CCNA SYLLABUS PDF
Cisco Systems, Inc. This document is Cisco Public. Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite . Exam Description: The Interconnecting Cisco Networking Devices Part 2 exam ( ) is a minute, 45–55 question assessment that is associated with the . Scope Of CCNA in India and Salary. Every IT students AND graduate engineers need CCNA Course for High paying Job in INDIA, USA AND Dubai. Provides Cisco CCNA, CCNP, CCIE Training Institute with 24*7 Lab Access.
|Language:||English, Spanish, Japanese|
|Genre:||Politics & Laws|
|ePub File Size:||26.36 MB|
|PDF File Size:||19.86 MB|
|Distribution:||Free* [*Register to download]|
For More Details Call + / Email ID – [email protected] CCNA/CCNP Course Details. By Besant Technologies. Course Name. CCNA/. The CCNA exam is the composite exam associated with the www. yazik.info CCNA Syllabus pdf. Notes: 1) The intention of this basic path through CCNA 1 is: to engage beginning students in the field of networking; to master certain basic.
The datagram are transported through network using these protocols. They each resemble some function like. It determines how to route message on the network. Likewise, you will have ICMP protocol. It is responsible for diagnostic functions and reporting errors due to the unsuccessful delivery of IP packets.
The ARP or Address Resolution Protocol is responsible for the resolution of the Internet layer address to the Network Interface layer address such as a hardware address. The image below shows the format of an IP address. It is responsible for providing the Application layer with session and datagram communication services. TCP is responsible for the sequencing, and acknowledgment of a packet sent.
It also does the recovery of packet lost during transmission. Packet delivery through TCP is more safe and guaranteed. UDP is used when the amount of data to be transferred is small. It does not guarantee packet delivery. Network Segmentation Network segmentation implicates splitting the network into smaller networks. It helps to split the traffic loads and improve the speed of the Internet. Network Segmentation can be achieved by following ways, By implementing DMZ demilitarised zones and gateways between networks or system with different security requirements.
By implementing DSD evaluated cross-domain solutions where necessary Why Network Segmentation is important Network Segmentation is important for following reasons, Improve Security- To protect against malicious cyber attacks that can compromise your network usability.
To detect and respond to an unknown intrusion in the network Isolate network problem- Provide a quick way to isolate a compromised device from the rest of your network in case of intrusion.
Segmentation is done based on the factors such as project team, function or application, irrespective of the physical location of the user or device. A group of devices connected in a VLAN act as if they are on their own independent network, even if they share a common infrastructure with other VLANs. The popular device used for segmenting are a switch, router, bridge, etc. Subnetting Subnets are more concerned about IP addresses. Subnetting is primarily a hardware-based, unlike VLAN, which is software based.
A subnet is a group of IP address. It can reach any address without using any routing device if they belong to the same subnet.
Few things to consider while doing network segmentation Proper user authentication to access the secure network segment ACL or Access lists should be properly configured Access audit logs Anything that compromises the secure network segment should be checked- packets, devices, users, application, and protocols Keep watch on incoming and outgoing traffic Security policies based on user identity or application to ascertain who has access to what data, and not based on ports, IP addresses, and protocols Do not allow the exit of cardholder data to another network segment outside of PCI DSS scope.
Packet Delivery Process So far we have seen different protocols, segmentation, various communication layers, etc. Now we are going to see how the packet is delivered across the network.
The process of delivering data from one host to another depends on whether or not the sending and receiving hosts are in the same domain. A packet can be delivered in two ways, A packet destined for a remote system on a different network A packet destined for a system on the same local network If the receiving and sending devices are connected to the same broadcast domain, data can be exchanged using a switch and MAC addresses.
But if the sending and receiving devices are connected to a different broadcast domain, then the use of IP addresses and the router is required.
CCNACourseStructure.pdf - CCNA Syllabus CCNA Routing
Suppose host A wants to send a packet to host B. Since at layer 2 packets are sent with MAC address as the source and destination addresses. Intrasegment packet routing If a packet is destined for a system on the same local network, which means if the destination node are on the same network segment of the sending node. The sending node addresses the packet in the following way. The node number of the destination node is placed in the MAC header destination address field. The node number of the sending node is placed in the MAC header source address field The full IPX address of the destination node is placed in the IPX header destination address fields.
Layer 3 Packet delivery To deliver an IP packet across a routed network, it requires several steps. For instance, if host A wants to send a packet to host B it will send the packet in this ways Host A sends a packet to its "default gateway" default gateway router. To send a packet to the router, host A requires to know the Mac address of the router For that Host A sends an ARP request asking for the Mac address of the Router This packet is then broadcast on the local network.
It responds back with the Mac address of the default router to Host A. It can send an IP packet with a destination address of Host B. Now, default router will send a packet to Host B Intersegment packet routing In the case where two nodes residing on different network segments, packet routing will take place in the following ways. In the first packet, in the MAC header place the destination number "20" from the router and its own source field "01".
While in the second packet, in the MAC header place the destination number as "02" and source as "21" from the router. Wireless Local Area Networks Wireless technology was first introduced in the 90's. It is used to connect devices to a LAN. Technically it is referred as One router is elected to handle all requests sent to the virtual IP address.
With HSRP, this is the active router. An HSRP group has one active router and at least one standby router. Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? Run POST to check hardware 2. Search for a configuration file all the configurations applied to this router Which three characteristics are representative of a link-state routing protocol?
Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached? If any other device is detected, the port is to drop frames from this device. Which two of these changes are necessary for SwitchA to meet the requirements? Which three statements about static routing are true? What are the address that will show at the show ip route if we configure the above statements? Choose Three. Which feature facilitates the tagging of frames on a specific VLAN?
Which of the following is needed to be enable back the role of active in HSRP? Which command is used to show the interface status of a router? Which of the following privilege level is the most secured? Level 15 users can execute all commands and this is the most secured and powerful privilege level.
However, there are actually 16 privilege levels available on the CLI, from 0 to 15 and you can assign users to any of those levels. Zero-level access allows only five commands -logout, enable, disable, help, and exit.
User level level 1 provides very limited read-only access to the router, and privileged level level 15 provides complete control over the router. The basic idea of Anycast is very simple: The routing infrastructure sends IP packets to the nearest server according to the metric of the routing protocol used. The major benefits of employing Anycast in IPv4 are improved latency times, server load balancing, and improved security.
Choose Two. What to do when the router password was forgotten? It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address. In this case it is the interface of HOME router. In reality a VPN still runs on a shared infrastructure and is not secured if not encrypted. VPNs are used over a connection you already have.
That might be a leased line.
It might be an ADSL connection. It could be a mobile network connection. How do you configure a hostname? Switch-1 needs to send data to a host with a MAC address of 00b0. What will Switch-1 do with this data? The reason is that unlike the routing-by-rumor approach of distance vector, link state routers have firsthand information from all their peer routers.
Each router originates information about itself, its directly connected links, and the state of those links hence the name. This information is passed around from router to router, each router making a copy of it, but never changing it.
Get FREE access by uploading your study materials
The ultimate objective is that every router has identical information about the internetwork, and each router will independently calculate its own best paths. What field is consist of 6 bytes in the field identification frame in IEEE The SA field is the source address field.
The field should be set to the MAC address of the switch port that transmits the frame. It is a bit value 6 bytes. The receiving device may ignore the SA field of the frame. In fact there is another correct answer for this question: DA Destination Address which also consists of 6 bytes.
Maybe there is a mistake or typo in this question. Which statement a. A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used? Which command is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? But notice that console connections on a serial cable do have logging enabled by default.
Download PDF File below: All interfaces in an EtherChannel must be configured identically to form an EtherChannel. Specific settings that must be identical include: It lists many facts, including the link-local IPv6 address of the router.
Normally, it is sent to the all-IPv6-hosts local-scope multicast address of FF The idea behind MST is that some VLANs can be mapped to a single spanning tree instance because most networks do not need more than a few logical topologies.
Follow these guidelines when configuring port security: In cut-through switching, the switch copies into its memory only the destination MAC address first six bytes of the frame of the frame. After processing these first six bytes, the switch had enough information to make a forwarding decision and move the frame to the appropriate switchport.
This switching method is faster than store-and-forward switching method. Below is an example of the output of this command. In this case we use two rules: Host A Answer C is not correct as host B can ping other two hosts. There are various reasons for the interface to go into errdisable.
The reason can be: Because the ip subnet-zero command is used, network To enable it on Cisco devices, we have to use this command under global configuration mode: Sw config lldp run. The switches compare their Bridge ID with each other to find out who will be the root bridge.
The root bridge is the bridge with the lowest bridge ID. Below is the list of common kinds of IPv6 addresses: Loopback address:: An example of the output of this command is shown below: Below are the cost values you should memorize: Below summaries all the port roles of these switches: Alternative Port blocking state.
CEF is made up of two different main components: These are automatically updated at the same time as the routing table. The service password-encryption command will encrypt all current and future passwords so any password existed in the configuration will be encrypted. Although all above answers are correct but In short, when powered on the router needs to do: Search for a configuration file all the configurations applied to this router.
CCNA Syllabus PDF - Sansbound - The Networking School
The picture below shows all configuration needed for PPPoE: An address conflict occurs when two hosts use the same IP address. If a conflict is detected, the address is removed from the pool.
The address will not be assigned until the administrator resolves the conflict. To enable Port security feature, we must enable it on that interface first with the command: It is best used for small-scaled places where there are a few routers only.With your CCNA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by the leader in Network Technologies.
Technically it is referred as What is the level of difficulty for this course?
Ccna Certification Books
Verify network status and switch operation using basic utilities such as ping, telnet and ssh. But host B Refer to the exhibit. Chapter 3: It can reach any address without using any routing device if they belong to the same subnet. CCNA Tutorial - http: