Академический Документы
Профессиональный Документы
Культура Документы
2
Assessment Name
50
Total Marks
50
Pass Percentage
70 %
Duration of Assessment
1 hour 30 minutes
Topic Name
No. of questions
ITIL
Total
25
Essential skill Topics
Topic Name
No. of questions
Total
25
VTP
VTP, VTPv1 and VTPv2 advertisements
Native VLAN
VTP pruning
VTP Server, client and Transparent modes
VTP configurations and troubleshooting
Home
VLAN
Access VLAN and Voice VLAN
Normal VLAN and Extended VLAN
Static VLAN and Dynamic VLAN
VLAN Trunking
VLAN Trunking protocols ISL and 802.1Q
Native VLAN and VLAN filtering
Home
OSI
OSI and TCP/IP models and their associated protocols
Persistence
Routed Protocol stack(TCP/IP) , TCP,UDP,IP,ICMP,ARP/RARP/Proxy-ARP,ETHERNET,FDDI,802.11,HDLC,PPP,FR
Home
STP
STP Operations and functions
STP, RSTP, CST,PVST+ and MST
BPDU,STP ports and STP port status
BPDU, STP Configurations and troubleshooting.
Home
Load Balancers
Installation and Licensing
Virtual Servers and Pools and Load Balancing
Profiles
iRules
Persistence
Health Monitors
SSL Termination and Certificate Management
NATs and SNATs
Home
Security
security threats for modern network infrastructures
Cables, ports, and connectors to connect switches,routers to other network devices and hosts
Mitigation methods for Worm, Virus, and Trojan Horse attacks
Describe the Cisco Self Defending Network architecture
Secure Cisco routers
CDPand DTPoperation modes
Secure administrative access to Cisco routers by configuring multiple privilege levels
Secure administrative access to Cisco routers by configuring role based CLI
Secure the Cisco IOS image and configuration file
Implement AAA on Cisco routers using local router database and external ACS
Explain the functions and importance of AAA
Describe the features of TACACS+ and RADIUS AAA protocols
AAA authentication
AAA authorization
AAA accounting
Mitigate threats to Cisco routers and networks using ACLs
Standard, extended, and named IP ACLs used by routers to filter packets
IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
Configure IP ACLs to prevent IP address spoofing using CLI
Persistence
CHECKPOINT Basics
VPN-1 NGX components and Check Point's Secure Virtual Network Architecture
How to create rules and modify a Security Policy's properties
How to use advanced NGX features to minimize the information-security management burden, when working with
objects and rules
How to use monitoring tools to track, monitor, and account for all connections logged by Check Point components
How to protect organizations from known network attacks and entire categories of emerging or unknown attacks,
using SmartDefense
How to use private IP-address allocation and unregistered internal addressing schemes, to overcome IP addressing
limitations
How to identify and address NGX security issues, including encryption and Virtual Private Networks
How to verify the identity of users logging in to NGX, using NGX authentication schemes
How to implement LDAP, and integrate it with NGX SmartCenter Server
How to back up critical files and directories, for availability and timely recovery of Security Gateways and
SmartCenter Servers
Home
WIRELESS
WLAN fundamentals
Basics of spread spectrum technology (modulation, DSS, OFDM, MIMO, Channels reuse and overlap, Rate-shifting,
CSMA/CA)
Wireless regulatory bodies, standards and certifications (FCC, ETSI, 802.11a/b/g/n, WiFi Alliance)
WLAN RF principles (antenna types, RF gain/loss, EIRP, refraction, reflection, ETC)
Networking technologies used in wireless (SSID --> WLAN_ID --> Interface -- >VLAN, 802.1q trunking)
Wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh, bridging)
802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, AES)
Frame types (associated/unassociated, management, control, data)
Basic WLAN Security
framework of wireless security and security components (authentication, encryption, MFP, IPS)
Authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS, EAP-FAST, PEAP, LEAP)
Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)
Describe and configure the different sources of authentication (PSK, EAP-local or -external, Radius)
Configure authentication and encryption methods on a WLAN (WPA/WPA2 with PSK and 802.1x)
Implement wireless Guest networking
Home
LAN
LAN Topologies
Cables, ports, and connectors to connect switches, routers to other network devices and hosts
Home
Network Basics
OSI and TCP/IP models and their associated protocols
Application, presentation, session, transport, network, datalink and physical layer functions.
CDP and DTP operation modes
Home
Routing
Basic routing concepts ( packet forwarding, router lookup process)
Operation of Cisco routers ( router bootup process, POST, router components)
Cables, ports, and connectors to connect routers to other network devices and hosts
Device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
Router and switch IOS configuration files(save, edit, upgrade, restore)
Static or Default routing
Home
SWITCHING
Network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig),
SHOW & DEBUG commands
STP, RSTP, VLAN,VTP,VLAN Trunking protocols 802.1Q and ISL
Switch-port security
DTP and CDP messages
SVI and routing interfaces
Home
WAN
HDLC
PPP, PPP-PAP and PPP-CHAP
Frame Relay on Cisco routers
Network Address Translation(NAT) and Access-lists(ACL)
Types of ACLs
Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
Verify and monitor ACLs in a network environment
Troubleshoot ACL issues
Explain the basic operation of NAT
Configure NAT for given network requirements
Troubleshoot NAT issues
Home
Home
ISDN
ISDN B and D channels
ISDN PRI and BRI interfaces
ISDN layer-2 and layer-3 protocols stack
ISDN configuration and troubleshooting
Home
IP Address Basics
IP Addressing and Subnet mask
Cables, ports, and connectors to connect switches, routers to other network devices and hosts
IP Address classes and ranges
DHCP and DNS
DHCP and DNS operation on a router
VLSM IP addressing design to a network
CDP and DTP operation modes
Home