CCENT Exam Prep (Exam 640-822)
Author: Jeremy Cioara
Your Complete Certification Solution
In this book you'll learn how to:
- Understand the foundations of network communication as described in the OSI and TCP/IP models
- Accurately design and troubleshoot networks using IP subnetting skills
- Understand the operational components and models of Cisco® routers and switches
- Perform basic navigation and configurations using Cisco IOS® Software and Cisco Secure Device Manager
- Apply techniques to secure networks
- Implement and troubleshoot Distance Vector (RIPv2) routing protocols
- Implement and troubleshoot NAT, DHCP, and DNS operation on a router
- Implement and secure wireless LANs (WLANs)
- Implement and verify basic WAN links
CD Features New Simulation Questions!
The CD features innovative testing software powered by MeasureUp, an electronic copy of the book, and 75 minutes of video instruction that highlight five scenarios to help prepare for simlet questions on the new exams. The MeasureUp testing software gives you an effective tool to assess your readiness for the ICND1 exam:
- Detailed explanations of correct and incorrect answers
- Multiple test modes
- Random questions and order of answers
- Coverage of all CCENT™ ICND1 exam objectives
Table of Contents:
Cisco ICND1 Exam Objectives xxv Exam Description xxv Exam Topics xxv Describe the operation of data networks xxv Implement a small switched network xxv Implement an IP addressing scheme and IP services to meet network requirements for a small branch office xxvi Implement a small routed network xxvi Explain and select the appropriate administrative tasks required for a WLAN xxvii Identify security threats to a network and describe general methods to mitigate those threats xxvii Implement and verify WAN links xxvii Introduction 1 How This Book Helps You 1 Network Hardware and Software Requirements 3 Advice on Taking the Exam 4 Chapter 1: Standard Internetworking Models 7 Introduction 10 What Is an Internetwork? 10 Types of Internetworks 11 Local Area Network (LAN) 11 Metropolitan Area Network (MAN) 12 Wide Area Network (WAN) 12 Storage Area Network (SAN) 13 Virtual Private Network (VPN) 14 Open Systems Interconnection (OSI) Model 14 Upper Layers 15 Application Layer 15 Presentation Layer 17 Session Layer 18 Lower Layers 18 Transport Layer 18 Network Layer 20 Data Link Layer 21 Physical Layer 23 OSI Layered Communications 23 TCP/IP Model 25 Application Layer 26 Transport Layer 27 Internet Layer 31 Network Interface Layer 33 Cisco 3-Layer Hierarchical Model 33 Access Layer 34 Distribution Layer 35 Core Layer 35 Chapter Summary 37 Key Terms 37 Apply Your Knowledge 40 Exercises 40 Review Questions 41 Exam Questions 41 Answers to Review Questions 45 Answers to Exam Questions 47 Suggested Readings and Resources 49 Chapter 2: Physical Layer Networking Concepts 51 Introduction 54 Network Topologies 54 The Bus Topology 54 The Ring Topology 55 The Star Topology 56 The Mesh Topology 57 Cabling 58 Coaxial Cable 59 Twisted-Pair Cable 60 Fiber-Optic Cable 63 Wireless 64 Wireless Fidelity (Wi-Fi) 65 Infrared 65 Bluetooth 66 Physical Layer Devices 66 Repeaters 66 Hubs 67 Network Interfaces 67 Chapter Summary 68 Key Terms 68 Apply Your Knowledge 69 Exercises 69 Review Questions 70 Exam Questions 70 Answers to Review Questions 77 Answers to Exam Questions 77 Suggested Readings and Resources 79 Chapter 3: Data Link Networking Concepts 81 Introduction 84 Data Link Protocols 84 Token Ring 84 FDDI 86 Ethernet at the Data Link Layer 87 Physical Ethernet Standards 93 Ethernet 93 Fast Ethernet 96 Gigabit Ethernet 97 10-Gigabit Ethernet (10GbE) 99 Long Reach Ethernet 100 Data Link Layer Devices 100 Bridges 101 Switches 104 Duplex 105 Microsegmentation 106 Chapter Summary 107 Key Terms 107 Apply Your Knowledge 109 Exercises 109 Review Questions 110 Exam Questions 110 Answers to Review Questions 114 Answers to Exam Questions 115 Suggested Readings and Resources 117 Chapter 4: General Network Security 119 Introduction 122 Classes of Attack 122 Access Attacks 123 Reconnaissance Attacks 125 Denial of Service (DoS) Attacks 127 Mitigating Network Threats 130 AAA 130 Cisco ACLs 130 Cisco IOS Secure Management Features 131 Encryption Protocols 132 Security Appliances and Applications 132 Chapter Summary 134 Key Terms 134 Apply Your Knowledge 135 Exercise 135 Review Questions 136 Exam Questions 136 Answers to Review Questions 138 Answers to Exam Questions 138 Suggested Readings and Resources 139 Chapter 5: IP at the Network Layer 141 Introduction 144 Network Layer Functions 144 IP Addressing and Formats 145 Binary 145 Hexadecimal 150 IP Address Classes 151 Subnet Masks 154 Private (RFC 1918) Addressing 156 Subnetting IP 156 Calculating Hosts in a Subnet 159 Calculating Networks in a Subnet 161 The Increment 162 Determining the Range of Valid IPs 165 Network Layer Devices 167 Routers 167 Layer 3 Switches 170 Chapter Summary 171 Key Terms 171 Apply Your Knowledge 172 Exercises 172 Review Questions 175 Exam Questions 175 Answers to Review Questions 179 Answers to Exam Questions 181 Suggested Readings and Resources 183 Chapter 6: Introduction to Cisco Routers and Switches 185 Introduction 188 Interfaces and Modules 188 LAN Interfaces 188 WAN Interfaces 189 Cisco Memory Components 192 ROM 193 Flash 193 RAM 193 NVRAM 193 Cisco Internetworking Operating System 193 Feature Sets 194 IOS Image File Naming 195 Cisco Router Models and Features 196 Cisco Switch Models and Features 197 Chapter Summary 199 Key Terms 199 Apply Your Knowledge 200 Exercises 200 Review Questions 200 Exam Questions 201 Answers to Review Questions 203 Answers to Exam Questions 204 Suggested Readings and Resources 205 Chapter 7: Foundation Cisco IOS Operations 207 Introduction 210 Terminal Options 210 Console Port 210 Auxiliary Port 212 Telnet 212 HTTP and HTTPS 212 SSH 213 Router/Switch Startup Procedures 214 POST 214 Bootstrap 215 IOS Loading 215 Configuration Loading 217 Navigating the IOS 220 User EXEC 220 Privileged EXEC 221 Global Configuration 222 Context-Sensitive Help 224 Abbreviations 226 Shortcut Keys 226 Common Syntax Errors 227 Chapter Summary 230 Key Terms 231 Apply Your Knowledge 231 Exercises 231 Review Questions 233 Exam Questions 233 Answers to Review Questions 235 Answers to Exam Questions 236 Suggested Readings and Resources 237 Chapter 8: Foundation Cisco Configurations 239 Introduction 242 Global Configuration 242 Altering the Boot Sequence 242 Changing the Hostname 244 Creating a Login Banner 244 Assigning a Password for Privileged EXEC Mode 245 Domain Name—Specific Commands 246 Enabling SSH 247 Line Configurations 248 Securing Console Access to User EXEC 248 Securing Auxiliary Access to User EXEC 250 Securing Telnet and SSH Access to User EXEC 250 Router Interface Configurations 253 Assigning an IP Address 254 Enabling the Interface 255 LAN-Specific Commands 255 WAN-Specific Commands 256 Saving Configurations 256 Using the show Command to Get Information 258 Verifying Your Configurations 259 Viewing Interface Statuses and Statistics 260 IOS File Version show Commands 264 Troubleshooting Commands 266 Backing Up and Restoring Configurations and IOS Using TFTP 269 Neighbor Discovery with CDP 272 Using Telnet for Virtual Terminal Access 276 Terminal Monitor 277 IOS DHCP 278 Chapter Summary 281 Key Terms 282 Apply Your Knowledge 284 Exercises 284 Review Questions 285 Exam Questions 286 Answers to Review Questions 289 Answers to Exam Questions 290 Suggested Readings and Resources 291 Chapter 9: Understanding the Cisco SDM 293 Introduction 296 Getting Started 296 Global Configurations 298 Changing the Hostname, Banner, Domain Name, and Secret Password 299 Router Access 303 DNS 304 DHCP 305 Router Interface Configurations 308 Assigning an IP Address 308 Enabling the Interface 309 Saving and Verifying Your Configurations 310 Monitoring 310 Chapter Summary 312 Key Terms 312 Apply Your Knowledge 312 Exercise 312 Review Questions 312 Exam Questions 313 Answers to Review Questions 315 Answers to Exam Questions 316 Suggested Readings and Resources 316 Chapter 10: Introduction to Routing and Routing Protocols 317 Introduction 320 The Default Gateway 320 Verifying and Troubleshooting the Default Gateway 322 Routing Sources 323 Administrative Distance 324 Static Routes 325 Configuring Static Routes 326 Floating Static Routes 327 Default Routes 328 Configuring Static and Default Routes with SDM 329 Verifying Static and Default Routes 330 Dynamic Routing Protocols 331 Routing Metrics 332 Classful and Classless Routing Updates 333 VLSM 336 Interior and Exterior Gateway Routing Protocols 340 Distance Vector Routing Protocols 340 Link-State Routing Protocols 341 Advanced Distance Vector/Hybrid Routing Protocols 341 The Routing Table Revisited 342 Routing Redistribution 343 Chapter Summary 345 Key Terms 346 Apply Your Knowledge 347 Exercises 347 Review Questions 348 Exam Questions 348 Answers to Review Questions 351 Answers to Exam Questions 351 Suggested Readings and Resources 353 Chapter 11: Distance Vector Routing Protocols 355 Introduction 358 Distance Vector Operations 358 Routing Loops 360 Routing Loop Mitigation 362 Counting to Infinity 363 Split Horizon 363 Route Poison, Poison Reverse, and Hold-Down Timers 364 Triggered Updates 366 Invalid/Dead Timers 367 RIP 367 RIP Characteristics 367 RIP Configuration 368 Passive Interfaces 371 RIPv2 Characteristics 371 RIPv2 Configuration 372 Configuring RIP with SDM 373 RIP Verification 374 Troubleshooting RIP 375 Chapter Summary 379 Key Terms 380 Apply Your Knowledge 380 Exercises 380 Review Questions 382 Exam Questions 382 Answers to Review Questions 384 Answers to Exam Questions 385 Suggested Readings and Resources 386 Chapter 12: Enabling Internet Connectivity with NAT 387 Introduction 390 NAT Concepts 391 Static NAT 392 Dynamic NAT 393 NAT Overload and Port Address Translation 394 NAT Terminology 395 Configuring NAT Using Cisco SDM 397 Configuring NAT Overload 397 Verifying NAT Configuration 410 Troubleshooting NAT 413 Chapter Summary 415 Key Terms 415 Review Questions 416 Apply Your Knowledge 416 Exam Questions 416 Answers to Review Questions 419 Answers to Exam Questions 419 Suggested Reading and Resources 421 Chapter 13: Foundation Switching Operations 423 Introduction 426 Switching Functionality 426 Frame Transmission Methods 427 Store-and-Forward 428 Cut-Through 428 Fragment-Free 428 Half- and Full-Duplex Connections 429 Switching Design 430 Spanning Tree Protocol 430 Root Bridge 431 Root Ports 432 Designated Ports 434 Blocked Ports 435 Port State Transitions 437 Initial Switch Configurations 438 Assigning a Management IP Address to a Switch 439 Defining a Default Gateway 439 IP Assignment Using DHCP 440 Configuring Multiple Switch Interfaces 441 Verifying Spanning Tree Protocol 442 Troubleshooting Basic Switch Connectivity 442 Chapter Summary 445 Key Terms 445 Apply Your Knowledge 446 Exercises 446 Review Questions 448 Exam Questions 449 Answers to Review Questions 452 Answers to Exam Questions 452 Suggested Readings and Resources 454 Chapter 14: Implementing Switch Security 455 Introduction 458 Securing Physical Access to the Catalyst Switch 458 Securing Terminal Access to the Catalyst Switch 458 To Telnet or Not to Telnet 460 Additional IOS Security Practices 461 Layer 2 Security 461 Port Security 462 “See”DP 464 Chapter Summary 466 Key Terms 466 Apply Your Knowledge 467 Exercises 467 Review Questions 469 Exam Questions 469 Answers to Review Questions 471 Answers to Exam Questions 472 Suggested Readings and Resources 472 Chapter 15: Understanding Wireless Networking 473 Introduction 476 The Business Case 476 The Players in the 802.11 Market 477 Entering the Radio Frequency World 478 Understanding Wireless Transmission 478 Unlicensed RF Bands 479 The Key to Successful Wireless: Channel Surfing 480 The 802.11 Standards Family 483 Party Like It’s 1999: 802.11a and 802.11b 483 2003 Delivers: 802.11g 483 The Next Generation: 802.11n 484 Chapter Summary 485 Key Terms 485 Apply Your Knowledge 486 Exercise 486 Review Questions 486 Exam Questions 487 Answers to Review Questions 489 Answers to Exam Questions 489 Suggested Readings and Resources 490 Chapter 16: Wireless Security and Implementation Considerations 491 Introduction 494 Understanding the Threats 494 War Driving 494 Direct Hacking 495 Employee Ignorance 495 Deploying a Secure Wireless Network 496 Wireless Encryption 496 Wireless Authentication (802.1x) 499 Wireless Intrusion Prevention System (IPS) 500 Wireless Implementation Guidelines 501 Understanding Wireless Topologies 501 Understanding Wireless Data Rates 503 General Wireless Implementation Steps 506 Wireless Troubleshooting 506 Chapter Summary 508 Key Terms 508 Apply Your Knowledge 509 Review Questions 509 Exam Questions 509 Answers to Review Questions 512 Answers to Exam Questions 512 Suggested Readings and Resources 513 Chapter 17: Wide Area Network Connections 515 See also: Design to Sell Using Microsoft Publisher to Inform Motivate and Persuade or Visio 2007 Bible Mastering VBA
Author: Guy Hart Davis
Curious to learn how to write macros, automate Office applications, or create custom applications in Word, Excel, PowerPoint, Outlook or Access? With this comprehensive guide to Visual Basic for Applications (VBA), you can master the language that underlines the Microsoft Office products. Revised for the new versions of the language and the Office suite, this book is completely up-to-date. Aimed at everyone from power users to system administrators and professional developers, it covers all Office products in depth. You'll discover that VBA is easily accessible by novice programmers, yet powerful enough for IT professionals who need to create specialized business applications.