CCNA Exam Prep : Exam 640-802: Your Complete Certification Solution
, by Cioara, Jeremy; Minutella, David; Stevenson, Heather- ISBN: 9780789737137 | 0789737132
- Cover: Paperback
- Copyright: 12/18/2007
Jeremy Cioara (CCIE, CCVP, CCSP) works in many facets of the Cisco networking realm. As an author, he has written multiple books for Cisco Press and Exam Cram. As an instructor, he teaches at Interface Technical Training (www.interfacett.com) in Phoenix, Arizona. Likewise, Jeremy has recorded many E-Learning titles at CBTNuggets (www.cbtnuggets.com). Finally, Jeremy is the CIO of AdTEC Networks and works as a network consultant focusing on Cisco network and Voice over IP (VoIP) implementations. What’s more, Jeremy also runs the Cisco Blog (www.ciscoblog.com) in his “free time.” Thankfully, he is married to the Certified Best Wife in the World (CBWW) who helps him manage his time and priorities and prevents him from getting an enormous Cisco-logo tattooed across his chest.
Dave Minutella (CCNP, CCDP, INFOSEC, CISSP, CTP, MCSA, MCDST, Security+, Network+, A+) has been working in the IT and telecom industry for over 14 years. He currently serves as Vice President of Educational Services for Training Camp. Before that, he was the lead Cisco instructor, primarily teaching CCNA, CCDA, and CCNP courses. Dave is also the technical author of CSVPN Exam Cram 2from Que Publishing and is the present Cisco certifications expert for SearchNetworking.com’s Ask the Networking Expert panel.
Heather Stevenson (CCNP) has over 7 years of experience in the IT industry and is currently a senior network engineer at a global manufacturing company. She has written a number of technical training guides and mentored fellow IT professionals throughout her career. When she is not working, Heather still loves spending time with her network of friends and family.
Introduction | |
Standard Internetworking Models | |
Introduction | |
What Is an Internetwork? | |
Types of Internetworks | |
Local Area Network (LAN) | |
Metropolitan Area Network (MAN) | |
Wide Area Network (WAN) | |
Storage Area Network (SAN) | |
Virtual Private Network (VPN) | |
Open Systems Interconnection (OSI) | |
Model | |
Upper Layers | |
Application Layer | |
Presentation Layer | |
Session Layer | |
Lower Layers | |
Transport Layer | |
Network Layer | |
Data Link Layer | |
Physical Layer | |
OSI Layered CommunicationsTCP/IP Model | |
Application Layer | |
Transport Layer | |
Internet Layer | |
Network Interface Layer | |
Cisco 3-Layer Hierarchical Model | |
Access Layer | |
Distribution Layer | |
Core Layer | |
Chapter Summary | |
Key Terms | |
Apply Your Knowledge | |
Exercise | |
Review Questions | |
Exam Questions | |
Answers to Review Questions | |
Answers to Exam Questions | |
Suggested Readings and Resources | |
Physical Layer Networking Concepts | |
Introduction | |
Network Topologies | |
The Bus Topology | |
The Ring Topology | |
The Star Topology | |
The Mesh Topology | |
Cabling | |
Coaxial Cable | |
Twisted-Pair Cable | |
Fiber-Optic Cable | |
Wireless | |
Wireless Fidelity (Wi-Fi) | |
Infrared | |
Bluetooth | |
Physical Layer Devices | |
Repeaters | |
Hubs | |
Network Interfaces | |
Chapter Summary | |
Key Terms | |
Apply Your Knowledge | |
Exercise | |
Review Questions | |
Exam Questions | |
Answers to Review Questions | |
Answers to Exam Questions | |
Suggested Readings and Resources | |
Data Link Networking Concepts | |
Introduction | |
Data Link Protocols | |
Token Ring | |
FDDIEthernet at the Data Link Layer | |
Physical Ethernet Standards | |
Ethernet | |
Fast Ethernet | |
Gigabit Ethernet10-Gigabit Ethernet (10GbE) | |
Long Reach Ethernet | |
Data Link Layer Devices | |
Bridges | |
Switches | |
Duplex | |
Microsegmentation | |
Chapter Summary | |
Key Terms | |
Apply Your Knowledge | |
Exercise | |
Review Questions | |
Exam Questions | |
Answers to Review Questions | |
Answers to Exam Questions | |
Suggested Readings and Resources | |
General Network Security | |
Introduction | |
Classes of Attack | |
Access Attacks | |
Reconnaissance Attacks | |
Denial of Service (DoS) Attacks | |
Mitigating Network Threats | |
AAACisco ACLs | |
Cisco IOS Secure Management Features | |
Encryption Protocols | |
Security Appliances and Applications | |
Chapter Summary | |
Key Terms | |
Apply Your Knowledge | |
Exercise | |
Review Questions | |
Exam Questions | |
Answers to Review Questions | |
Answers to Exam Questions | |
Suggested Readings and Resources | |
IP at the Network Layer | |
Introduction | |
Network Layer Functions | |
IP Addressing and Formats | |
Binary | |
Hexadecimal | |
IP Address Classes | |
Subnet Masks | |
Private (RFC 1918) Addressing | |
Subnetting IP | |
Calculating Hosts in a Subnet | |
Calculating Networks in a Subnet | |
The Increment | |
Determining the Range of Valid IPsIPv6IPv6 CommunicationsIPv6 Address Format | |
Types of IPv6 Addresses | |
Autoconfiguration | |
Integrating IPv4 and IPv6ICMPv6 | |
Network Layer Devices | |
Routers | |
Layer 3 Switches | |
Chapter Summary | |
Key Terms | |
Apply Your Knowledge | |
Exercises | |
Review Questions | |
Exam Questions | |
Answers to Review Questions | |
Answers to Exam Questions | |
Suggested Readings and Resources | |
In | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.