Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

You're reading from  Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Product type Book
Published in Nov 2020
Publisher Packt
ISBN-13 9781800208094
Pages 764 pages
Edition 1st Edition
Languages
Author (1):
Glen D. Singh Glen D. Singh
Profile icon Glen D. Singh

Table of Contents (26) Chapters

Preface 1. Section 1: Network Fundamentals
2. Chapter 1: Introduction to Networking 3. Chapter 2: Getting Started with Cisco IOS Devices 4. Chapter 3: IP Addressing and Subnetting 5. Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization 6. Section 2: Network Access
7. Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels 8. Chapter 6: Understanding and Configuring Spanning-Tree 9. Section 3: IP Connectivity
10. Chapter 7: Interpreting Routing Components 11. Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing 12. Section 4: IP Services
13. Chapter 9: Configuring Network Address Translation (NAT) 14. Chapter 10: Implementing Network Services and IP Operations 15. Section 5: Security Fundamentals
16. Chapter 11: Exploring Network Security 17. Chapter 12: Configuring Device Access Control and VPNs 18. Chapter 13: Implementing Access Control Lists 19. Chapter 14: Implementing Layer 2 and Wireless Security 20. Section 6: Automation and Programmability
21. Chapter 15: Network Automation and Programmability Techniques 22. Chapter 16: Mock Exam 1
23. Chapter 17: Mock Exam 2
24. Assessments 25. Other Books You May Enjoy

Questions

The following is a short list of review questions to help reinforce your learning and help you identify areas that require some improvement:

  1. Which of the following is a type of malware that is designed to encrypt your data?

    A. Worm

    B. Ransomware

    C. Polymorphic

    D. Trojan

  2. A security professional implements multiple security components to improve the security posture of the organization. What is the security professional trying to do?

    A. Install anti-malware on all devices.

    B. Install host-based firewalls on all end devices.

    C. Implement email security.

    D. Implement Defense in Depth.

  3. A threat actor is attempting to force a switch to flood all its inbound traffic out of all other ports. What type of attack is the threat actor performing?

    A. IP spoofing

    B. CAM table overflow

    C. Man-in-the-middle

    D. ARP spoofing

  4. Another attacker is attempting to gain unauthorized access to a VLAN. What type of attack is being performed by the attacker?

    A. An 802.1Q attack

    B. A DTP attack

    C...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}