Home > Store

CCNA 200-301 Official Cert Guide, Volume 2 Premium Edition eBook and Practice Test

Register your product to gain access to bonus material or receive a coupon.

CCNA 200-301 Official Cert Guide, Volume 2 Premium Edition eBook and Practice Test

Premium Edition eBook

  • Your Price: $35.99
  • List Price: $44.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

About

Features

  • Revised edition of the #1 selling CCNA preparation self-study guide
  • Book content is fully updated to align to the new CCNA 200-301 exam objectives
  • Books and online materials are packed with features to help candidates master difficult testing methods on actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • In-depth expert explanations of all protocols, commands, and technologies on the CCNA exam
  • Online ancillary materials such as lecture slides, instructor's notes, and test bank reinforce concepts discussed in this text 

Description

  • Copyright 2020
  • Pages: 624
  • Edition: 1st
  • Premium Edition eBook
  • ISBN-10: 0-13-526271-2
  • ISBN-13: 978-0-13-526271-9

The exciting new CCNA 200-301 Official Cert Guide, Volume 2, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep Practice Test. This eBook, combined with CCNA 200-301 Official Cert Guide, Volume 1, cover all the exam topics on the CCNA 200-301 exam. The Premium Edition eBook and Practice Test contains the following items:


·         The CCNA 200-301 Premium Edition Practice Test, including four full practice exams and enhanced practice test features

·         PDF and EPUB formats of CCNA 200-301 Official Cert Guide, Volume 2 from Cisco Press, which are accessible via your PC, tablet, and smartphone


About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package


·         Enables you to focus on individual topic areas or take complete, timed exams

·         Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions

·         Provides unique sets of exam-realistic practice questions

·         Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most


Pearson Test Prep online system requirements:


Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above

Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7. Internet access required.


Pearson Test Prep offline system requirements: 


Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases


About the Premium Edition eBook

CCNA 200-301 Official Cert Guide, Volume 2 from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.



This complete study package includes


·         A test-preparation routine proven to help you pass the exams

·         Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section

·         Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly

·          The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

·         A free copy of the CCNA 200-301 Network Simulator, Volume 2 Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

·         Links to a series of hands-on config labs developed by the author

·         Online interactive practice exercises that help you enhance your knowledge

·         More than 50 minutes of video mentoring from the author

·         An online interactive Flash Cards application to help you drill on Key Terms by chapter

·         A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

·         Study plan suggestions and templates to help you organize and optimize your study time


Well regarded for its level of detail, study plans, assessment features, hands-on labs, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.


CCNA 200-301 Official Cert Guide, Volume 2, combined with CCNA 200-301 Official Cert Guide, Volume 1, walk you through all the exam topics found in the Cisco 200-301 exam. Topics covered in Volume 2 include


·         IP access control lists

·         Security services

·         IP services

·         Network architecture

·         Network automation


Companion Website:

The companion website contains more than 300 unique practice exam questions, CCNA Network Simulator Lite software, online practice exercises, and 50 minutes of video training.

In addition to the wealth of updated content, this new edition includes a series of free hands-on exercises to help you master several real-world configuration activities. These exercises can be performed on the CCNA 200-301 Network Simulator Lite, Volume 2 software included for free on the companion website that accompanies this book. This software, which simulates the experience of working on actual Cisco routers and switches, contains the following 13 free lab exercises, covering ACL topics in Part I:


1. ACL I

2. ACL II

3. ACL III

4. ACL IV

5. ACL V

6. ACL VI

7. ACL Analysis I

8. Named ACL I

9. Named ACL II

10.     Named ACL III

11.     Standard ACL Configuration Scenario

12.     Extended ACL I Configuration Scenario

13.     Extended ACL II Configuration Scenario


If you are interested in exploring more hands-on labs and practicing configuration and troubleshooting with more router and switch commands, see the special discount offer in the coupon code included in the sleeve in the back of this book.


Windows system requirements (minimum):

·         Windows 10 (32/64-bit), Windows 8.1 (32/64-bit), or Windows 7 (32/64-bit)

·         1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor

·         1 GB RAM (32-bit) or 2 GB RAM (64-bit)

·         16 GB available hard disk space (32-bit) or 20 GB (64-bit)

·         DirectX 9 graphics device with WDDM 1.0 or higher driver

·         Adobe Acrobat Reader version 8 and above



Mac system requirements (minimum)

·         macOS 10.14, 10.13, 10.12, or 10.11

·         Intel core Duo 1.83 GHz

·         512 MB RAM (1 GB recommended)

·         1.5 GB hard disk space

·         32-bit color depth at 1024x768 resolution

·         Adobe Acrobat Reader version 8 and above


CCNA 200-301 Official Cert Guide, Volume 2 Companion Website

Access interactive study tools on this book's companion website, including practice test software, video training, CCNA Network Simulator Lite software, memory table and config checklist review exercises, Key Term flash card application, a study planner, and more!



To access the companion website, simply follow these steps:


1.       Go to www.ciscopress.com/register.

2.       Enter the print book ISBN: 9781587147135.

3.       Answer the security question to validate your purchase.

4.       Go to your account page.

5.       Click on the Registered Products tab.

6.       Under the book listing, click on the Access Bonus Content link.


If you have any issues accessing the companion website, you can contact our support team by going to http://pearsonitp.echelp.org.

Downloads

Downloads

New Cert Guide to Old Sim Lab Mapping (29 KB .xlsx)

Sample Content

Table of Contents

Introduction xxvii

Part I IP Access Control Lists 3

Chapter 1 Introduction to TCP/IP Transport and Applications 4

“Do I Know This Already?” Quiz 4

Foundation Topics 6

TCP/IP Layer 4 Protocols: TCP and UDP 6

    Transmission Control Protocol 7

        Multiplexing Using TCP Port Numbers 7

        Popular TCP/IP Applications 10

        Connection Establishment and Termination 12

        Error Recovery and Reliability 13

        Flow Control Using Windowing 15

    User Datagram Protocol 16

TCP/IP Applications 16

    Uniform Resource Identifiers 17

    Finding the Web Server Using DNS 18

    Transferring Files with HTTP 20

    How the Receiving Host Identifies the Correct Receiving Application 21

Chapter Review 22

Chapter 2 Basic IPv4 Access Control Lists 24

“Do I Know This Already?” Quiz 24

Foundation Topics 26

IPv4 Access Control List Basics 26

    ACL Location and Direction 26

    Matching Packets 27

    Taking Action When a Match Occurs 28

    Types of IP ACLs 28

Standard Numbered IPv4 ACLs 29

    List Logic with IP ACLs 29

    Matching Logic and Command Syntax 31

        Matching the Exact IP Address 31

        Matching a Subset of the Address with Wildcards 31

        Binary Wildcard Masks 33

        Finding the Right Wildcard Mask to Match a Subnet 33

        Matching Any/All Addresses 34

    Implementing Standard IP ACLs 34

        Standard Numbered ACL Example 1 35

        Standard Numbered ACL Example 2 36

    Troubleshooting and Verification Tips 38

Practice Applying Standard IP ACLs 39

    Practice Building access-list Commands 39

    Reverse Engineering from ACL to Address Range 40

Chapter Review 41

Chapter 3 Advanced IPv4 Access Control Lists 44

“Do I Know This Already?” Quiz 44

Foundation Topics 46

Extended Numbered IP Access Control Lists 46

    Matching the Protocol, Source IP, and Destination IP 46

    Matching TCP and UDP Port Numbers 48

    Extended IP ACL Configuration 51

        Extended IP Access Lists: Example 1 51

        Extended IP Access Lists: Example 2 53

    Practice Building access-list Commands 54

Named ACLs and ACL Editing 54

    Named IP Access Lists 54

    Editing ACLs Using Sequence Numbers 56

    Numbered ACL Configuration Versus Named ACL Configuration 58

    ACL Implementation Considerations 59

    Additional Reading on ACLs 60

Chapter Review 61

Part I Review 64

Part II Security Services 67

Chapter 4 Security Architectures 68

“Do I Know This Already?” Quiz 68

Foundation Topics 70

Security Terminology 70

Common Security Threats 72

    Attacks That Spoof Addresses 72

        Denial-of-Service Attacks 73

        Reflection and Amplification Attacks 75

        Man-in-the-Middle Attacks 76

        Address Spoofing Attack Summary 77

    Reconnaissance Attacks 77

    Buffer Overflow Attacks 78

    Malware 78

    Human Vulnerabilities 79

    Password Vulnerabilities 80

        Password Alternatives 80

Controlling and Monitoring User Access 82

Developing a Security Program to Educate Users 83

Chapter Review 84

Chapter 5 Securing Network Devices 86

“Do I Know This Already?” Quiz 86

Foundation Topics 88

Securing IOS Passwords 88

    Encrypting Older IOS Passwords with service password-encryption 89

    Encoding the Enable Passwords with Hashes 90

        Interactions Between Enable Password and Enable Secret 90

        Making the Enable Secret Truly Secret with a Hash 91

        Improved Hashes for Cisco’s Enable Secret 92

    Encoding the Passwords for Local Usernames 94

    Controlling Password Attacks with ACLs 95

Firewalls and Intrusion Prevention Systems 95

    Traditional Firewalls 96

        Security Zones 97

    Intrusion Prevention Systems (IPS) 99

    Cisco Next-Generation Firewalls 100

    Cisco Next-Generation IPS 102

Chapter Review 103

Chapter 6 Implementing Switch Port Security 106

“Do I Know This Already?” Quiz 106

Foundation Topics 108

Port Security Concepts and Configuration 108

    Configuring Port Security 109

    Verifying Port Security 112

    Port Security MAC Addresses 113

Port Security Violation Modes 114

    Port Security Shutdown Mode 115

    Port Security Protect and Restrict Modes 117

Chapter Review 119

Chapter 7 Implementing DHCP 122

“Do I Know This Already?” Quiz 122

Foundation Topics 124

Dynamic Host Configuration Protocol 124

    DHCP Concepts 125

        Supporting DHCP for Remote Subnets with DHCP Relay 126

        Information Stored at the DHCP Server 128

    Configuring DHCP Features on Routers and Switches 129

        Configuring DHCP Relay 130

        Configuring a Switch as DHCP Client 130

        Configuring a Router as DHCP Client 132

Identifying Host IPv4 Settings 133

    Host Settings for IPv4 133

    Host IP Settings on Windows 134

    Host IP Settings on macOS 136

    Host IP Settings on Linux 138

Chapter Review 140

Chapter 8 DHCP Snooping and ARP Inspection 144

“Do I Know This Already?” Quiz 144

Foundation Topics 146

DHCP Snooping 146

    DHCP Snooping Concepts 146

        A Sample Attack: A Spurious DHCP Server 147

        DHCP Snooping Logic 148

        Filtering DISCOVER Messages Based on MAC Address 150

        Filtering Messages that Release IP Addresses 150

    DHCP Snooping Configuration 152

        Configuring DHCP Snooping on a Layer 2 Switch 152

        Limiting DHCP Message Rates 154

        DHCP Snooping Configuration Summary 155

Dynamic ARP Inspection 156

    DAI Concepts 156

        Review of Normal IP ARP 156

        Gratuitous ARP as an Attack Vector 157

        Dynamic ARP Inspection Logic 158

    Dynamic ARP Inspection Configuration 160

        Configuring ARP Inspection on a Layer 2 Switch 160

        Limiting DAI Message Rates 163

        Configuring Optional DAI Message Checks 164

        IP ARP Inspection Configuration Summary 165

Chapter Review 166

Part II Review 168

Part III IP Services 171

Chapter 9 Device Management Protocols 172

“Do I Know This Already?” Quiz 172

Foundation Topics 174

System Message Logging (Syslog) 174

    Sending Messages in Real Time to Current Users 174

    Storing Log Messages for Later Review 175

    Log Message Format 176

    Log Message Severity Levels 177

    Configuring and Verifying System Logging 178

    The debug Command and Log Messages 180

Network Time Protocol (NTP) 181

    Setting the Time and Timezone 182

    Basic NTP Configuration 183

    NTP Reference Clock and Stratum 185

    Redundant NTP Configuration 186

    NTP Using a Loopback Interface for Better Availability 188

Analyzing Topology Using CDP and LLDP 190

    Examining Information Learned by CDP 190

    Configuring and Verifying CDP 193

    Examining Information Learned by LLDP 194

    Configuring and Verifying LLDP 197

Chapter Review 199

Chapter 10 Network Address Translation 202

“Do I Know This Already?” Quiz 202

Foundation Topics 204

Perspectives on IPv4 Address Scalability 204

    CIDR 205

    Private Addressing 206

Network Address Translation Concepts 207

    Static NAT 208

    Dynamic NAT 210

    Overloading NAT with Port Address Translation 211

NAT Configuration and Troubleshooting 213

    Static NAT Configuration 213

    Dynamic NAT Configuration 215

    Dynamic NAT Verification 217

    NAT Overload (PAT) Configuration 219

    NAT Troubleshooting 222

Chapter Review 223

Chapter 11 Quality of Service (QoS) 226

“Do I Know This Already?” Quiz 226

Foundation Topics 228

Introduction to QoS 228

    QoS: Managing Bandwidth, Delay, Jitter, and Loss 228

    Types of Traffic 229

        Data Applications 229

    Voice and Video Applications 230

    QoS as Mentioned in This Book 232

    QoS on Switches and Routers 233

Classification and Marking 233

    Classification Basics 233

    Matching (Classification) Basics 234

    Classification on Routers with ACLs and NBAR 235

    Marking IP DSCP and Ethernet CoS 236

        Marking the IP Header 237

        Marking the Ethernet 802.1Q Header 237

        Other Marking Fields 238

    Defining Trust Boundaries 238

    DiffServ Suggested Marking Values 239

        Expedited Forwarding (EF) 240

        Assured Forwarding (AF) 240

        Class Selector (CS) 241

        Guidelines for DSCP Marking Values 241

Queuing 242

    Round-Robin Scheduling (Prioritization) 243

    Low Latency Queuing 243

    A Prioritization Strategy for Data, Voice, and Video 245

Shaping and Policing 245

    Policing 246

        Where to Use Policing 246

    Shaping 248

        Setting a Good Shaping Time Interval for Voice and Video 249

Congestion Avoidance 250

    TCP Windowing Basics 250

    Congestion Avoidance Tools 251

Chapter Review 252

Chapter 12 Miscellaneous IP Services 254

“Do I Know This Already?” Quiz 254

Foundation Topics 256

First Hop Redundancy Protocol 256

    The Need for Redundancy in Networks 257

    The Need for a First Hop Redundancy Protocol 259

    The Three Solutions for First-Hop Redundancy 260

    HSRP Concepts 261

        HSRP Failover 261

        HSRP Load Balancing 262

Simple Network Management Protocol 263

    SNMP Variable Reading and Writing: SNMP Get and Set 264

    SNMP Notifications: Traps and Informs 265

    The Management Information Base 266

    Securing SNMP 267

FTP and TFTP 268

    Managing Cisco IOS Images with FTP/TFTP 268

        The IOS File System 268

        Upgrading IOS Images 270

        Copying a New IOS Image to a Local IOS File System Using TFTP 271

        Verifying IOS Code Integrity with MD5 273

        Copying Images with FTP 273

    The FTP and TFTP Protocols 275

        FTP Protocol Basics 275

        FTP Active and Passive Modes 276

        FTP over TLS (FTP Secure) 278

    TFTP Protocol Basics 279

Chapter Review 280

Part III Review 284

Part IV Network Architecture 287

Chapter 13 LAN Architecture 288

“Do I Know This Already?” Quiz 288

Foundation Topics 290

Analyzing Campus LAN Topologies 290

    Two-Tier Campus Design (Collapsed Core) 290

        The Two-Tier Campus Design 290

        Topology Terminology Seen Within a Two-Tier Design 291

    Three-Tier Campus Design (Core) 293

    Topology Design Terminology 295

Small Office/Home Office 295

Power over Ethernet (PoE) 297

    PoE Basics 297

    PoE Operation 298

    PoE and LAN Design 299

Chapter Review 300

Chapter 14 WAN Architecture 302

“Do I Know This Already?” Quiz 302

Foundation Topics 304

Metro Ethernet 304

    Metro Ethernet Physical Design and Topology 305

    Ethernet WAN Services and Topologies 306

        Ethernet Line Service (Point-to-Point) 307

        Ethernet LAN Service (Full Mesh) 308

        Ethernet Tree Service (Hub and Spoke) 309

    Layer 3 Design Using Metro Ethernet 309

        Layer 3 Design with E-Line Service 309

        Layer 3 Design with E-LAN Service 311

Multiprotocol Label Switching (MPLS) 311

    MPLS VPN Physical Design and Topology 313

    MPLS and Quality of Service 314

    Layer 3 with MPLS VPN 315

Internet VPNs 317

    Internet Access 317

        Digital Subscriber Line 318

        Cable Internet 319

        Wireless WAN (3G, 4G, LTE, 5G) 320

        Fiber (Ethernet) Internet Access 321

    Internet VPN Fundamentals 321

        Site-to-Site VPNs with IPsec 322

        Remote Access VPNs with TLS 324

    VPN Comparisons 326

Chapter Review 326

Chapter 15 Cloud Architecture 328

“Do I Know This Already?” Quiz 328

Foundation Topics 330

Server Virtualization 330

    Cisco Server Hardware 330

    Server Virtualization Basics 331

    Networking with Virtual Switches on a Virtualized Host 333

    The Physical Data Center Network 334

    Workflow with a Virtualized Data Center 335

Cloud Computing Services 336

    Private Cloud (On-Premise) 337

    Public Cloud 338

    Cloud and the “As a Service” Model 339

        Infrastructure as a Service 339

        Software as a Service 341

         (Development) Platform as a Service 341

WAN Traffic Paths to Reach Cloud Services 342

    Enterprise WAN Connections to Public Cloud 342

        Accessing Public Cloud Services Using the Internet 342

        Pros and Cons with Connecting to Public Cloud with Internet 343

        Private WAN and Internet VPN Access to Public Cloud 344

        Pros and Cons of Connecting to Cloud with Private WANs 345

        Intercloud Exchanges 346

        Summarizing the Pros and Cons of Public Cloud WAN Options 346

    A Scenario: Branch Offices and the Public Cloud 347

        Migrating Traffic Flows When Migrating to Email SaaS 347

        Branch Offices with Internet and Private WAN 349

Chapter Review 350

Part IV Review 352

Part V Network Automation 355

Chapter 16 Introduction to Controller-Based Networking 356

“Do I Know This Already?” Quiz 357

Foundation Topics 358

SDN and Controller-Based Networks 358

    The Data, Control, and Management Planes 358

        The Data Plane 359

        The Control Plane 360

        The Management Plane 361

        Cisco Switch Data Plane Internals 361

    Controllers and Software-Defined Architecture 362

        Controllers and Centralized Control 363

        The Southbound Interface 364

        The Northbound Interface 365

    Software Defined Architecture Summary 367

Examples of Network Programmability and SDN 367

    OpenDaylight and OpenFlow 367

        The OpenDaylight Controller 368

        The Cisco Open SDN Controller (OSC) 369

    Cisco Application Centric Infrastructure (ACI) 369

        ACI Physical Design: Spine and Leaf 370

        ACI Operating Model with Intent-Based Networking 371

    Cisco APIC Enterprise Module 373

        APIC-EM Basics 373

        APIC-EM Replacement 374

    Summary of the SDN Examples 375

Comparing Traditional Versus Controller-Based Networks 375

    How Automation Impacts Network Management 376

    Comparing Traditional Networks with Controller-Based Networks 378

Chapter Review 379

Chapter 17 Cisco Software-Defined Access (SDA) 382

“Do I Know This Already?” Quiz 383

Foundation Topics 384

SDA Fabric, Underlay, and Overlay 384

    The SDA Underlay 386

        Using Existing Gear for the SDA Underlay 386

        Using New Gear for the SDA Underlay 387

    The SDA Overlay 390

        VXLAN Tunnels in the Overlay (Data Plane) 390

        LISP for Overlay Discovery and Location (Control Plane) 392

DNA Center and SDA Operation 395

    Cisco DNA Center 395

    Cisco DNA Center and Scalable Groups 396

        Issues with Traditional IP-Based Security 397

        SDA Security Based on User Groups 398

DNA Center as a Network Management Platform 400

    DNA Center Similarities to Traditional Management 401

    DNA Center Differences with Traditional Management 402

Chapter Review 403

Chapter 18 Understanding REST and JSON 406

“Do I Know This Already?” Quiz 406

Foundation Topics 408

REST-Based APIs 408

    REST-Based (RESTful) APIs 408

        Client/Server Architecture 409

        Stateless Operation 410

        Cacheable (or Not) 410

    Background: Data and Variables 410

        Simple Variables 410

        List and Dictionary Variables 411

    REST APIs and HTTP 413

        Software CRUD Actions and HTTP Verbs 413

        Using URIs with HTTP to Specify the Resource 414

    Example of REST API Call to DNA Center 417

Data Serialization and JSON 418

    The Need for a Data Model with APIs 419

    Data Serialization Languages 421

        JSON 421

        XML 421

        YAML 422

        Summary of Data Serialization 423

    Interpreting JSON 423

        Interpreting JSON Key:Value Pairs 423

        Interpreting JSON Objects and Arrays 424

        Minified and Beautified JSON 426

Chapter Review 427

Chapter 19 Understanding Ansible, Puppet, and Chef 428

“Do I Know This Already?” Quiz 428

Foundation Topics 430

Device Configuration Challenges and Solutions 430

    Configuration Drift 430

    Centralized Configuration Files and Version Control 431

    Configuration Monitoring and Enforcement 433

    Configuration Provisioning 434

        Configuration Templates and Variables 435

        Files That Control Configuration Automation 437

Ansible, Puppet, and Chef Basics 438

    Ansible 438

    Puppet 440

    Chef 441

    Summary of Configuration Management Tools 442

Chapter Review 442

Part V Review 444

Part VI Final Review 447

Chapter 20 Final Review 448

Advice About the Exam Event 448

    Exam Event: Learn About Question Types 448

    Exam Event: Think About Your Time Budget 450

    Exam Event: A Sample Time-Check Method 451

    Exam Event: One Week Away 451

    Exam Event: 24 Hours Before the Exam 452

    Exam Event: The Last 30 Minutes 452

    Exam Event: Reserve the Hour After the Exam 453

Exam Review 454

    Exam Review: Take Practice Exams 454

        Using the Practice CCNA Exams 455

        Exam Review: Advice on How to Answer Exam Questions 456

        Exam Review: Additional Exams with the Premium Edition 457

    Exam Review: Find Knowledge Gaps 458

    Exam Review: Practice Hands-On CLI Skills 460

        CCNA Exam Topics with CLI Skill Requirements 460

    Exam Review: Self-Assessment Pitfalls 462

    Exam Review: Adjustments for Your Second Attempt 463

    Exam Review: Other Study Tasks 464

    Final Thoughts 464

Part VII Appendixes 467

Appendix A Numeric Reference Tables 469

Appendix B CCNA 200-301, Volume 2 Exam Updates 476

Appendix C Answers to the “Do I Know This Already?” Quizzes 478

Glossary 494

Online Appendixes

Appendix D Topics from Previous Editions

Appendix E Practice for Chapter 2: Basic IPv4 Access Control Lists

Appendix F Previous Edition ICND1 Chapter 35: Managing IOS Files

Appendix G Exam Topics Cross-Reference

Appendix H Study Planner

9781587147135   TOC   10/18/2019

Updates

Updates & Corrections

CCNA 200-301, Volume 2 Exam Updates (5.7 MB .pdf)

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (29 KB .docx)

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020