1. Trang chủ
  2. » Giáo Dục - Đào Tạo

CCDA 200 310 official cert guide, 5th edition tủ tài liệu bách khoa

900 643 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 900
Dung lượng 11,84 MB

Nội dung

www.allitebooks.com Exclusive Offer – 40% OFF Cisco Press Video Training ciscopress.com/video Use coupon code CPVIDEO40 during checkout Video Instruction from Technology Experts Advance Your Skills Train Anywhere Learn Get star ted with fundamentals, become an expert, or get certified Train anywhere, at your own pace, on any device Learn from trusted author trainers published by Cisco Press Try Our Popular Video Training for FREE! ciscopress.com/video Explore hundreds of FREE video lessons from our growing library of Complete Video Courses, LiveLessons, networking talks, and workshops ciscopress.com/video www.allitebooks.com CCDA 200-310 Official Cert Guide ANTHONY BRUNO, CCIE No 2738 STEVE JORDAN, CCIE No 11293 Cisco Press 800 East 96th Street Indianapolis, IN 46240 www.allitebooks.com ii CCDA 200-310 Official Cert Guide CCDA 200-310 Official Cert Guide Anthony Bruno, CCIE No 2738 Steve Jordan, CCIE No 11293 Copyright © 2017 Pearson Education, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Library of Congress Control Number: 2016940168 ISBN-10: 1-58714-454-9 ISBN-13: 978-1-58714-454-7 Second Printing: May 2017 Warning and Disclaimer This book is designed to provide information about the CCDA exam Every effort has been made to make this book as complete and accurate as possible, but no warranty or fitness is implied The information is provided on an “as is” basis The authors, Cisco Press, and Cisco Systems, Inc shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the authors and are not necessarily those of Cisco Systems, Inc www.allitebooks.com iii Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members of the professional technical community Reader feedback is a natural continuation of this process If you have any comments on how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at feedback@ciscopress.com Please be sure to include the book title and ISBN in your message We greatly appreciate your assistance Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S., please contact: International Sales intlcs@pearson.com Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Editor-in-Chief: Mark Taub Cover Designer: Chuti Praesersith Product Line Manager: Brett Bartow Business Operation Manager, Cisco Press: Jan Cornelssen Acquisitions Editor: Michelle Newcomb, Denise Lincoln Managing Editor: Sandra Schroeder Technical Editors: Jay McMickle, Kevin Yudong Wu Development Editor: Christopher Cleveland Copy Editor: Bart Reed Project Editor: Mandie Frank Editorial Assistant: Vanessa Evans Indexer: Ken Johnson Composition: Studio Galou www.allitebooks.com iv CCDA 200-310 Official Cert Guide About the Authors Anthony Bruno, CCIE No 2738, is a Consulting Director with BT with more than 20 years of experience in the internetworking field Previously, he worked for International Network Services, Lucent Technologies, and as a captain in the U.S Air Force His other industry certifications include CCDP, PMP, CCNP Security, Cisco Certified Business Value Practitioner, Cisco Data Center Network Infrastructure Specialist, Cisco Security Solutions & Design Specialist, and ITILv3 Foundation He has consulted for many enterprise and service provider customers in the design, implementation, and optimization of large-scale networks Anthony leads architecture and design teams in building nextgeneration networks for his customers He completed his Master of Science in Electrical Engineering at the University of Missouri–Rolla in 1994 and his Bachelor of Science in Electrical Engineering at the University of Puerto Rico–Mayaguez in 1990 He is also a part-time instructor for the University of Phoenix–Online, teaching networking courses Outside of work Anthony enjoys running marathons, Spartan obstacle races, and Olympic and Ironman distance triathlons Steve Jordan, CCIE No 11293, is a Senior Technology Manager with Accudata Systems and has 20 years experience in the field of internetworking For the last 10 years, Steve has specialized in data center architectures involving compute, network, storage, virtualization, and SDN Over the years, Steve has worked with many enterprise and service provider customers in both pre-sales and post-sales engineering and architecture roles, along with working at several Cisco Gold Partners He has extensive experience in data center architecture and design and has implemented solutions in many financial, energy, retail, healthcare, education, and telecommunications industries Steve is a 10-Year triple CCIE in the tracks of Routing & Switching, Storage Networking, and Data Center His other certifications include VMware VCIX-NV, VCP-NV, VCP4-DCV, VCP5-DCV, CCDP, CCNP, ACI-SE, and ACI-FE Steve lives in Houston, Texas, with his wife and three sons When he is not working on technology, Steve can be found traveling to new places, finding great food, and listening to live music Steve was also the coauthor for the previous editions of the CCDA Official Cert Guide www.allitebooks.com v About the Technical Reviewers Kevin Yudong Wu, CCIE No 10697 (Routing & Switching and Security), is a senior network consultant at British Telecom (BT) He has been engaged as a leading engineer in various network design projects, including LAN, WLAN, data center, and network security with BT’s customers Before joining BT, Kevin worked as customer support engineer at Cisco High Touch Technical Support (HTTS) to support both Cisco LAN switching and security products He holds a master degree in both Computer Science (The University of Texas at Arlington, 2003) and Materials Engineering (Beijing University of Aeronautics and Astronautics, 1995) Jay McMickle, CCIE No 35355 (Routing & Switching and Security), is a double CCIE with 20 years of experience in the IT industry He currently works as a Sr Network and Security Consultant at Accudata Systems in Houston, Texas Previously, he worked for Baker Hughes as a Technical Lead—first for the WAN team, followed by the Security team, and finally leading the Solution Architecture team His other certifications include 3x CCNP (Routing & Switching, Design, and Security), Cisco Advanced Security Architect, Cisco Security Specializations, BCNE, CCSA, MCSE, and CCA He specializes in routing designs and implementation as well as Security Architecture, implementation, and Security Operations When he isn’t working, you can find him teaching American Karate (ASK) or on the water wakeboarding or wakesurfing with friends and family A big thank you to God From the bottom to here, it is only through Him that I have the family, career, and friends that surround me Thank you to Steve and Anthony When we met (with you both as consultants) back in 2006, little did I know that we would remain in touch and become friends Whether it’s when I see Anthony at my neighborhood gym or Steve in the office, it goes to show how close our industry is and how you should nurture every relationship and not burn bridges You might be working for them one day Thank you to my wife for the patience she has with me in my work Although I always “have one more thing to do,” she understands my passion for IT and the dedication that comes along with it Much love to both of my daughters, Avery (a.k.a “The Goose”) and Landyn (a.k.a “The Bits”) I hope you both find a hobby that also serves as a career and funnels your passion for life as well Much love to you both www.allitebooks.com vi CCDA 200-310 Official Cert Guide Dedications This book is dedicated to my wife of 25 years, Yvonne Bruno, Ph.D., and to our daughters, Joanne and Dianne Thanks for all of your support during the development of this book —Anthony Bruno This book is dedicated to my wife of 22 years, Dorin Jordan, and my three sons, Blake, Lance, and Miles, for their support during the development of this book I also want to dedicate this book to my mother Frances Brennan and my father-in law John Jordan for supporting me and being an inspiration to me throughout my life —Steve Jordan www.allitebooks.com vii Acknowledgments This book would not have been possible without the efforts of many dedicated people Thanks to Denise Lincoln and Michelle Newcomb for their guidance and support during the book development Thanks to Chris Cleveland, development editor, for his guidance and special attention to detail Thanks to Mandie Frank, project editor, for her accuracy Thanks to Bart Reed, copy editor, for his attention to detail Thanks to Brett Bartow, executive editor, for his vision Thanks to all other Cisco Press team members who worked behind the scenes to make this a better book A special thanks my coauthor, Steve Jordan, for contributing five chapters And a special thanks to the technical reviewers, Kevin Wu and Jay McMickle Their technical advice and careful attention to detail made this book accurate —Anthony Bruno This book would not be possible without all the great people who have assisted me I would first like to thank Anthony Bruno for inviting me to assist him in this endeavor once more Thanks to Denise Lincoln and Michelle Newcomb, project editors, for their guidance and support during the book development Thanks again to Chris Cleveland, development editor, for supporting my schedule delays and keeping me on track Special thanks goes to the technical reviewers of this book, Kevin Wu and Jay McMickle, who provided wisdom and helped with keeping the book accurate Finally, thanks to all the managers and marketing people at Cisco Press who make all these books possible —Steve Jordan www.allitebooks.com viii CCDA 200-310 Official Cert Guide Contents at a Glance Introduction xxxvi Part I General Network Design Chapter Network Design Methodology Chapter Network Design Models Part II LAN and WAN Design Chapter Enterprise LAN Design Chapter Data Center Design 127 Chapter Wireless LAN Design Chapter WAN Technologies and the Enterprise Edge Chapter WAN Design Part III The Internet Protocol and Routing Protocols Chapter Internet Protocol Version Design 287 Chapter Internet Protocol Version Design 333 Chapter 10 Routing Protocol Characteristics, RIP, EIGRP, and IS-IS Chapter 11 OSPF, BGP, Route Manipulation, and IP Multicast Part IV Security, Convergence, Network Management Chapter 12 Managing Security 485 Chapter 13 Security Solutions 521 Chapter 14 Voice and Video Design Chapter 15 Network Management Protocols Part V Comprehensive Scenarios and Final Prep Chapter 16 Comprehensive Scenarios Chapter 17 Final Preparation Part VI Appendixes Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Questions 663 Appendix B CCDA 200-310 version 1.0 Exam Updates Appendix C OSI Model, TCP/IP Architecture, and Numeric Conversion Glossary Index 39 81 167 215 249 377 427 557 617 641 655 717 730 www.allitebooks.com 699 701 Appendix E: Memory Tables Answer Key    27 Table 11-10  Multicast Addresses Multicast Address Description 224.0.0.0/24 Local network control block 224.0.0.1 All hosts or all systems on this subnet 224.0.0.2 All multicast routers 224.0.0.4 Distance-Vector Multicast Routing Protocol (DVMRP) routers 224.0.0.5 All OSPF routers 224.0.0.6 All OSPF DR routers 224.0.0.9 RIPv2 routers 224.0.0.10 EIGRP routers 224.0.0.13 All PIM routers 224.0.1.0/24 Internetwork control block 224.0.1.39 Rendezvous point (RP) announce 224.0.1.40 RP discovery 224.0.2.0 to 224.0.255.0 Ad hoc block 239.000.000.000 to 239.255.255.255 Administratively scoped 239.192.000.000 to 239.251.255.255 Organization-local scope 239.252.000.000 to 239.254.255.255 Site-local scope Table 11-11  Well-Known Multicast Addresses Multicast Address Multicast Group FF01::1 All nodes (node-local) FF02::1 All nodes (link-local) FF01::2 All routers (node-local) FF02::2 All routers (link-local) FF02::5 OSPFv3 routers FF02::6 OSPFv3 DRs FF02::9 Routing Information Protocol (RIPng) FF02::A EIGRP routers FF02::B Mobile agents FF02::C DHCP servers/relay agents FF02::D All PIM routers 28    CCDA 200-310 Official Cert Guide Chapter 12 Table 12-2  Security Legislation Legislation Abbreviation Legislation Description Focuses on the accuracy and the controls imposed on a company’s financial records SOX Data security standard that defines how to protect credit card holder data PCI DSS Protection against the sale of bank and account information that is regularly bought and sold by financial institutions GLBA Protection of private health information that is used electronically HIPPA Protection of people’s privacy with respect to the processing of personal data Directive 95/46/EC Table 12-3  Security Threats Threat Description Threat Category Gathering information about a host/network segment Reconnaissance Attacks aimed at overwhelming resources such as memory, CPU, and bandwidth of an attacked system and the use of adware/malware/spyware Service Disruption Act of attacking or exploiting the target host system Unauthorized access Attackers using packet sniffing tools and conducting man-inthe-middle attacks Disclosure and modification of data Peer-to-peer file sharing, out-of-policy network browsing, and the spamming of instant messaging systems Network Abuse Loss of data from servers or user workstations Data Leaks Phishing with SPAM to gather personal information Identity Theft and Fraud Table 12-4  Security Risks Risk Description Risk Type Ensure only legitimate users can view sensitive information to prevent theft, legal liabilities, and damage to the organization Confidentiality of data Ensure only authorized users can change critical information and guarantee the authenticity of data Integrity of data Allow uninterrupted access to critical network and computing resources to prevent business disruption and loss of productivity System and data availability Appendix E: Memory Tables Answer Key    29 Table 12-5  Software Features to Manage DoS Attacks Feature Description Feature Verifies DHCP transactions and prevents rogue DHCP servers from interfering with production traffic DHCP snooping Intercepts Address Resolution Protocol (ARP) packets and verifies that the packets have valid IP-to-MAC bindings Dynamic ARP Inspection (DAI) Prevents unknown source addresses from using the network as a transport mechanism to carry out attacks Unicast Reverse Path Forwarding (uRFP) Controls what traffic is allowed or blocked on the network Access control lists (ACL) Controls the rate of bandwidth for incoming traffic, such as ARP QoS Policing packets and DHCP requests Set of rules that an IPS uses to detect unusual activity IPS Signatures Table 12-6  Key Network Security Elements of the Network Security Lifecycle Security Consideration Name What are the business requirements? Business needs What is associated risk and cost? Risk analysis What policy governs the business requirements and risk? Security policy What are the recommended industry security best practices? Best practices What will the process be for incident, compliance, and change management? Security operations Table 12-7  Security Policy Documents Policy Description Document Name Defines the roles and responsibilities within risk management Acceptable-use policy Defines general access control principles used and how data is classified, such as confidential, top secret, or internal Network access control policy Explains how to manage the security infrastructure Security management policy Defines the processes and procedures for managing incidents Incident-handling policy 30    CCDA 200-310 Official Cert Guide Table 12-9  Steps for Continuous Security Process Description Process Name Identification, authentication, ACLs, stateful packet inspection (SPI), encryption, and VPNs Secure Intrusion and content-based detection and response Monitor Assessments, vulnerability scanning, and security auditing Test Data analysis, reporting, and intelligent network security Improve Table 12-10  Domains of Trust: Risks from Low to High Domain Level Safeguards Required Production to lab Low risk ACLs and network monitoring Headquarters to branch (IPsec VPN) Medium risk Authentication, confidentiality, integrity concerns, ACLs, route filtering Inside (private) to outside (public) High risk Stateful packet inspection, intrusion protection (IPS), security monitoring Chapter 13 Table 13-2  IDS/IPS Pros and Cons Pros Cons IDS IPS Zero impact to the network performance Can stop attacks No network impact if sensor fails Use of stream normalization methods Attacks cannot be stopped Network performance impacts on latency and jitter More vulnerable to intrusion techniques Network impact due to sensor failure Table 13-3  Cisco WSA Modes Cisco WSA Mode Description Explicit mode with proxy auto-configuration (PAC) files Proxy information stores in PAC Explicit mode without PAC files Requires changes to every browser Automatic download of PAC to browser using DHCP/DNS Supports redundancy; multiple WSAs listed in PAC Configuration of browser to point to the WSA as its proxy Does not support redundancy Appendix E: Memory Tables Answer Key    31 Cisco WSA Mode Description Transparent mode with Web Cache Communication Protocol (WCCP) Web traffic transparently directed to WSA using WCCP redirection No changes to browser necessary Requires configuration of WCCP-enabled FW/Router/L3 switch to point traffic to WSA Supports load sharing and redundancy Table 13-4  Integrated Security for Cisco IOS Cisco IOS Integrated Security Description Cisco IOS firewall Stateful multiservice application-based filtering Cisco IOS IPS Inline deep packet inspection Cisco IOS IPsec Data encryption at the packet level Cisco IOS Trust and Identity AAA, PKI, SSH, SSL Table 13-5  Security in the Campus Cisco Security Category Security Solutions Identity and access control 802.1X, ACLs, and firewalls Threat detection and mitigation NetFlow, syslog, SNMP, RMON, and IPS Infrastructure protection AAA, TACACS, RADIUS, SSH, SNMPv3, IGP/EGP MD5, and Layer security features Security management CSM, Cisco ISE, and ACS Table 13-6  Security in the Data Center Cisco Security Category Security Solutions Identity and access control 802.1X, ACLs, and firewalls (ASA SM) Threat detection and mitigation NetFlow, syslog, SNMP, RMON, and IPS Infrastructure protection AAA, TACACS, RADIUS, SSH, SNMPv3, IGP/EGP MD5, and Layer security features Security management CSM, Cisco ISE, and ACS 32    CCDA 200-310 Official Cert Guide Table 13-7  Enterprise Edge Device Selection Security Function Cisco Device Device Types Network Firewall Cisco ASA Physical Virtual Cloud service (optional) Remote Access VPN Cisco ASA Physical Virtual Cloud service (optional) Site-to-Site VPN Cisco ASA Physical Cisco CSR Virtual Cloud service (optional) Edge Routing Cisco IOS routers Physical Intrusion Prevention System Cisco ASA with FirePOWER Physical Email Security Cisco ESA Physical Virtual Cloud service (optional) Web Security Cisco WSA Physical Virtual Cloud service (optional) Security Policy Management Cisco ISE Physical Virtual Access Policy System Physical Virtual Cisco ACS Table 13-8  Security in the Enterprise Edge Cisco Security Category Security Solutions Identity and access control Firewalls, IPS, IPsec, SSL VPN, and ACLs Threat detection and mitigation NetFlow, syslog, SNMP, RMON, and IPS Infrastructure protection AAA, CoPP, TACACS, RADIUS, SSH, SNMP v3, IGP/EGP MD5, RFC 2827 ingress filtering, and Layer security features Security management CSM and ACS Appendix E: Memory Tables Answer Key    33 Chapter 14 Table 14-2  Common CAS and CCS Signaling Types Signaling Signaling/Circuit Type CAS T1 or E1 signaling CCS ISDN PRI or BRI QSIG SS7 Table 14-5  IPT Functional Areas IPT Functional Area Description Service applications Unity, IVR, TAPI interface Call processing Cisco CUCM Client endpoints IP phones, digital and analog gateways Voice-enabled infrastructure Layer and Layer switches and routers Table 14-8  Codec Standards Codec Bit Rate MOS Description G.711u 64 Kbps 4.1 PCM Mu-law version used in North America and Japan Samples speech 8000 times per second; represented in bits G.711a 64 Kbps 4.1 PCM A-law used in Europe and international systems G.726 16/24/32/40 Kbps 3.85 Adaptive differential pulse-code modulation (AD-PCM) G.728 16 Kbps 3.61 Low-Delay CELP (LDCELP) G.729 Kbps 3.92 Conjugate Structure Acelp (Cs-Acelp) G.723.1 6.3 Kbps 3.9 Multipulse Excitation–Maximum Likelihood Quantization (MPE-MLQ) G.723.1 5.3 Kbps 3.65 Algebraic Code–Excited Linear Prediction (ACELP) 34    CCDA 200-310 Official Cert Guide Table 14-11  Significant Protocols in VoIP Networks Protocol Description DHCP Dynamic Host Control Protocol Provides IP address, mask, gateway, DNS address, and TFTP address TFTP Trivial File Transfer Protocol Provides the IP phone configuration and operating system SCCP Skinny Client Control Protocol Establishes calls between IP phones and CUCM RTP Real-time Transport Protocol Used for the transmission of real time traffic such as voice and video RTCP` Real-time Transport Control Protocol Provides out-of-band statistics and control information for RTP streams H.323 An ITU standard for VoIP networks H.323 is older and more stable than SIP, but is also more process intensive and is limited to traditional voice and video functionality SIP Session Initiation Protocol An IETF standard for VoIP networks Newer and less mature than H.323, but also less process intensive and has support for new features such as IM and presence Table 14-14  QoS Scheme Summary QoS Scheme Description cRTP RTP header compression Reduces header overhead from 40 bytes to to bytes LFI Link fragmentation and interleaving Fragments large data packets and interleaves VoIP packets between them LLQ Uses a single strict queue for RTP traffic Differentiated QoS available for all other traffic AutoQoS AutoQoS is a Cisco IOS feature that enables QoS for VoIP in WAN and LAN environments AutoQoS significantly reduces the number of configuration lines necessary to support VoIP in the network Table 14-15  Cisco Service Class PHB Recommendations Application Class DSCP PHB Queuing and Dropping Network Control CS6 BW queue Network routing, EIGRP, OSPF, BGP, HSRP, IKE Telephony EF PQ IPT bearer traffic, VoIP, G.711, G.729 Broadcast Video CS5 PQ (optional) Cisco IP video surveillance Applications Appendix E: Memory Tables Answer Key    35 Queuing and Dropping Application Class DSCP PHB Multimedia Conferencing AF4 BW queue + DSCP WRED H.323/V2 video conferencing; Cisco Unified Personal Communicator Real-Time Interactive CS4 PQ (optional) Video conferencing and interactive gaming; TelePresence Multimedia Streaming AF3 BW queue + DSCP WRED Streaming video and audio on demand; Cisco Digital Media System (VoD) Call Signaling CS3 BW queue IPT signaling, H.323, SCCP, SIP Low-Latency Transactional data AF2 BW queue + DSCP WRED Client/server, web-based ordering, Webex, MeetingPlace, ERP apps Operations, CS2 Administration, Management (OAM) BW queue OAM&P, SNMP, SSH, syslog High-Throughput Bulk Data AF1 BW queue + DSCP WRED Store-and-forward apps, email, FTP, backup Low-Priority Scavenger Data CS1 Minimum BW queue Flows with no bandwidth assurance, YouTube, BitTorrent, Xbox Standard Best Effort CS0 Default queue + WRED Applications Default class Chapter 15 Table 15-2  Network Management Elements Network Management Element Description NMS Network management systems run the applications that manage and monitor managed devices Network management protocols and standards These are used to exchange management information between the NMS and the managed devices The key protocols and standards are SNMP, MIB, and RMON Managed devices These are the devices managed by the NMS Management agents Reside in the managed devices and include SNMP agents and RMON agents 36    CCDA 200-310 Official Cert Guide Table 15-3  SNMP Message Types SNMP Message Description Get request Retrieves the value of a specific MIB variable GetNext request Retrieves the next issuance of the MIB variable Get response Contains the values of the requested variable Set request Modifies the value of a MIB variable Trap Transmits an unsolicited alarm condition GetBulk Reduces repetitive requests for MIB variables Inform request Alerts an SNMP manager of specific conditions with confirmation Table 15-4  SNMP Security Levels Version Level Authentication Encryption SNMPv1 NoAuthNoPriv Community String None SNMPv2 NoAuthNoPriv Community String None SNMPv3 NoAuthNoPriv Username None SNMPv3 AuthNoPriv MD5 or SHA None SNMPv3 AuthPriv MD5 or SHA DES, 3DES, AES Table 15-7  Syslog Message Levels Syslog Level Severity Level Emergency System is unusable Alert Take action immediately Critical Critical conditions Error Error messages Warning Warning conditions Notice Normal but significant events Informational Informational messages Debug Debug level messages Appendix E: Memory Tables Answer Key    37 Table 15-8  NetFlow, CDP, and Syslog Technology Description NetFlow Collects network flow data for network planning, performance, accounting, and billing applications CDP Proprietary protocol for network discovery that provides information on neighboring devices Syslog Reports state information based on facility and severity levels RMON Remote Monitoring Provides aggregate information of network statistics and LAN traffic Appendix F Study Planner Practice Test Element Task Introduction Network Design Methodology Network Design Methodology Read Introduction Network Design Methodology Network Design Methodology Network Design Methodology Practice Test Network Design Models Network Design Models Network Design Models Network Design Models Network Design Models Practice Test Enterprise LAN Design Enterprise LAN Design Enterprise LAN Design Enterprise LAN Design Enterprise LAN Design Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Data Center Design Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Read Foundation Topics Data Center Design Review Key Topics Practice Test Reading Goal Date Task First Date Completed Second Date Completed (Optional) Notes Data Center Design Data Center Design Data Center Design Practice Test Wireless LAN Design Wireless LAN Design Wireless LAN Design Wireless LAN Design Wireless LAN Design Practice Test WAN Technologies and the Enterprise Edge WAN Technologies and the Enterprise Edge WAN Technologies and the Enterprise Edge WAN Technologies and the Enterprise Edge WAN Technologies and the Enterprise Edge Practice Test Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software WAN Design WAN Design WAN Design WAN Design WAN Design Practice Test Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter in practice test software Internet Protocol Version Read Foundation Topics Design Internet Protocol Version Review Key Topics Design Complete all memory tables Internet Protocol Version in this chapter using the Design book's website Internet Protocol Version Define Key Terms Design Internet Protocol Version Complete the Q&A section Design Practice Test Take practice test in study mode using Exam Bank questions for Chapter in practice test software Internet Protocol Version Read Foundation Topics Design Internet Protocol Version Review Key Topics Design Complete all memory tables Internet Protocol Version in this chapter using the Design book's website Internet Protocol Version Define Key Terms Design Internet Protocol Version Complete the Q&A section Design Take practice test in study mode using Exam Bank Practice Test questions for Chapter in practice test software 10 Routing Protocol Characteristics, RIP, EIGRP, Read Foundation Topics and IS-IS 10 Routing Protocol Characteristics, RIP, EIGRP, Review Key Topics and IS-IS 10 Routing Protocol Complete all memory tables Characteristics, RIP, EIGRP, in this chapter using the and IS-IS book's website 10 Routing Protocol Characteristics, RIP, EIGRP, Define Key Terms and IS-IS 10 Routing Protocol Characteristics, RIP, EIGRP, Complete the Q&A section and IS-IS Take practice test in study mode using Exam Bank Practice Test questions for Chapter 10 in practice test software 11 OSPF, BGP, Route Manipulation, and IP Read Foundation Topics Multicast 11 OSPF, BGP, Route Manipulation, and IP Review Key Topics Multicast 11 OSPF, BGP, Route Complete all memory tables Manipulation, and IP in this chapter using the Multicast book's website 11 OSPF, BGP, Route Manipulation, and IP Define Key Terms Multicast 11 OSPF, BGP, Route Manipulation, and IP Complete the Q&A section Multicast Take practice test in study mode using Exam Bank Practice Test questions for Chapter 11 in practice test software 12 Managing Security Read Foundation Topics 12 Managing Security 12 Managing Security 12 Managing Security 12 Managing Security Practice Test 13 Security Solutions 13 Security Solutions 13 Security Solutions 13 Security Solutions 13 Security Solutions Practice Test 14 Voice and Video Design 14 Voice and Video Design 14 Voice and Video Design 14 Voice and Video Design 14 Voice and Video Design Practice Test 15 Network Management Protocols 15 Network Management Protocols 15 Network Management Protocols 15 Network Management Protocols 15 Network Management Protocols Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter 12 in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter 13 in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank questions for Chapter 14 in practice test software Read Foundation Topics Review Key Topics Complete all memory tables in this chapter using the book's website Define Key Terms Complete the Q&A section Take practice test in study mode using Exam Bank Practice Test questions for Chapter 15 in practice test software Complete questions for all 16 Comprehensive Scenarios scenarios 17 Final Preparation Read chapter 17 Final Preparation Take practice test in study mode for all book questions in practice test software 17 Final Preparation Review all Key Topics in all chapters ... CCDA 200- 310 Official Cert Guide ANTHONY BRUNO, CCIE No 2738 STEVE JORDAN, CCIE No 11293 Cisco Press 800 East 96th Street Indianapolis, IN 46240 www.allitebooks.com ii CCDA 200- 310 Official Cert. .. non-blocking Layer II 5.9.c Layer extension II About the CCDA 200- 310 Official Cert Guide This book maps to the topic areas of the 200- 310 CCDA exam and uses a number of features to help you understand... www.vue.com/cisco/ The CCDA certification is valid for three years To recertify, you can pass a current CCDA test, pass a CCIE exam, or pass any 300 level, 642 level, or Cisco Specialist exam 200- 310 CCDA Exam

Ngày đăng: 09/11/2019, 09:44

TỪ KHÓA LIÊN QUAN