy controls built into the architecture from the start.
3.5 Compliance Comparison
| Requirement | PCI-DSS v4.0 | HIPAA 2026 | GDPR Art. 32 |
| Encryption in transit | TLS 1.2+ mandatory | TLS 1.2+ mandatory | "Appropriate" encryption |
| Encryption at rest | Required for cardholder data | Required for all ePHI | Pseudonymization or encryption |
| Segmentation | Mandatory, semi-annual validation | Required (ePHI isolation) | Risk-based |
| Access control | Role-based, least privilege | Unique IDs, MFA mandatory | Appropriate to risk |
| Audit logging | All CDE access | All ePHI access, real-time | Regular assessment |
| Incident response | Required within timelines | Required | 72-hour breach notification |
graph TD
REG["Regulatory Compliance Frameworks"]
REG --- PCI["PCI-DSS v4.0\nPayment card data"]
REG --- HIPAA["HIPAA 2026\nElectronic PHI"]
REG --- GDPR["GDPR Art. 32\nPersonal data EU"]
PCI --> ENC["Encryption\nTLS 1.2+ mandatory"]
PCI --> SEG["Segmentation\nSemi-annual validation"]
PCI --> LOG["Audit Logging"]
HIPAA --> ENC
HIPAA --> MFA["MFA\nMandatory for all ePHI"]
HIPAA --> LOG
GDPR --> ENC
GDPR --> RISK["Risk-Based Controls"]
GDPR --> RESTORE["Timely Restoration\nDefined RTO/RPO"]
1. An architect needs flow-level visibility across a multi-vendor environment including cloud workloads. Which technology is the best fit?
NetFlow v9
sFlow
IPFIX
Full packet capture
2. Cisco Encrypted Traffic Analytics (ETA) detects malware in encrypted flows primarily by analyzing which of the following?
Decrypted packet payloads after inline TLS termination
Metadata such as IDP, SPLT, and JA3 fingerprints without decryption
DNS query patterns correlated with known threat intelligence feeds
Certificate transparency logs and OCSP responses
3. Which combination forms the SOC Visibility Triad?
Firewall, IDS/IPS, and VPN
SIEM, EDR, and NDR
NetFlow, sFlow, and IPFIX
WAF, DLP, and CASB
4. What is the primary advantage of a hybrid policy enforcement model (centralized definition, distributed enforcement)?
It eliminates the need for a policy controller entirely
It combines consistency of centralized policy with performance and resilience of local enforcement
It ensures all traffic is routed through a central inspection point
It removes the requirement for telemetry feedback from enforcement points
5. During microsegmentation deployment, what is the recommended first phase according to CISA guidance?
Enforce default-deny policies on all segments immediately
Deploy identity-based SGTs across the campus
Discover and map all traffic flows and application dependencies
Configure firewall rules at every segmentation boundary
6. In Cisco ISE dynamic authorization, what happens when a corporate laptop connects but fails posture assessment (e.g., missing critical patches)?
The connection is dropped and the user must call the help desk
Full network access is granted with a warning notification
The device is placed in a quarantine VLAN with access to remediation resources only
The device is assigned a guest SGT with internet-only access
7. Which CIA triad principle is most directly addressed by deploying VRRP/HSRP and ECMP in a network design?
Confidentiality
Integrity
Availability
Non-repudiation
8. PCI-DSS v4.0 requires segmentation validation at what frequency?
Annually
Quarterly
Semi-annually (every 6 months)
Monthly
9. How does GDPR Article 32 differ from PCI-DSS in its approach to security controls?
GDPR mandates specific technologies while PCI-DSS is principles-based
GDPR is principles-based requiring measures proportional to risk, while PCI-DSS prescribes specific technical requirements
GDPR does not address encryption, unlike PCI-DSS
GDPR applies only to financial data while PCI-DSS covers all personal data
10. What key change does HIPAA's 2026 update make regarding multi-factor authentication?
MFA is removed as a requirement to reduce operational burden
MFA becomes mandatory, upgraded from the previous "addressable" status
MFA is required only for remote access VPN connections
MFA is required only for administrator accounts
11. An architect is designing NDR sensor placement. Which location provides visibility into east-west lateral movement within the data center?
Internet perimeter only
Between the core and data center boundary
On the WAN edge router
At the DNS resolver
12. In a SIEM log aggregation architecture, what is the purpose of the normalization tier?
To encrypt all log data before storage
To convert diverse log formats into a common schema for correlation
To compress logs and reduce storage requirements
To filter out all non-security events before analysis
13. Why is identity-based segmentation (using SGTs) preferred over IP-based ACLs in modern enterprise networks?
SGTs are faster to process in hardware than ACLs
Policy follows the user/device identity regardless of network location, without requiring re-architecture
SGTs eliminate the need for any firewall in the network
IP-based ACLs cannot be applied to encrypted traffic
14. Which ETA metadata element uses the rhythm of packet sizes and timing to identify malware command-and-control traffic?
Initial Data Packet (IDP)
JA3/JA4 fingerprints
Sequence of Packet Lengths and Times (SPLT)
Server Name Indication (SNI)
15. When designing a network that must comply with both PCI-DSS and HIPAA, what is the recommended architectural strategy?
Build separate physical networks for each compliance requirement
Design to meet the most stringent overlapping requirements across both frameworks
Implement PCI-DSS controls only since they are more prescriptive
Apply HIPAA controls only since healthcare data is more sensitive