Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

You're reading from  Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Product type Book
Published in Nov 2020
Publisher Packt
ISBN-13 9781800208094
Pages 764 pages
Edition 1st Edition
Languages
Author (1):
Glen D. Singh Glen D. Singh
Profile icon Glen D. Singh

Table of Contents (26) Chapters

Preface 1. Section 1: Network Fundamentals
2. Chapter 1: Introduction to Networking 3. Chapter 2: Getting Started with Cisco IOS Devices 4. Chapter 3: IP Addressing and Subnetting 5. Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization 6. Section 2: Network Access
7. Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels 8. Chapter 6: Understanding and Configuring Spanning-Tree 9. Section 3: IP Connectivity
10. Chapter 7: Interpreting Routing Components 11. Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing 12. Section 4: IP Services
13. Chapter 9: Configuring Network Address Translation (NAT) 14. Chapter 10: Implementing Network Services and IP Operations 15. Section 5: Security Fundamentals
16. Chapter 11: Exploring Network Security 17. Chapter 12: Configuring Device Access Control and VPNs 18. Chapter 13: Implementing Access Control Lists 19. Chapter 14: Implementing Layer 2 and Wireless Security 20. Section 6: Automation and Programmability
21. Chapter 15: Network Automation and Programmability Techniques 22. Chapter 16: Mock Exam 1
23. Chapter 17: Mock Exam 2
24. Assessments 25. Other Books You May Enjoy

Questions

The following is a short list of review questions to help to reinforce your learning and identify which areas you might need to work on:

  1. Which of the following is an example of an intangible asset?

    A. Computer

    B. Operation procedures

    C. Customer

    D. Employee

  2. Ensuring a message is not altered during transmission between a source and destination is referred to as which of the following?

    A. Hashing

    B. Confidentiality

    C. Integrity

    D. Availability

  3. Which of the following best describes a person who doesn't fully understand how to perform hacking techniques but follows the instructions given by real hackers?

    A. Hobbyist

    B. Disgruntled employee

    C. Insider threat

    D. Script kiddie

  4. A hacker is attempting to trick people into clicking a malicious link with a text message. What type of attack is this?

    A. Smishing

    B. Vishing

    C. Phishing

    D. Spear phishing

  5. An attacker decided to compromise a DNS server to redirect all users to a malicious domain in the hope the unsuspecting user...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}