Книга: Acing the CCNA Exam: Volume 2 Advanced Networking and Security
Назад: Appendix A. Exam topics reference table
На главную: Предисловие

index

Numbers

2.4 GHz band

2FA (two-factor authentication) ,

3G (third generation)

4G (fourth generation)

5G (fifth generation)

5 GHz band

6 GHz band

802.11 frames and message types –

802.11 frame format –

802.11 message types

client association process

802.11 wireless LANs, radio frequency

amplitude and frequency

RF bands and channels –

Symbols

| format –

A

AAAA records (quad-A records)

AAA (authentication, authorization, and accounting) , –

components

IEEE 802.1X

protocols

absorption

access-class command ,

access layer

access-list command

access ports ,

access VLAN

ACE (access control entry)

ACI (Application-Centric Infrastructure) –

Ack (acknowledgment)

ACLs (access control lists), configuring CPU ACL

active mode (FTP)

active scanning

ad hoc wireless network

advertisement timer (CDP)

AES (Advanced Encryption Standard)

AF (Assured Forwarding) ,

agent-based tools

agentless tools

aggregation layer

AI (Artificial Intelligence) –412

Generative 410

Predictive 410

AMP (Advanced Malware Protection) ,

amplitude

Ansible

AnyConnect (Cisco AnyConnect Secure Mobility Client) ,

APIC (Application Policy Infrastructure Controller)

APIs (application programming interfaces) ,

REST APIs

architecture

cacheable or non-cacheable

client-server

making API calls to Catalyst Center –

stateless

Application Layer

APs (access points)

architectures –

autonomous APs

cloud-based APs

lightweight APs –

operational modes –

outdoor bridge

repeaters

workgroup bridge (WGB)

wireless ,

A records (address records)

ARP ACLs (ARP access control lists)

ARP (Address Resolution Protocol)

DAI and ARP-based attacks

ARP poisoning ,

ARP spoofing ,

arrays (JSON)

AS (authentication server)

attenuation

authentication

WEP encryption and integrity

WEP Open System and Shared Key Authentication

authenticator

authoritative DNS server

autoinstall

automation tools

auto (PoE)

AVC (Application Visibility and Control) ,

AWS (Amazon Web Services)

B

bands

bandwidth ,

bare-metal hypervisors ,

bit-flipping attack

blocks

BOOTP (Bootstrap Protocol)

boot system command

border leaves

botnet ,

Bridge mode

broad network access

brute-force attack ,

BSA (basic service area) ,

BSS (basic service set) –,

distribution system

multiple BSSs

BSSID (basic service set identifier) , ,

burst interval

bursts

C

cable internet

CA (Certificate Authority) ,

cacheable REST APIs

calendar ,

campus LAN architectures –

three-tier LAN architecture

two-tier (collapsed core) LAN architecture –

connecting multiple distribution blocks

Layer 2-Layer 3 border

Capability Codes (CDP)

CAPWAP (Control and Provisioning of Wireless Access Points)

Catalyst Center

making REST API calls to –

CBC-MAC (Cipher Block Chaining Message Authentication Code)

CBWFQ (Class-Based Weighted Fair Queuing) , ,

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

cdp advertise-v2 command

CDP (Cisco Discovery Protocol) –,

configuring –

LLDP (Link Layer Discovery Protocol) –

viewing neighbors –

mapping network with

cdp enable command

cdp holdtime command

cdp run command

cdp timer command

CE (customer edge) routers ,

cell , , , –

centralized Control Plane

chaddr (client hardware address) field

channel number

channels, RF bands and –

2.4 GHz band

5 GHz band

6 GHz band

checksum

CIA triad , –

availability

confidentiality

integrity

CIDR (Classless Inter-Domain Routing)

ciphertext

Cisco IOS (Internetwork Operating System)

as DHCP client

as DHCP server –

address conflicts

configuring DHCP pool –

DHCP client ID

file system –

Cisco Mobility Express

Cisco Wireless Architectures

Class-Based Weighted Fair Queuing (CBWFQ)

classification and marking –

classification

marking –

trust boundaries

clear ip dhcp conflict command

clear ip nat translation command

cleartext

clients

client-server architecture

client/server mode

clock read-calendar command

clock set command ,

clock summer-time command ,

clock timezone command ,

clock update-calendar command

Clos architecture

cloud-based APs

cloud computing –

deployment models –

essential characteristics of

service models

cloud, VRF (Virtual Routing and Forwarding) –

cloud WLC

CNAME records (canonical name records)

collapsed core (two-tier) LAN architecture –

connecting multiple distribution blocks

Layer 2-Layer 3 border

colocation services

Command Prompt

communications, wireless –

community cloud

community strings

configuration drift

configuration management –

automation tools

configuration drift

establishing configuration standards

configuration management tools

Ansible –

Chef 458

Puppet 457–458

Terraform –457

configuring, SSH (Secure Shell) –

conforming traffic

console line

console port security –

line password authentication

user account authentication –

containers, overview , ,

contextual awareness

Control Layer

control tunnel

copy command –

copy running-config startup-config command

copy source destination command

core-distribution layer

core layer

CoS (Class of Service) ,

counter mode encryption

CRUD (Create-Read-Update-Delete) operations

cryptographic keys –

CS (Class Selector) ,

CSMA/CA (Carrier-Sense Multiple Access with Collision Avoidance) ,

CTS (clear-to-send)

D

DA (Destination address)

DAI (Dynamic ARP Inspection) , –

ARP and ARP-based attacks

filtering ARP messages –

inspecting ARP messages –

trusted and untrusted ports

optional checks

rate-limiting ARP messages

data center architectures, spine-leaf –

data formats

JSON –

arrays

identifying invalid JSON –

objects

primitive data types

structured data types –

serialization

XML –

YAML –445

data traffic

data tunnel

datetime keyword

DDoS (distributed denial-of-service) attack ,

debug commands ,

debug ip ospf adj command

debug spanning-tree events command

DECLINE message

deep packet inspection

default file system

default gateway

default-router command

delay, defined

delete command

destination NAT

DevNet

DevOps (development and operations)

DF (Default Forwarding) ,

DHCP (Dynamic Host Configuration Protocol) ,

Cisco IOS as client

Cisco IOS as server –

address conflicts

configuring DHCP pool –

DHCP client ID

DHCP-based attacks

DHCP relay

functions of –

IP settings –

in Linux

in macOS

in Windows

leasing IP addresses with –

relay

DHCP exhaustion attacks ,

DHCP options

DHCP pool

DHCP relay agent

DHCP relay agent information option

DHCP Snooping , –

DHCP option 82 –

filtering DHCP messages –

DHCP message types

DHCP Snooping binding table

inspecting client messages

trusted and untrusted ports

rate-limiting DHCP messages –

DHCP starvation

dictionary attack ,

diffraction

DiffServ (Differentiated Services)

digital certificates

distributed Control Plane

distributed denial-of-service (DDoS) attack

DMVPN (Dynamic Multipoint VPN) ,

DMZ (demilitarized zone)

DNS cache

DNS (Domain Name System)

how DNS works –

hierarchy –

name resolution

record types –

recursive and iterative lookups –

URIs

URLs

on Cisco IOS –

as DNS client

as DNS server –

record types –

DNS propagation delay

DNS server address

dns-server command

domain

name

domain-name command

DoS (denial-of-service) attacks , ,

drop precedence

DSCP (Differentiated Services Code Point) ,

DS (distribution system) ,

DSL (digital subscriber line) ,

DSL filter

DSL modem (modulator-demodulator)

DST (daylight saving time)

DTLS (Datagram Transport Layer Security)

dual-homed design

dual multi-homed design

Duration/ID field

Dynamic ARP Inspection

dynamic IP address

dynamic NAT –

dynamic PAT –

using pool

using interface IP address –

dynamic secure MAC addresses –

E

EAP (Extensible Authentication Protocol) ,

EAP-FAST (EAP-Flexible Authentication via Secure Tunneling)

EAP methods

EAPoL (EAP over LANs)

EAP-TLS (EAP-Transport Layer Security)

east–west traffic

ECN (Explicit Congestion Notification)

EF (Expedited Forwarding) ,

electromagnetic waves

embedded WLC

enable algorithm-type secret

enable command , ,

enable password command ,

enable secret command , , ,

encrypted file transfers

encryption –

GCMP

TKIP

WEP

WLAN security –

GCMP

TKIP

errdisable recovery cause arp-inspection

errdisable recovery cause command

errdisable recovery cause dhcp-rate-limit command

ErrDisable Recovery feature

errdisable recovery interval command

error-disabled port, re-enabling –

error-disabled state

ESS (extended service set) , , ,

exceeding traffic

exec-timeout command , ,

exploits, defined

F

facility

FCC (US Federal Communications Commission)

FCS (Frame Check Sequence)

fiber-optic Ethernet

FIFO (first in, first out) , ,

firewalls and IPS –

next-generation firewalls –

stateful packet filtering

Flex + Bridge mode

FlexConnect Local Auth

FlexConnect Local Switching

FlexConnect mode

forwarding data

Forwarding Plane

four-way handshake ,

FQDN (fully qualified domain name)

Frame Body field

Frame Control field

FS (Forward Secrecy)

FSPL (free-space path loss) ,

FTP commands

FTP control connection

FTP data connection

FTP (File Transfer Protocol) , –

active and passive modes

how it works

transferring files with

upgrading Cisco IOS –

FTPS (File Transfer Protocol Secure)

FTTH (fiber-to-the-home) services

full-mesh topology

G

GARP (gratuitous ARP) replies

GCMP (Galois/Counter Mode Protocol)

GCP (Google Cloud Platform)

GET operation

GHz (gigahertz) ,

global addresses

global routing table

GMAC (Galois Message Authentication Code)

GRE (Generic Routing Encapsulation) ,

over IPsec ,

guest OS

H

hash function

helper address

home router

hostname

host OS

hosts file

HSRP (Hot Standby Router Protocol)

HT (High Throughput) Control field

HTTP (Hypertext Transfer Protocol) –

requests

responses

HTTPS (Hypertext Transfer Protocol Secure) ,

hub-and-spoke topology

hybrid cloud

hybrid topology

hypervisors

hosted

overview

Hz (hertz) ,

I

IaaS (Infrastructure as a Service) , ,

IBN (intent-based networking)

IBSS (independent basic service set) , ,

ICV (integrity check value)

Identifier field

IEEE 802.1X

IEEE 802.11 wireless LANs, radio frequency

ifconfig command ,

Infrastructure Layer

inside addresses

inside hosts

integrity –

GCMP

TKIP

WLAN security –

GCMP

TKIP

interface vlan command

internet connections –

cable internet

DSL (digital subscriber line)

fiber-optic Ethernet

redudant

wireless 3G/4G/5G

internet VPNs –

remote access VPNs

site-to-site VPNs –

invalid JSON –

inventory files

ip access-group command

ip access-list command

ip addr command

IP address

leasing with DHCP –

ip address dhcp command

ip arp inspection limit rate command

ip arp inspection trust command

ip arp inspection validate command

ip arp inspection vlan command

ipconfig /all command

ipconfig command ,

ipconfig /displaydns command

ip default-gateway ip-address command

ip dhcp excluded-address command , ,

ip dhcp pool command

ip dhcp snooping command ,

ip dhcp snooping limit rate command

ip dhcp snooping trust command ,

ip dhcp snooping vlan command ,

ip dns server command

ip domain lookup command

ip domain name command

ip ftp password command ,

ip ftp username command ,

ip helper-address command ,

ip host command

IP (Internet Protocol)

settings –

in Linux

in macOS

in Windows

ip name-server command , ,

ip nat inside command

ip nat inside source list command ,

ip nat inside source static command

ip nat outside command

ip nat pool command

IP phones

IPP (IP Precedence) ,

iproute2 commands

ip route command ,

IPsec (Internet Protocol Security) –,

remote access VPNs

site-to-site VPNs –

DMVPN

GRE over IPsec

IP Service-Level Agreement (IP SLA)

IPS (Intrusion Prevention System) ,

IP SLA (IP Service-Level Agreement)

ip ssh version 2 command

IP telephony –

PoE (Power over Ethernet) –

voice VLANs

IPv4 addresses, private

ip vrf forwarding command

ip vrf command

ISE (Identity Services Engine) ,

ISP (Internet Service Provider)

iterative DNS lookups –

ITU (International Telecommunications Union)

IV (initialization vector)

J

jitter ,

JSON (JavaScript Object Notation) , –

identifying invalid JSON –

primitive data types

structured data types –

arrays

objects

K

key length

key size

key-value pairs

kHz (kilohertz) ,

L

L2VPN (MPLS Layer 2 VPN)

L3VPN (MPLS Layer 3 VPN)

LAGs (link aggregation groups) , , ,

LANs (local area networks) , –

802.11 standards, service sets –

architectures, star and mesh –

campus LAN architectures –

three-tier LAN architecture

two-tier (collapsed core) LAN architecture –

data center architectures, spine-leaf –

SOHO (small office/home office) networks

wireless

amplitude and frequency

BSS (basic service set) –

ESS (extended service set)

IBSS (independent basic service set)

IEEE 802.11 standards –

RF (radio frequency) –

service sets –

Layer 2 discovery protocols

Layer 2 VPNs

Layer 3 VPNs

layers, defined

leaf switches

LEAP (Lightweight EAP)

lease command

leased lines ,

lease renewal

legacy 802.11 security –

WEP encryption and integrity

WEP Open System and Shared Key Authentication

line con 0 command ,

line password authentication

line vty 0 15 command ,

link aggregation groups (LAGs) ,

Linux OS

IP settings

lldp holdtime command

LLDP (Link Layer Discovery Protocol) , –,

configuring and verifying –

viewing neighbors –

lldp reinit command

lldp run command ,

lldp timer command

LLQ (Low Latency Queuing) , ,

local addresses –

Local mode

localtime option

lock-step communication

logging buffer –

logging buffered command , ,

logging console command , , ,

logging [host] ip-address command

logging monitor command , , ,

logging synchronous command

logging trap command ,

login command , ,

login local command , , , ,

loss ,

Low Latency Queuing (LLQ)

LTE (Long-Term Evolution) ,

LWAPP (Lightweight Access Point Protocol)

LWAPs (lightweight access points /APs/) –,

client-serving modes

connecting

network management modes

WLC deployment options

M

mac address-table static command

MAC flooding attacks

Machine learning –

Deep learning

Reinforcement learning 408

Supervised learning 408

Unsupervised learning 408

MAC (media access control)

macOS, IP settings

malware ,

management IP addresses

Management pool

management VLAN

MAP (mesh access point) ,

markup language

MBSS (mesh basic service set) , ,

MD5 (Message Digest 5)

measured service

mesh topologies

MFA (multifactor authentication) ,

MHz (megahertz) ,

MIB (Management Information Database) ,

MIC (message integrity check)

microservices architecture

middleware

minutes-offset argument

MITM (man-in-the-middle) attacks ,

mnemonic

Mobility/RF Group Name setting

modem (modulator/demodulator)

modules

modulus

Monitor mode

more command

MPLS (Multiprotocol Label Switching) –, ,

connecting to service provider

Layer 2 VPNs

Layer 3 VPNs

msec option

Multicast IP Address setting

Multiprotocol

MX records (mail exchange records)

N

NAK (negative ACK) message

name resolution

native hypervisors ,

NAT (Network Address Translation)

concepts –

Cisco terminology

inside and outside

local and global –

process

private IPv4 addresses

types of –

dynamic NAT –

dynamic PAT –

static NAT –

using interface IP address –

using pool

NBAR (Network-Based Application Recognition)

NBI (northbound interface)

nested objects

NETCONF

netmask

Netmiko library

netstat command

netstat -rn command , ,

net-tools command

network automation

benefits of –

SDN (software-defined networking) –

Application-Centric Infrastructure

architecture

Cisco SDN solutions –

Control Plane

Data Plane

logical planes of network devices –

Management Plane

SD-Access

SD-WAN

network command

network components

networking, virtual machines

never mode (PoE)

NGFW (next-generation firewall) –,

NGIPS (next-generation IPS)

NIST (National Institute of Standards and Technology)

NMS (network management station)

N(N-1)/2 formula

no ip dhcp snooping information option command ,

no ip domain lookup command

non-cacheable REST APIs

north–south traffic

no shutdown command , , ,

no switchport

no switchport port-security mac-address sticky command

Notification message class

NS records (name server records)

ntp authenticate command

ntp authentication-key command

ntp broadcast client command

NTP clients

ntp master command –,

ntp multicast client command

NTP (Network Time Protocol)

configuring –

authentication –

client mode –

server mode –

date and time on network devices –

importance of date and time

setting date and time –

how it works –

ntp passive command

ntp peer command ,

ntp server command , , , ,

ntp server key command

ntp server prefer command

NTP servers

ntp source command ,

ntp trusted-key command

ntp update-calendar command

O

objects (JSON)

OID (object identifier)

on-demand self-service

on-premises (on-prem)

solutions

ONT (optical network terminal) ,

ONU (optical network unit) ,

OpenFlow

Open System Authentication

OpFlex

option 82

OSINT (open-source intelligence) ,

OSPF (Open Shortest Path First) ,

outdoor bridge

outside addresses –

outside hosts

overload keyword ,

P

PaaS (Platform as a Service) , ,

PAC (Protected Access Credential)

passive mode (FTP)

passive scanning

password command ,

password-related attacks

passwords and alternatives –

best practices –

Cisco IOS password hashing

password managers

digital certificates

multifactor authentication

PASV command

PATCH operation

path element

PCP (Priority Code Point)

field

PDs (Powered Devices)

PEAP (Protected EAP)

peer relationship ,

PE (provider edge) routers ,

period

per-packet key mixing

PFS (Perfect Forward Secrecy)

PHB (per-hop behavior) ,

phishing

physical access control ,

piggybacking

plaintext

playbook files

PMF (Protected Management Frames)

PNAC (port-based network access control) , ,

pods

PoE (Power over Ethernet) , –

policing, defined

ports and interfaces –

configuring dynamic interfaces

physical ports and logical interfaces –

WLC interfaces

WLC ports

Port Security

configuration options –

secure MAC address aging –

sticky secure MAC addresses

violation modes –

configuring –

configuring static secure MAC addresses

increasing maximum MAC addresses

re-enabling error-disabled port –

DHCP exhaustion and MAC flooding attacks

overview

POST operation

POST (Power-On Self-Test)

POTS (plain old telephone service)

power classification override

power inline auto command

power inline command

power inline police command

power inline static [max milliwatts] command

power policing

PowerShell

P (provider) routers ,

PQDN (partially qualified domain name)

PQ (Priority Queuing) , ,

prefer keyword (NTP) ,

pretexting

primary server (NTP) ,

primitive data types

private cloud deployment

private IPv4 addresses

probe request

proxy mode

PSE (Power Sourcing Equipment)

PSK (pre-shared key) ,

PSTN (public switched telephone network)

PTR records (pointer records)

public cloud deployment

public IPv4 addresses

pull model

push model ,

PUT operation

Q

QoS Control field

QoS (quality of service) ,

classification and marking –

classification

DSCP field –

marking –

trust boundaries

concepts –

bandwidth

delay, jitter, and loss

congestion avoidance –

IP telephony –

PoE (Power over Ethernet) –

voice VLANs

policing

queuing and scheduling –

Class-Based Weighted Fair Queuing

Low Latency Queuing

Priority Queuing

shaping

queue starvation

R

RADIUS (Remote Authentication Dial-In User Service) ,

rapid elasticity, defined

RAP (root access point) ,

RA (Receiver address)

rate-limiting techniques

RC4 (Rivest Cipher 4)

Read message class

read-only OIDs

read request

receiving data

recommended markings

reconnaissance attacks ,

recursive DNS lookups –

RED (Random Early Detection) ,

redundant internet connections

reference clocks ,

reflection

reflection/amplification attacks

refraction

regulatory domain

RELEASE message

reload command

remote access VPNs

remote management

configuring Telnet –

management IP addresses –

repeaters ,

replay attack

resource pooling

Response message class

REST (representational state transfer) APIs , ,

architecture

cacheable or non-cacheable

client-server

stateless

HTTP –

requests

responses

making API calls to DNAC –

reverse DNS lookups

RFC 1918 addresses

RF jamming attack

RF (radio frequency) , , , ,

amplitude and frequency

IEEE 802.11 standards

RF bands and channels –

RF (radio frequency) bands

service sets –

BSS (basic service set) –

ESS (extended service set)

IBSS (independent basic service set)

MBSS (mesh basic service set)

roaming

rogue, defined

Rogue Detector mode

rogue DHCP server

root DNS server

root domain

RO (read-only) community type

routable addresses

route command

routing packets

RSA keys, generating –

RTS (request-to-send)

RTT (round-trip time)

runtime

RW (read-write) community type

S

SaaS (Software as a Service) ,

SAE (Simultaneous Authentication of Equals) –

SA (Source address)

SBI (southbound interface)

scattering, defined

scavenger traffic

scheme (URL)

scrypt, hash algorithm

SD-Access (Software-Defined Access)

SDN (software-defined networking) , –

architecture

Cisco SDN solutions –

logical planes of network devices –

SD-WAN (Software-Defined WAN) ,

secondary servers (NTP) ,

SE-Connect mode

secure MAC addresses

aging –

Secure Shell (SSH). See SSH (Secure Shell)

security

concepts –

firewalls and IPS –

passwords and alternatives –

users access control with AAA –

wireless client authentication –

wireless LANs –

security concepts

summary –

Security Violation Count

Sender IP field

Sender MAC field

sending data

Sequence Control field

sequence numbers (Syslog) –

serialization

service-level agreement (SLA)

service password-encryption command

service providers, MPLS (Multiprotocol Label Switching)

service sequence-numbers command

service sets –

service timestamps log command

service timestamps log datetime command

service timestamps log datetime localtime msec command

service timestamps log datetime msec command

service timestamps log uptime command

setting date and time

configuring daylight saving time/summer time

configuring time zone

setting clock and calendar

severity levels –

SFTP (SSH File Transfer Protocol)

shaping, defined

shaping queue

Shared Key Authentication

show boot command

show calendar command

show cdp command , , ,

show cdp entry command ,

show cdp interface [interface] command –

show cdp neighbors command , , , ,

show cdp neighbors detail command , ,

show cdp traffic command , ,

show clock command ,

show clock detail command

show errdisable recovery command

show file systems command

show hosts command

show interfaces switchport command

show ip dhcp conflict command

show ip dhcp snooping binding command

show ip dhcp snooping command , , ,

show ip interface command

show ip nat statistics command

show ip nat translations command ,

show ip route command

show ip route vrf command

show ip ssh command

show lldp command ,

show lldp entry command

show lldp interface command

show lldp neighbors command

show lldp neighbors detail command

show lldp traffic command

show logging command , ,

show mac address-table command

show memory command

show ntp associations command ,

show ntp status command ,

show port-security address command

show port-security command

show port-security interface command ,

show power inline command ,

show power inline police command ,

show processes cpu command

show running-config command

show startup-config command

show version command

shutdown command , , , ,

single-homed design

site-to-site VPNs –

SLDs (second-level domains)

SMS phishing (smishing)

Sniffer mode

snmp-server community command

snmp-server host command

snmp-server user command

SNMP (Simple Network Management Protocol)

agent

entity

manager

messages –

operations and components –

versions and security –

SNMPv2c (community-based SNMPv2)

SOA records (start of authority records)

social engineering –,

as an exploit

attacks

security program elements

SOHO (small office/home office) networks

source NAT

spear phishing

spine-leaf architecture –

overview of

traditional data center networks

spine switches

split-MAC architecture

spoofed IP address

spoofing attacks

spurious DHCP server

ssh -l command –

SSH (Secure Shell) , , , –

configuring –

console port security –

line password authentication

user account authentication –

generating RSA keys –

remote management –

configuring Telnet –

management IP addresses –

SSIDs (service set identifiers) ,

standards, configuration management, establishing

star topologies

stateful, defined

stateful packet filtering

stateless, defined

stateless firewall

stateless REST APIs

static IP address

static keyword

static NAT –

static mode

static secure MAC addresses –

stations

sticky secure MAC addresses

STP (Spanning Tree Protocol) ,

stratum ,

structured data types –

subdomain

supplicant, defined

SVIs (switch virtual interfaces) ,

switches, initial setup –

switching frames

switchport mode command

switchport port-security aging time command

switchport port-security command

switchport port-security mac-address command

switchport port-security mac-address sticky command

switchport port-security maximum command

switchport port-security violation mode command

switchport voice vlan command

symmetric active mode (NTP)

SYN flood attack

Syslog

device logs –

message format –

over TLS (Transport Layer Security)

T

TACACS+ (Terminal Access Controller Access-Control System Plus) ,

tail drop

tailgating, defined

Talos integration

Target IP field

Target MAC field

TA (Transmitter address)

TCP (Transmission Control Protocol), global synchronization ,

Telnet, configuring –

telnet command

template files

Terminal application

terminal monitor command ,

terminal no monitor command

Terraform –457

TFTP (Trivial File Transfer Protocol) –

how it works

transferring files with –

Cisco IOS file system –

upgrading Cisco IOS –

threats –

social engineering –

technical threats –

three-tier LAN architecture

throughput, defined

THz (terahertz) ,

timestamps (Syslog) –

TKIP (Temporal Key Integrity Protocol)

TLD server

TLDs (top-level domains)

TLS (Transport Layer Security) , , ,

topologies, star and mesh

ToS (Type of Service)

Transfer ID (TID)

transferring files

TFTP –

Cisco IOS file system –

with copy command –

transport input command

trunk ports , , –

trust boundaries

trusted key

trusted ports

TTL (time to live) value

two-tier (collapsed core) LAN architecture –

connecting multiple distribution blocks

Layer 2-Layer 3 border

Type 1 hypervisors

Type 2 hypervisors

U

unbounded medium

unified WLC

untrusted ports

upgrading Cisco IOS –

uptime option

URIs (Uniform Resource Identifiers) ,

URLs (Uniform Resource Locators)

URNs (Uniform Resource Names)

user account authentication −

user awareness programs ,

username command , ,

username username algorithm-type secret command

users

access control with AAA –

components

IEEE 802.1X

protocols

user training programs

UTC (Coordinated Universal Time)

uWGB (Universal WGB)

V

variables ,

violation modes –

virtualization

cloud and

containers

VMs (virtual machines) –

VRF (Virtual Routing and Forwarding) –

virtual switches ,

vishing (voice phishing)

VMM (virtual machine monitor) ,

VMs (virtual machines)

hypervisors

networking virtual machines

overview –,

vNICs (virtual network interface cards) ,

voice phishing (vishing)

voice VLANs

VoIP (Voice over IP) ,

VPNs (virtual private networks) , ,

overview

VPN client ,

VRF (Virtual Routing and Forwarding) , , –,

VTY (Virtual Teletype) lines

vulnerabilities

VXLAN (Virtual Extensible LAN)

W

WANs (wide area networks) ,

architectures

concepts –

leased lines

MPLS (Multiprotocol Label Switching) –

internet VPNs –

remote access VPNs

site-to-site VPNs –

internet connections –

cable internet

DSL

fiber-optic Ethernet

redundancy

wireless 3G/4G/5G

WAPs (wireless access points) ,

weighted round-robin

WEP (Wired Equivalent Privacy) –

WGB (workgroup bridge) ,

whaling, defined

whitespace

WHOIS lookup

Wi-Fi

Wi-Fi Protected Access (WPA)

Wi-Fi router

Windows OS, IP settings

wireless architectures

802.11 frames and message types –

wireless communications –

wireless router

WLANs (wireless LANs) –, –

configuration

configuring –

advanced settings

connecting LWAPs

QoS settings

security settings

initial setup

connecting to WLC –

configuring CPU ACL

management connections –

switch configuration –

WLC initial configuration –

radio frequency –

IEEE 802.11 standards

security

encryption and integrity –

GCMP

TKIP

wireless client authentication –

WPA-Enterprise –

WPA-Personal

security concepts –

CIA triad in –

legacy 802.11 security –

WLCs (wireless LAN controllers) , , ,

connecting to –

deployment options

discovery process

initial configuration –

ports and interfaces –

WPA-Enterprise , –

WPA-Personal

WPA (Wi-Fi Protected Access) , ,

WRED (Weighted Random Early Detection) ,

write command

write memory command

Write message class

write request

www domain name

X

XaaS (anything as a service)

XML (Extensible Markup Language) –

Y

YAML (YAML Ain’t Markup Language) –

Назад: Appendix A. Exam topics reference table
На главную: Предисловие