1. Explain the role and function of network components 7 Items
- Routers
- L2 and L3 switches
- Next-generation firewalls and IPS
- Access points
- Controllers (Cisco DNA Center and WLC)
- Endpoints
- Servers
2. Describe characteristics of network topology architectures 6 Items
- 2 tier
- 3 tier
- Spine-leaf
- WAN
- Small office/home office (SOHO)
- On-premises and cloud
3. Compare physical interface and cabling types 3 Items
- Single-mode fiber, multimode fiber, copper
- Connections (Ethernet shared media and point-to-point)
- Concepts of PoE
4. Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed) 0 Items
5. Compare TCP to UDP 0 Items
6. Configure and verify IPv4 addressing and subnetting 0 Items
7. Describe the need for private IPv4 addressing 0 Items
8. Configure and verify IPv6 addressing and prefix 0 Items
9. Compare IPv6 address types 6 Items
- Global unicast
- Unique local
- Link local
- Anycast
- Multicast
- Modified EUI 64
10. Verify IP parameters for Client OS (Windows, Mac OS, Linux) 0 Items
11. Describe wireless principles 4 Items
- Nonoverlapping Wi-Fi channels
- SSID
- RF
- Encryption
12. Explain virtualization fundamentals (virtual machines) 0 Items
13. Describe switching concepts 4 Items
- MAC learning and aging
- Frame switching
- Frame flooding
- MAC address table
1. Configure and verify VLANs (normal range) spanning multiple switches 3 Items
- Access ports (data and voice)
- Default VLAN
- Connectivity
2. Configure and verify interswitch connectivity 3 Items
- Trunk ports
- 802.1Q
- Native VLAN
3. Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP) 0 Items
4. Configure and verify (Layer 2/Layer 3) EtherChannel (LACP) 0 Items
5. Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations 3 Items
- Root port, root bridge (primary/secondary), and other port names
- Port states (forwarding/blocking)
- PortFast benefits
6. Compare Cisco Wireless Architectures and AP modes 0 Items
7. Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG) 0 Items
8. Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS) 0 Items
9. Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings 0 Items
- Global unicast
- Unique local
- Link local
- Anycast
- Multicast
- Modified EUI 64
1. Interpret the components of routing table 6 Items
- Routing protocol code
- Prefix
- Network mask
- Next hop
- Administrative distance
- Metric
- Gateway of last resort
2. Determine how a router makes a forwarding decision by default 3 Items
- Longest match
- Administrative distance
- Routing protocol metric
3. Configure and verify IPv4 and IPv6 static routing 4 Items
- Default route
- Network route
- Host route
- Floating static
4. Configure and verify single area OSPFv2 4 Items
- Neighbor adjacencies
- Point-to-point
- Broadcast (DR/BDR selection)
- Router ID
5. Describe the purpose of first hop redundancy protocol 0 Items
- 1. Configure and verify inside source NAT using static and pools
- 2. Configure and verify NTP operating in a client and server mode
- 3. Explain the role of DHCP and DNS within the network
- 4. Explain the function of SNMP in network operations
- 5. Describe the use of syslog features including facilities and levels
- 6. Configure and verify DHCP client and relay
- 7. Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- 8. Configure network devices for remote access using SSH
- 9. Describe the capabilities and function of TFTP/FTP in the network
- 1. Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- 2. Describe security program elements (user awareness, training, and physical access control)
- 3. Configure device access control using local passwords
- 4. Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- 5. Describe remote access and site-to-site VPNs
- 6. Configure and verify access control lists
- 7. Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- 8. Differentiate authentication, authorization, and accounting concepts
- 9. Describe wireless security protocols (WPA, WPA2, and WPA3)
- 10. Configure WLAN using WPA2 PSK using the GUI
1. Explain how automation impacts network management 0 Items
2. Compare traditional networks with controller-based networking 0 Items
3. Describe controller-based and software defined architectures (overlay, underlay, and fabric) 2 Items
- Separation of control plane and data plane
- North-bound and south-bound APIs
4. Compare traditional campus device management with Cisco DNA Center enabled device management 0 Items
5. Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding) 0 Items
6. Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible 0 Items
7. Interpret JSON encoded data 0 Items