You are on page 1of 6

IP Data- Level2.

2
Assessment Name

Assessment Name and Level

Total No. of Questions

50

Total Marks

50

Pass Percentage

70 %

Duration of Assessment

1 hour 30 minutes

Topic Name

No. of questions

Level 1 - Network Group - VTP

Level 1 - Network Group - VLAN

Level 1 - Network Group OSI

Level 1 - Network Group STP

Level 1 Top up - Load Balancer

Level 1 Top up - Security

Level 1 Top up - Wireless

ITIL

Total

25
Essential skill Topics

Topic Name

No. of questions

Level 1 Data - LAN

Level 1 Data Network Basics

Level 1 Data - Routing

Level 1 Data - Switching

Level 1 Data - WAN

Level 1 Network Group HDLC & PPP

Level 1 Network Group - ISDN

Level 1 Network Group - IP Address Basics

Total

25

VTP
VTP, VTPv1 and VTPv2 advertisements
Native VLAN
VTP pruning
VTP Server, client and Transparent modes
VTP configurations and troubleshooting

Home

VLAN
Access VLAN and Voice VLAN
Normal VLAN and Extended VLAN
Static VLAN and Dynamic VLAN
VLAN Trunking
VLAN Trunking protocols ISL and 802.1Q
Native VLAN and VLAN filtering

Home

OSI
OSI and TCP/IP models and their associated protocols
Persistence
Routed Protocol stack(TCP/IP) , TCP,UDP,IP,ICMP,ARP/RARP/Proxy-ARP,ETHERNET,FDDI,802.11,HDLC,PPP,FR

Home

STP
STP Operations and functions
STP, RSTP, CST,PVST+ and MST
BPDU,STP ports and STP port status
BPDU, STP Configurations and troubleshooting.

Home

Load Balancers
Installation and Licensing
Virtual Servers and Pools and Load Balancing
Profiles
iRules
Persistence
Health Monitors
SSL Termination and Certificate Management
NATs and SNATs

Highly Available Redundant System configurations


TMSH (TM Shell) command line, SNMP and Logging
BIG-IP Admin topics such as Clustered Multi-Processing (CMP), VLAN Management, and Administrative Domains

Home

Security
security threats for modern network infrastructures
Cables, ports, and connectors to connect switches,routers to other network devices and hosts
Mitigation methods for Worm, Virus, and Trojan Horse attacks
Describe the Cisco Self Defending Network architecture
Secure Cisco routers
CDPand DTPoperation modes
Secure administrative access to Cisco routers by configuring multiple privilege levels
Secure administrative access to Cisco routers by configuring role based CLI
Secure the Cisco IOS image and configuration file
Implement AAA on Cisco routers using local router database and external ACS
Explain the functions and importance of AAA
Describe the features of TACACS+ and RADIUS AAA protocols
AAA authentication
AAA authorization
AAA accounting
Mitigate threats to Cisco routers and networks using ACLs
Standard, extended, and named IP ACLs used by routers to filter packets
IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
Configure IP ACLs to prevent IP address spoofing using CLI
Persistence
CHECKPOINT Basics
VPN-1 NGX components and Check Point's Secure Virtual Network Architecture
How to create rules and modify a Security Policy's properties
How to use advanced NGX features to minimize the information-security management burden, when working with
objects and rules
How to use monitoring tools to track, monitor, and account for all connections logged by Check Point components
How to protect organizations from known network attacks and entire categories of emerging or unknown attacks,
using SmartDefense
How to use private IP-address allocation and unregistered internal addressing schemes, to overcome IP addressing
limitations
How to identify and address NGX security issues, including encryption and Virtual Private Networks
How to verify the identity of users logging in to NGX, using NGX authentication schemes
How to implement LDAP, and integrate it with NGX SmartCenter Server
How to back up critical files and directories, for availability and timely recovery of Security Gateways and
SmartCenter Servers

Home

WIRELESS
WLAN fundamentals
Basics of spread spectrum technology (modulation, DSS, OFDM, MIMO, Channels reuse and overlap, Rate-shifting,
CSMA/CA)
Wireless regulatory bodies, standards and certifications (FCC, ETSI, 802.11a/b/g/n, WiFi Alliance)
WLAN RF principles (antenna types, RF gain/loss, EIRP, refraction, reflection, ETC)
Networking technologies used in wireless (SSID --> WLAN_ID --> Interface -- >VLAN, 802.1q trunking)
Wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh, bridging)
802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, AES)
Frame types (associated/unassociated, management, control, data)
Basic WLAN Security
framework of wireless security and security components (authentication, encryption, MFP, IPS)
Authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS, EAP-FAST, PEAP, LEAP)
Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)
Describe and configure the different sources of authentication (PSK, EAP-local or -external, Radius)
Configure authentication and encryption methods on a WLAN (WPA/WPA2 with PSK and 802.1x)
Implement wireless Guest networking

Home

LAN
LAN Topologies
Cables, ports, and connectors to connect switches, routers to other network devices and hosts

Home

Network Basics
OSI and TCP/IP models and their associated protocols
Application, presentation, session, transport, network, datalink and physical layer functions.
CDP and DTP operation modes

Home

Routing
Basic routing concepts ( packet forwarding, router lookup process)
Operation of Cisco routers ( router bootup process, POST, router components)
Cables, ports, and connectors to connect routers to other network devices and hosts
Device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
Router and switch IOS configuration files(save, edit, upgrade, restore)
Static or Default routing

RIPv2 and RIPv1


Persistence
EIGRP
Routing issues
Basic router security

Home

SWITCHING
Network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig),
SHOW & DEBUG commands
STP, RSTP, VLAN,VTP,VLAN Trunking protocols 802.1Q and ISL
Switch-port security
DTP and CDP messages
SVI and routing interfaces

Home

WAN
HDLC
PPP, PPP-PAP and PPP-CHAP
Frame Relay on Cisco routers
Network Address Translation(NAT) and Access-lists(ACL)
Types of ACLs
Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
Verify and monitor ACLs in a network environment
Troubleshoot ACL issues
Explain the basic operation of NAT
Configure NAT for given network requirements
Troubleshoot NAT issues

Home

HDLC and PPP


HDLC
PPP, PPP-PAP and PPP-CHAP
PPP LCP and NCP
PPP and HDLC configurations

Home

ISDN
ISDN B and D channels
ISDN PRI and BRI interfaces
ISDN layer-2 and layer-3 protocols stack
ISDN configuration and troubleshooting

Home

IP Address Basics
IP Addressing and Subnet mask
Cables, ports, and connectors to connect switches, routers to other network devices and hosts
IP Address classes and ranges
DHCP and DNS
DHCP and DNS operation on a router
VLSM IP addressing design to a network
CDP and DTP operation modes

Home

You might also like