Book Image

Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

By : Glen D. Singh
Book Image

Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

By: Glen D. Singh

Overview of this book

In the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you’ll discover how they are used to build and improve an enterprise network. You’ll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures. By the end of this book, you’ll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions.
Table of Contents (26 chapters)
1
Section 1: Network Fundamentals
6
Section 2: Network Access
9
Section 3: IP Connectivity
12
Section 4: IP Services
15
Section 5: Security Fundamentals
20
Section 6: Automation and Programmability
22
Chapter 16: Mock Exam 1
23
Chapter 17: Mock Exam 2

Questions

The following is a short list of review questions to help to reinforce your learning and identify which areas you might need to work on:

  1. Which of the following is an example of an intangible asset?

    A. Computer

    B. Operation procedures

    C. Customer

    D. Employee

  2. Ensuring a message is not altered during transmission between a source and destination is referred to as which of the following?

    A. Hashing

    B. Confidentiality

    C. Integrity

    D. Availability

  3. Which of the following best describes a person who doesn't fully understand how to perform hacking techniques but follows the instructions given by real hackers?

    A. Hobbyist

    B. Disgruntled employee

    C. Insider threat

    D. Script kiddie

  4. A hacker is attempting to trick people into clicking a malicious link with a text message. What type of attack is this?

    A. Smishing

    B. Vishing

    C. Phishing

    D. Spear phishing

  5. An attacker decided to compromise a DNS server to redirect all users to a malicious domain in the hope the unsuspecting user...