You are previewing CCNA® Cisco Certified Network Associate Review Guide.
O'Reilly logo
CCNA® Cisco Certified Network Associate Review Guide

Book Description

The leading quick-review guide to the number-one IT certification

The Cisco Certified Network Associate (CCNA) certification is the first step for network administrators seeking to advance their careers. Part of the Sybex study-practice-review approach to certification preparation, this concise review guide is organized by exam objective and is the perfect companion to CCNA: Cisco Certified Network Associate Study Guide, 7th Edition. Written by networking authority Todd Lammle, this brand new guide features eight chapters corresponding to the eight domains of the CCNA exam objectives.

Also included is an interactive CD with two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.

  • Network professionals who hold the CCNA certification generally earn more than coworkers who have not earned the CCNA

  • This guide, by author and trainer Todd Lammle, provides a focused, concise review that works with other learning tools such as CCNA: Cisco Certified Network Associate Study Guide, 7th Edition

  • Covers the eight domains of the exam objectives, including how a network works, configuration, IP addresses, network security threats, and troubleshooting

  • Includes a CD with two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms

CCNA candidates will find this focused review guide greatly improves their chances of success as they tackle the exam.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dear Reader,
  5. Acknowledgments
  6. About the Author
  7. Introduction
    1. What Is CCNA Certification?
    2. Is This Book For You?
  8. Chapter 1: Describe How a Network Works
    1. Describe the Purpose and Functions of Various Network Devices
    2. Select the Components Required to Meet a Network Specification
    3. Use the OSI and TCP/IP Models and Their Associated Protocols to Explain How Data Flows in a Network
    4. Describe Common Networked Applications, Including Web Applications
    5. Describe the Purpose and Basic Operation of the Protocols in the OSI and TCP Models
    6. Describe the Impact of Applications (Voice over IP and Video over IP) on a Network
    7. Interpret Network Diagrams
    8. Determine the Path between Two Hosts across a Network
    9. Describe the Components Required for Network and Internet Communications
    10. Identify and Correct Common Network Problems at Layers 1, 2, 3, and 7 Using a Layered Model Approach
    11. Differentiate between LAN/WAN Operation and Features
    12. Review Questions
    13. Answers to Review Questions
  9. Chapter 2: Configure, Verify, and Troubleshoot a Switch with VLANs and Interswitch Communications
    1. Select the Appropriate Media, Cables, Ports, and Connectors to Connect Switches to Other Network Devices and Hosts
    2. Explain the Technology and Media Access Control Method for Ethernet Networks
    3. Explain Network Segmentation and Basic Traffic Management Concepts
    4. Explain Basic Switching Concepts and the Operation of Cisco Switches
    5. Perform and Verify Initial Switch Configuration Tasks, Including Remote Access Management
    6. Verify Network Status and Switch Operation Using Basic Utilities (Including ping, traceroute, Telnet, SSH, arp, and ipconfig) and SHOW and DEBUG Commands
    7. Identify, Prescribe, and Resolve Common Switched Network Media Issues, Configuration Issues, Auto Negotiation, and Switch Hardware Failures
    8. Describe Enhanced Switching Technologies (Including VTP, RSTP, VLAN, PVSTP, and 802.1q)
    9. Describe How VLANs Create Logically Separate Networks and the Need for Routing between Them
    10. Configure, Verify, and Troubleshoot VLANs
    11. Configure, Verify, and Troubleshoot Trunking on Cisco Switches
    12. Configure, Verify, and Troubleshoot InterVLAN Routing
    13. Configure, Verify, and Troubleshoot VTP
    14. Configure, Verify, and Troubleshoot RSTP Operation
    15. Interpret the Output of Various SHOW and DEBUG Commands to Verify the Operational Status of a Cisco Switched Network
    16. Implement Basic Switch Security (Including Port Security, Trunk Access, Management VLAN Other Than VLAN 1, Etc.)
    17. Review Questions
    18. Answers to Review Questions
  10. Chapter 3: Implement an IP Addressing Scheme and IP Services to Meet Network Requirements in a Medium-Sized Enterprise Branch Office Network
    1. Describe the Operation and Benefits of Using Private and Public IP Addressing
    2. Explain the Operation and Benefits of Using DHCP and DNS
    3. Configure, Verify, and Troubleshoot DHCP and DNS Operation on a Router (Including CLI/SDM)
    4. Implement Static and Dynamic Addressing Services for Hosts in a LAN Environment
    5. Calculate and Apply an Addressing Scheme, Including VLSM IP Addressing Design, to a Network
    6. Determine the Appropriate Classless Addressing Scheme Using VLSM and Summarization to Satisfy Addressing Requirements in a LAN/WAN Environment
    7. Describe the Technological Requirements for Running IPv6 in Conjunction with IPv4 (Including Protocols, Dual Stack, Tunneling, Etc.)
    8. Describe IPv6 Addresses
    9. Identify and Correct Common Problems Associated with IP Addressing and Host Configurations
    10. Review Questions
    11. Answer to Review Questions
  11. Chapter 4: Configure, Verify, and Troubleshoot Basic Router Operation and Routing on Cisco Devices
    1. Describe Basic Routing Concepts (Including Packet Forwarding and the Router Lookup Process)
    2. Describe the Operation of Cisco Routers (Including the Router Bootup Process, POST, and Router Components)
    3. Select the Appropriate Media, Cables, Ports, and Connectors to Connect Routers to Other Network Devices and Hosts
    4. Configure, Verify, and Troubleshoot RIPv2
    5. Access and Utilize the Router to Set Basic Parameters (Including CLI/SDM)
    6. Connect, Configure, and Verify the Operational Status of a Device Interface
    7. Verify Device Configuration and Network Connectivity Using ping, traceroute, Telnet, SSH, or Other Utilities
    8. Perform and Verify Routing Configuration Tasks for a Static or Default Route Given Specific Routing Requirements
    9. Manage IOS Configuration Files (Including Save, Edit, Upgrade, and Restore)
    10. Manage Cisco IOS
    11. Compare and Contrast Methods of Routing and Routing Protocols
    12. Configure, Verify, and Troubleshoot OSPF
    13. Configure, Verify, and Troubleshoot EIGRP
    14. Verify Network Connectivity (Including Using ping, traceroute, and Telnet or SSH)
    15. Troubleshoot Routing Issues
    16. Verify Router Hardware and Software Operation Using the show and debug Commands
    17. Implement Basic Router Security
    18. Review Questions
    19. Answers to Review Questions
  12. Chapter 5: Explain and Select the Appropriate Administrative Tasks Required for a WLAN
    1. Describe Standards Associated with Wireless Media (Including IEEE, Wi-Fi Alliance, and ITU/FCC)
    2. Identify and Describe the Purpose of the Components in a Small Wireless Network (Including SSID, BSS, and ESS)
    3. Identify the Basic Parameters to Configure on a Wireless Network to Ensure That Devices Connect to the Correct Access Point
    4. Compare and Contrast Wireless Security Features and Capabilities of WPA Security (Including Open, WEP, and WPA-1/2)
    5. Identify Common Issues with Implementing Wireless Networks (Including Interfaces and Misconfigurations)
    6. Review Questions
    7. Answers to Review Questions
  13. Chapter 6: Identify Security Threats to a Network and Describe General Methods to Mitigate Those Threats
    1. Describe Today’s Increasing Network Security Threats and Explain the Need to Implement a Comprehensive Security Policy to Mitigate the Threats
    2. Explain General Methods to Mitigate Common Security Threats to Network Devices, Hosts, and Applications
    3. Describe the Functions of Common Security Appliances and Applications
    4. Describe Security Recommended Practices, Including Initial Steps to Secure Network Devices
    5. Review Questions
    6. Answers to Review Questions
  14. Chapter 7: Implement, Verify, and Troubleshoot NAT and ACLs in a Medium-Sized Enterprise Branch Office Network
    1. Describe the Purpose and Types of ACLs
    2. Configure and Apply ACLs Based on Network Filtering Requirements (Including CLI/SDM)
    3. Configure and Apply ACLs to Limit Telnet and SSH Access to the Router Using (Including SDM/CLI)
    4. Verify and Monitor ACLs in a Network Environment
    5. Troubleshoot ACL Issues
    6. Explain the Basic Operation of NAT
    7. Configure NAT for Given Network Requirements Using (Including CLI/SDM)
    8. Troubleshoot NAT Issues
    9. Review Questions
    10. Answers to Review Questions
  15. Chapter 8: Implement and Verify WAN Links
    1. Describe Different Methods for Connecting to a WAN
    2. Configure and Verify a Basic WAN Serial Connection
    3. Configure and Verify Frame Relay on Cisco Routers
    4. Troubleshoot WAN Implementation Issues
    5. Describe VPN Technology (Including Importance, Benefits, Role, Impact, and Components)
    6. Configure and Verify a PPP Connection between Cisco Routers
    7. Review Questions
    8. Answers to Review Questions
  16. Appendix: About the Companion CD
    1. What You’ll Find on the CD
    2. System Requirements
    3. Using the CD
    4. Troubleshooting
  17. Index