CCST Cisco Certified Support Technician Study Guide - Todd Lammle - E-Book

CCST Cisco Certified Support Technician Study Guide E-Book

Todd Lammle

0,0
32,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

The ideal prep guide for earning your CCST Networking certification CCST Cisco Certified Support Technician Study Guide: Networking Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco networking guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Networking exam objectives. You'll find detailed information and examples for must-know Cisco networking topics, as well as practical insights drawn from real-world scenarios. This Study Guide provides authoritative coverage of key exam topics, including standards and concepts, addressing and subnet formats, endpoints and media types, infrastructure, diagnosing problems, and security. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards, and a glossary of important terminology, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions. The CCST Networking certification is an entry point into the Cisco certification program, and a pathway to the higher-level CCNA, so it's a great place to start as you build a rewarding career! * Study 100% of the topics covered on the Cisco CCST Networking certification exam * Get access to flashcards, practice questions, and more great resources online * Master difficult concepts with real-world examples and clear explanations * Learn about the career paths you can follow and what comes next after the CCST This Sybex study guide is perfect for anyone wanting to earn their CCST Networking certification, including entry-level network technicians, networking students, interns, and IT professionals.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 670

Veröffentlichungsjahr: 2023

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Table of Contents

Title Page

Copyright

Acknowledgments

About the Authors

About the Technical Editor

Introduction

Cisco's CCST Certifications

What Does This Book Cover?

Exam Objectives

How to Contact the Publisher

Assessment Test

Chapter 1: Internetworking

Internetworking Basics

Internetworking Models

The OSI Reference Model

Summary

Exam Essentials

Review Questions

Chapter 2: Introduction to TCP/IP

Introducing TCP/IP

TCP/IP and the DoD Model

IP Addressing

IPv4 Address Types

Summary

Exam Essentials

Review Questions

Chapter 3: Easy Subnetting

Subnetting Basics

Summary

Exam Essentials

Review Questions

Chapter 4: Network Address Translation (NAT) & IPv6

When Do We Use NAT?

Types of Network Address Translation

NAT Names

How NAT Works

Why Do We Need IPv6?

The Benefits and Uses of IPv6

IPv6 Addressing and Expressions

How IPv6 Works in an Internetwork

Summary

Exam Essentials

Review Questions

Chapter 5: IP Routing

Routing Basics

The IP Routing Process

Configuring IP Routing

Dynamic Routing

Summary

Exam Essentials

Review Questions

Chapter 6: Switching

Switching Services

VLAN Basics

Identifying VLANs

Routing Between VLANs

Summary

Exam Essentials

Review Questions

Chapter 7: Cables and Connectors

The Basic Network Topologies

Physical Network Topologies

Physical Media

Summary

Exam Essentials

Review Questions

Chapter 8: Wireless Technologies

Wireless Networks

Basic Wireless Devices

Wireless Principles

Nonoverlapping Wi-Fi channels

Cellular Technologies

Technologies That Facilitate the Internet of Things

Wireless Security

Network Host Utilities

Summary

Exam Essentials

Review Questions

Chapter 9: Cisco Devices

Status Lights

Connecting to a Cisco Device

Physical Ports and Cables

Remote Access

Cisco Device

show

Commands

Summary

Exam Essentials

Review Questions

Chapter 10: Security

Firewalls

Confidentiality, Integrity, Availability

Authentication Methods

Threats

Vulnerabilities

Summary

Exam Essentials

Review Questions

Chapter 11: Cloud & IoT

Cloud Computing and Its Effect on the Enterprise Network

Cloud Concepts

Cloud Endpoints

Summary

Exam Essentials

Review Questions

Chapter 12: Troubleshooting

Help Desk

The Security Policy

Information Gathering Using Network Documentation

Documentation and Diagrams

Seven-Step Troubleshooting Process

Wireshark

Diagnostic Commands

Summary

Exam Essentials

Review Questions

Appendix: Answers to Review Questions

Chapter 1: Internetworking

Chapter 2: Introduction to TCP/IP

Chapter 3: Easy Subnetting

Chapter 4: Network Address Translation (NAT) and IPv6

Chapter 5: IP Routing

Chapter 6: Switching

Chapter 7: Cables and Connectors

Chapter 8: Wireless Technologies

Chapter 9: Cisco Devices

Chapter 10: Security

Chapter 11: Cloud & IoT

Chapter 12:  Troubleshooting

Index

End User License Agreement

List of Tables

Chapter 2

TABLE 2.1 Key features of TCP and UDP

TABLE 2.2 Key protocols that use TCP and UDP

TABLE 2.3 Possible protocols found in the Protocol field of an IP header

TABLE 2.4 Reserved IP addresses

TABLE 2.5 Reserved IP address space

Chapter 3

TABLE 3.1 Default subnet mask

TABLE 3.2 CIDR values

TABLE 3.3 What do you know?

Chapter 4

TABLE 4.1 Advantages and disadvantages of implementing NAT

TABLE 4.2 NAT terms

TABLE 4.3 Special IPv6 addresses

Chapter 5

TABLE 5.1 Default administrative distances

Chapter 7

TABLE 7.1 Coaxial cable specifications

Chapter 8

TABLE 8.1 Range and speed comparisons

TABLE 8.2 Cellular comparisons

TABLE 8.3 WPA, WPA2, and WPA3 compared

Chapter 9

TABLE 9.1 Output of the

show cdp neighbors

command

Chapter 12

TABLE 12.1 Standard TIA/EIA 568B wiring

List of Illustrations

Chapter 1

FIGURE 1.1 A very basic network

FIGURE 1.2 A switch can break up collision domains

FIGURE 1.3 Routers create an internetwork

FIGURE 1.4 Internetworking devices

FIGURE 1.5 Switched networks creating an internetwork

FIGURE 1.6 Other devices typically found in our internetworks today

FIGURE 1.7 The upper layers

FIGURE 1.8 The lower layers

FIGURE 1.9 OSI layer functions

FIGURE 1.10 Establishing a connection-oriented session

FIGURE 1.11 Transmitting segments with flow control

FIGURE 1.12 Windowing

FIGURE 1.13 Transport layer reliable delivery

FIGURE 1.14 A routing table used in a router

FIGURE 1.15 A router in an internetwork. Each router LAN interface is a bro...

FIGURE 1.16 The Data Link layer

FIGURE 1.17 A switch in an internetwork

FIGURE 1.18 A hub in a network

FIGURE 1.19 Physical vs. logical topologies

Chapter 2

FIGURE 2.1 The DoD and OSI models

FIGURE 2.2 The TCP/IP protocol suite

FIGURE 2.3 Telnet

FIGURE 2.4 Secure Shell

FIGURE 2.5 FTP

FIGURE 2.6 TFTP

FIGURE 2.7 SNMP

FIGURE 2.8 HTTP

FIGURE 2.9 NTP

FIGURE 2.10 DNS

FIGURE 2.11 DHCP client four-step process

FIGURE 2.12 TCP segment format

FIGURE 2.13 UDP segment

FIGURE 2.14 Port numbers for TCP and UDP

FIGURE 2.15 An IP header

FIGURE 2.16 The Protocol field in an IP header

FIGURE 2.17 An ICMP error message sent to the sending host from the remote ...

FIGURE 2.18 ICMP in action

FIGURE 2.19 A local ARP broadcast

FIGURE 2.20 A summary of the three classes of networks

FIGURE 2.21 Local layer 2 broadcasts

FIGURE 2.22 Layer 3 broadcasts

FIGURE 2.23 Unicast address

FIGURE 2.24 An EIGRP multicast example

Chapter 3

FIGURE 3.1 One network

FIGURE 3.2 Multiple networks connected together

FIGURE 3.3 Implementing a Class C /25 logical network

FIGURE 3.4 Implementing a class C /26 (with three networks)

FIGURE 3.5 Implementing a Class C /27 logical network

Chapter 4

FIGURE 4.1 Where to configure NAT

FIGURE 4.2 Basic NAT translation

FIGURE 4.3 NAT overloading example (PAT)

FIGURE 4.4 IPv6 address example

FIGURE 4.5 IPv6 global unicast addresses

FIGURE 4.6 IPv6 link local FE80::/10: The first 10 bits define the address ...

FIGURE 4.7 EUI-64 interface ID assignment

FIGURE 4.8 Router solicitation (RS) and router advertisement (RA)

FIGURE 4.9 Neighbor solicitation (NS) and neighbor advertisement (NA)

Chapter 5

FIGURE 5.1 A simple routing example

FIGURE 5.2 IP routing example using two hosts and one router

FIGURE 5.3 Frame used from Host A to the Lab_A router when Host B is pinged...

FIGURE 5.4 IP routing example 1

FIGURE 5.5 IP routing example 2

FIGURE 5.6 Basic IP routing using MAC and IP addresses

FIGURE 5.7 Testing basic routing knowledge

Chapter 6

FIGURE 6.1 An empty forward/filter table on a switch

FIGURE 6.2 How switches learn hosts’ locations

FIGURE 6.3 A forward/filter table

FIGURE 6.4 A forward/filter table answer

FIGURE 6.5 A broadcast storm

FIGURE 6.6 Multiple frame copies

FIGURE 6.7 The flat network structure

FIGURE 6.8 The benefit of a switched network

FIGURE 6.9 One switch, one LAN: Before VLANs, there were no separations bet...

FIGURE 6.10 One switch, two virtual LANs (

logical

separation between hosts)...

FIGURE 6.11 Access ports

FIGURE 6.12 VLANs can span across multiple switches by using trunk links, w...

FIGURE 6.13 A router connecting three VLANs together for inter-VLAN communi...

FIGURE 6.14 Router on a stick: a single router interface connecting all thr...

FIGURE 6.15 A router creates logical interfaces.

FIGURE 6.16 With IVR, routing runs on the backplane of the switch, and it a...

Chapter 7

FIGURE 7.1 A basic network

FIGURE 7.2 Two separate LANs (workgroups)

FIGURE 7.3 A router connects LANs.

FIGURE 7.4 An internetwork

FIGURE 7.5 A typical bus network's physical topology

FIGURE 7.6 Typical star topology with a hub

FIGURE 7.7 A typical ring topology

FIGURE 7.8 A typical mesh topology

FIGURE 7.9 Three point-to-point connections

FIGURE 7.10 A point-to-multipoint network, example 1

FIGURE 7.11 A point-to-multipoint network, example 2

FIGURE 7.12 A simple hybrid network

FIGURE 7.13 A stripped-back thinnet cable

FIGURE 7.14 Male and female BNC connectors

FIGURE 7.15 Cat 5e UTP cable

FIGURE 7.16 RJ-11 and RJ-45 connectors

FIGURE 7.17 The pinouts in an RJ-45 connector, T568B standard

FIGURE 7.18 An example of an ST connector

FIGURE 7.19 A sample SC connector

FIGURE 7.20 An MT-RJ fiber-optic connector

FIGURE 7.21 An LC fiber-optic connector

Chapter 8

FIGURE 8.1 Wireless LANs are an extension of our existing LANs.

FIGURE 8.2 Today's wireless networks

FIGURE 8.3 A wireless access point

FIGURE 8.4 A wireless NIC

FIGURE 8.5 A wireless network in ad hoc mode

FIGURE 8.6 Basic service set/basic service area

FIGURE 8.7 A network with MBSSIDs configured on an AP

FIGURE 8.8 An extended service set (ESS) network

FIGURE 8.9 2.4 GHz band 22 MHz-wide channels

FIGURE 8.10 5 GHz band 20 MHz-wide channels

FIGURE 8.11 Comparing Wi-Fi 5 to Wi-Fi 6

FIGURE 8.12 Shared-key authentication

FIGURE 8.13 Open access process

Chapter 9

FIGURE 9.1 A typical Cisco Catalyst switch

FIGURE 9.2 A Cisco modular router

FIGURE 9.3 A Cisco 1000 router with 6G

FIGURE 9.4 Adding a device into a rack

FIGURE 9.5 A rolled Ethernet cable

FIGURE 9.6 Configuring your console emulation program

FIGURE 9.7 A Cisco switch with two console ports

FIGURE 9.8 A Cisco 2500 router with serial ports

FIGURE 9.9 A USB connector

FIGURE 9.10 A USB plug

FIGURE 9.11 A Cisco GLC-T 1000BaseT transceiver

FIGURE 9.12 A Cisco GLC-LH-SMD transceiver

FIGURE 9.13 Category 5 enhanced UTP cable

FIGURE 9.14 A straight-through Ethernet cable

FIGURE 9.15 A crossover Ethernet cable

FIGURE 9.16 Typical uses for straight-through and cross-over Ethernet cable...

FIGURE 9.17 UTP Gigabit crossover Ethernet cable

FIGURE 9.18 NGFW ports provide PoE

FIGURE 9.19 Telnet

FIGURE 9.20 Secure Shell

FIGURE 9.21 An example of using a VPN

FIGURE 9.22 SNMP GET and TRAP messages

FIGURE 9.23 A Meraki switch configuration

FIGURE 9.24 Documenting a network topology using CDP

FIGURE 9.25 Network topology documented

FIGURE 9.26 Forward/filter table

FIGURE 9.27 Forward/filter table answer

Chapter 10

FIGURE 10.1 Firewalls with a DMZ

FIGURE 10.2 Two networks with an ACL-enabled router

FIGURE 10.3 Adding a new AD user

FIGURE 10.4 Adding a user to an AD group

FIGURE 10.5 External authentication options

FIGURE 10.6 Password Policy settings

FIGURE 10.7 An email virus spreading rapidly

FIGURE 10.8 A botnet

Chapter 11

FIGURE 11.1 Cloud computing is on demand.

FIGURE 11.2 Advantages of cloud computing

FIGURE 11.3 Cloud computing services

FIGURE 11.4 A hardened industrial switch

FIGURE 11.5 An IoT VoIP phone

Chapter 12

FIGURE 12.1 A sample help desk flowchart

FIGURE 12.2 A security policy flowchart

FIGURE 12.3 A sample help desk ticket

FIGURE 12.4 SNMP NMS station receiving a trap

FIGURE 12.5 An RJ-45 connector

FIGURE 12.6 Two ends of a crossover cable

FIGURE 12.7 Cisco's seven-step troubleshooting process

FIGURE 12.8 Selecting an interface

FIGURE 12.9 A running packet capture

FIGURE 12.10 Saving a packet capture

FIGURE 12.11 ICMP being blocked by the Cisco NGFW

FIGURE 12.12 The Network Connections page

FIGURE 12.13 The IPv4 Properties page

FIGURE 12.14 Setting the IP and DNS addresses

FIGURE 12.15 The IP Settings tab

FIGURE 12.16 The DNS tab

FIGURE 12.17 Verifying IP information

FIGURE 12.18

ipconfig

FIGURE 12.19

ipconfig /all

FIGURE 12.20 PowerShell

FIGURE 12.21 MacOS

FIGURE 12.22 The MacOS TCP/IP tab

FIGURE 12.23 The MacOS DNS tab

FIGURE 12.24 The MacOS

ifconfig command

FIGURE 12.25 Ubuntu IP Settings

FIGURE 12.26 The Linux gear icon

FIGURE 12.27

Fast.com

FIGURE 12.28

Speedof.me

Guide

Cover

Table of Contents

Title Page

Copyright

Acknowledgments

About the Authors

About the Technical Editor

Introduction

Begin Reading

Appendix: Answers to Review Questions

Index

End User License Agreement

Pages

iii

iv

v

vii

ix

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

CCST® Cisco Certified Support Technician Study Guide

Networking Exam

 

 

Todd Lammle

Donald Robb

 

Copyright © 2024 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada and the United Kingdom.

ISBNs: 9781394205806 (paperback), 9781394205820 (ePDF), 9781394205813 (ePub)

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.

Trademarks: WILEY, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Control Number: 2023945430

Cover image: © Jeremy Woodhouse/Getty ImagesCover design: Wiley

Acknowledgments

Many people helped me build the new Cisco certification books in 2023 and 2024. Kenyon Brown helped me put together the book direction. He managed the internal editing at Wiley, so thank you, Ken, for working diligently for many months to keep these books moving.

Kim Wimpsett is always such a pleasure to work with that I get excited when she is assigned to work with me on a new project because I know the project will be okay. As a developmental editor, Kim is top-notch, low-key, and she helps keep everyone calm and on track. Not an easy thing in this field!

Thanks to Donald Robb, who is helping me assemble the CCST series! He was instrumental in helping me build the table of contents of both books and helped with some chapters in this book. He is writing most of the Cyber CCST book as well.

This is the first time I have worked with John Sleeva as CE, and he has done an excellent job, keeping edits to the minimum so as not to lose the voicing created for this book series. Thank you, John! Looking forward to working with you on the rest of the series.

The technical editor I used for the first book in the CCST series was Jon Buhagiar, who read each chapter in the entire series multiple times, making extraordinary discoveries both technically and editorially. Thank you, Jon!

About the Authors

Todd Lammle is the authority on Cisco certification and internetworking and is certified in most Cisco certification categories. He is a world-renowned author, speaker, trainer, and consultant. Todd has three decades of experience working with LANs, WANs, and large enterprise licensed and unlicensed wireless networks, and lately he's been implementing large Cisco Security networks using Firepower/FTD and ISE.

His years of real-world experience are evident in his writing; he is not just an author but an experienced networking engineer with very practical experience from working on the largest networks in the world, at such companies as Xerox, Hughes Aircraft, Texaco, AAA, Cisco, and Toshiba, among many others.

Todd has published over 130 books, including the very popular CCNA: Cisco Certified Network Associate Study Guide, CCNA Wireless Study Guide, CCNA Data Center Study Guide, and CCNP Security—among over a hundred more—all from Sybex. He runs an international consulting and training company based in northern Idaho, where he spends his free time in the mountains playing with his golden retrievers.

You can reach Todd through his website at www.lammle.com.

Donald Robb, also known as the-packet-thrower, has become very well known in the networking and security field for his ability to thrive in complex environments during his 15+ years in the industry. He has worked with practically every major vendor in the industry and has earned more than 100 certifications, including a Juniper JNCIE and many Cisco certifications.

Donald is an author, a trainer who frequently works with Todd Lammle, and a consultant. He currently works as a principal network architect for a world-wide company. In his free time, he enjoys playing with his kitties and explaining to his wife that she needs to read this book to know why Netflix isn't working.

About the Technical Editor

Jon Buhagiar (Network+, A+, CCNA, MCSA, MCSE, BS/ITM) is an information technology professional with two decades of experience in higher education. During the past 23 years, he has been responsible for Network Operations at Pittsburgh Technical College and has lead several projects, such as virtualization (server and desktop), VoIP, Microsoft 365, and many other projects supporting the quality of education at the college. He has achieved several certifications from Cisco, CompTIA, and Microsoft, and has taught many of the certification paths. He is the author of several books, including Sybex's CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 (2022), CompTIA Network+ Review Guide: Exam N10-008 (2021) and CCNA Certification Practice Tests: Exam 200-301 (2020).

Introduction

Welcome to the exciting world of internetworking and your path towards Cisco certification. If you've picked up this book because you want to improve yourself and your life with a better, more satisfying, and secure job, you've chosen well!

Whether you're striving to enter the thriving, dynamic IT sector or seeking to enhance your skill set and advance your position within it, being Cisco certified can seriously stack the odds in your favor to help you attain your goals. This book is a great start.

Cisco certifications are powerful instruments of success that also markedly improve your grasp of all things internetworking. As you progress through this book, you'll gain a strong, foundational understanding of networking that reaches far beyond Cisco devices. And when you finish this book, you'll be ready to tackle the next step toward Cisco certification.

Essentially, by beginning your journey towards becoming Cisco certified, you're proudly announcing that you want to become an unrivaled networking expert, a goal that this book will help get you underway to achieving.

Congratulations in advance for taking the first step towards your brilliant future!

To find bonus material, including Todd Lammle videos and extra practice questions, please see www.lammle.com/ccst.

Cisco's CCST Certifications

It used to be that to secure the holy grail of Cisco certifications—the CCIE—you passed only one written test before being faced with a grueling, formidable hands-on lab. This intensely daunting, all-or-nothing approach made it nearly impossible to succeed and predictably didn't work out too well for most people.

Cisco responded to this issue by creating a series of new certifications, which not only created a sensible, stepping-stone-path to the highly coveted CCIE prize but also gave employers a way to accurately rate and measure the skill levels of prospective and current employees.

The CCNA and CCNP exams were born and are still the most popular certifications in the world. This exciting paradigm shift in Cisco's certification path truly opened doors that few were allowed through before!

Now Cisco has reached down and created a new introductory-level certification program, below the CCNA, called the Cisco Certified Support Technician (CCST). There are two exams/certifications: Networking and Cybersecurity.

The Cisco Certified Support Technician (CCST) Networking certification validates an individual's skills and knowledge of entry-level networking concepts and topics. The certification demonstrates foundational knowledge and skills needed to show how networks operate, including the devices, media, and protocols that enable network communications. The Networking certification is also a first step toward working on achieving your CCNA Certification.

The Cisco Certified Support Technician (CCST) Cybersecurity certification validates a candidate's skills and knowledge of entry-level cybersecurity concepts and topics, including security principles, network security and endpoint security concepts, vulnerability assessment and risk management, and incident handling. The Cybersecurity certification is also a first step toward CyberOps Associate certification.

This book is a powerful tool to get you started in your Cisco certification studies, and it's vital to understand the material in it before you go on to conquer any other certifications!

Exam policies can change from time to time. We highly recommend that you check both Cisco and Certiport (www.certiport.com) sites for the most up-to-date information when you begin your preparing when you register, and then again a few days before your scheduled exam date.

Tips for Taking the CCST Network Exam

Here are some general tips for taking your exam successfully (assuming you are going in person, as online testing is available as well):

This is not like the CCNA or other Cisco certification tests that are available on

www.vue.com

. You need to instead go to

www.certiport.com/locator

to both register and pay for your exam. You can take the exams in person at a center or in your home or office, under direct video and audio supervision. For exams at home information and to sign up, call (800) 589-6871.

Bring two forms of ID with you. One must be a photo ID, such as a driver's license. The other can be a major credit card or a passport. Both forms must include a signature.

Arrive early at the exam center so that you can relax and review your study materials, particularly tables and lists of exam-related information. After you are ready to enter the testing room, you will need to leave everything outside; you won't be able to bring any materials into the testing area.

Read the questions carefully. Don't be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.

Don't leave any questions unanswered. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.

When answering multiple-choice questions you're not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

Who Should Read This Book?

You—if want to pass the CCST Networking exam confidently! This book is chock-full of the exact information you need and directly maps to CCST Networking exam objectives, so if you use it to study for the exam, your odds of passing shoot way up.

In addition to including every bit of knowledge you need to learn to pass the exam, I've included some really great tips and solid wisdom to equip you even further to successfully work in the real IT world.

What's Included in the Book

I've included several study tools throughout the book:

Assessment Test

   At the end of this Introduction is an assessment test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas you might need to brush up on. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.

Objective Map and Opening List of Objectives

   This Introduction includes a detailed exam objective map showing you where each of the exam objectives is covered in the book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each exam topic is covered.

Exam Essentials

   Each chapter, just after the summary, includes a number of exam essentials. These are the key topics you should take from the chapter in terms of areas to focus on when preparing for the exam.

Chapter Review Questions

   To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and check your answers; the correct answers and explanations are in Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you correctly answer the next time you're tested on the material.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies this book provides a test bank with study tools to help you prepare for the certification exam and increase your chances of passing it the first time! The test bank includes the following tools:

Sample Tests

   All of the questions in this book are provided, including the assessment test, which you'll find at the end of this Introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there is an online practice exam. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards

   Approximately 100 questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Other Study Tools

   A glossary of key terms from this book is available as a fully searchable PDF.

Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank.

How to Use This Book

If you want a solid foundation for the serious effort of preparing for the Cisco CCST Networking exam, then look no further, because I've spent countless hours putting together this book with the sole intention of helping you pass it!

This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here's a list that describes how to approach studying:

Take the assessment test immediately following this Introduction. (The answers are at the end of the test, but no peeking!) It's okay if you don't know any of the answers—that's what this book is for. Carefully read over the explanations for any question you get wrong and make note of the chapters where that material is covered.

Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.

Answer all the review questions related to each chapter. Specifically note any questions that confuse you and study the corresponding sections of the book again. And don't just skim these questions—make sure you understand each answer completely.

Before you take your test, be sure to visit my website

www.lammle.com

for questions, videos, audios, and other useful information.

Test yourself using all the electronic flashcards. This is a brand-new and updated flashcard program to help you prepare for the latest Cisco CCST Network exam, and it is a great study tool.

I tell you no lies—learning every bit of the material in this book is going to require applying yourself with a good measure of discipline. So, try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.

The figures in this book are in black and white in the print edition; however, in the e-book, they are all in color.

What Does This Book Cover?

This book covers everything you need to know to solidly prepare you for getting into your CCST studies. Be advised that just because much of the material in this book won't be official Cisco CCST objectives in the future, that doesn't mean you won't be tested on it. Understanding the foundational, real-world networking information and skills offered in this book is critical to your certifications and your career!

Here's a snapshot of what you'll learn as you move through the book:

Chapter 1

: Internetworking

   In

Chapter 1

, you'll learn the basics of the Open Systems Interconnection (OSI) model the way Cisco wants you to learn it.

Chapter 2

: Introduction to TCP/IP

   

Chapter 2

provides you with the background necessary for success on the CCST/CCNA/NP exams, as well as in the real world, with a thorough presentation of TCP/IP. It's an in-depth chapter that covers the very beginnings of the Internet Protocol stack and moves all the way to IP addressing. You'll gain an understanding of the difference between a network address and a broadcast address before finally ending with valuable network troubleshooting tips.

Chapter 3

: Easy Subnetting

   Believe it or not, you'll actually be able to subnet a network in your head after reading this chapter! Success will take a little determination, but you can do it.

Chapter 4

: Network Address Translation (NAT) and IPv6

   Network Address Translation (NAT) is very useful in today's world. Maybe people believed that IPv6 would take over the world, but because of NAT, it's still not as prevalent as IPv4. After learning about NAT, you'll find a small but powerful section on IPv6. You'll love it!

Chapter 5

: IP Routing

   This is a super fun chapter because you will learn about static, default, and dynamic routing. The fundamentals covered in this chapter are probably the most important in the book because understanding the IP routing process is what Cisco is all about! It's actually assumed that you solidly possess this knowledge when you get into the CCNA and CCNP studies, but rest assured, I wrote this as an introduction chapter.

Chapter 6

: Switching

   In

Chapter 6

, you'll learn how switches break up large collision domains into smaller ones and that a collision domain is a network segment with two or more devices sharing the same bandwidth. You will learn how switch ports create one collision domain per host. The chapter also surveys and compares how networks were designed before and after switching technologies were introduced.

Chapter 7

: Cables and Connectors

   

Chapter 7

discusses the various types of devices and technologies that are used to create networks, as well as the basic network topologies and how they work together. Ethernet cabling is important, and this chapter covers that fully.

Chapter 8

: Wireless Technologies

   

Chapter 8

begins by defining a basic wireless network as well as basic wireless principles. I'll also talk about different types of wireless networks, the minimum devices required to create a simple wireless network, and some basic wireless topologies. Finally, I'll get into basic security by covering WPA, WPA2, and WPA3.

Chapter 9

: Cisco Devices

   This chapter covers both network infrastructure and diagnosing problems. You need to be able to look at a basic Cisco device and understand some simple lights and their meaning, as well as be able to understand various type of cables and how they will be used for connecting to devices using different types of ports. I'll also cover how to connect and access local and remote network devices, as well as some basic Cisco IOS commands to help you find and diagnose problems.

Chapter 10

: Security

   This chapter covers authentication, authorization, and accounting, or AAA. AAA is a technology that gives us substantial control over users and what they're permitted to do inside our networks. That's just the beginning—there are more tools in the box! RADIUS and TACACS+ and security servers, like Identity Services Engine (ISE), help us implement a centralized security plan by recording network events to the security server, or to a Syslog server via logging.

Chapter 11

: Cloud & IoT

   Basically, cloud computing can provide virtualized processing, storage, and computing resources to users remotely, making the resources transparently available regardless of the user connection.

Chapter 11

starts by discussing cloud computing and then moves on to cloud concepts and IoT endpoints.

Chapter 12

: Troubleshooting

   

Chapter 12

discusses the help desk, including its purpose, policies and procedures, ticking, documentation, and information gathering. From there, you need to understand documentation and that maintaining updated documents is a large part of working a help desk. You also need to know Cisco's seven steps for helping help-desk personnel find and solve problems. In addition, Wireshark is an important objective, so I'll introduce that product to you. Lastly, you'll learn some important Cisco IP and network troubleshooting techniques to ensure that you're well equipped with these key skills.

Exam Objectives

You're probably pretty curious about the CCST Networking exam's objectives, right? Cisco asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam.

The following table lists the objectives and which chapter discusses them. Note that a single objective can be covered in multiple chapters.

Objective

Chapter

1. Standards and Concepts

1

,

2

,

7

,

11

,

12

1.1. Identify the fundamental conceptual building blocks of networks.

1

,

2

TCP/IP model, OSI model, frames and packets, addressing

1

,

2

1.2. Differentiate between bandwidth and throughput.

12

Latency, delay, speed test vs. Iperf

12

1.3. Differentiate between LAN, WAN, MAN, CAN, PAN, and WLAN.

7

Identify and illustrate common physical and logical network topologies

7

1.4. Compare and contrast cloud and on-premises applications and services.

11

Public, private, hybrid, SaaS, PaaS, IaaS, remote work/hybrid work

11

1.5. Describe common network applications and protocols.

2

TCP vs. UDP (connection-oriented vs. connectionless), FTP, SFTP, TFTP, HTTP, HTTPS, DHCP, DNS, ICMP, NTP

2

2. Addressing and Subnet Formats

3

,

4

2.1. Compare and contrast private addresses and public addresses.

3

,

4

Address classes, NAT concepts

3

,

4

2.2. Identify IPv4 addresses and subnet formats.

3

Subnet concepts, Subnet Calculator, slash notation, and subnet mask; broadcast domain

3

2.3. Identify IPv6 addresses and prefix formats.

3

,

4

Types of addresses, prefix concepts

3

,

4

3. Endpoints and Media Types

7

,

8

,

11

3.1. Identify cables and connectors commonly used in local area networks.

7

Cable types: fiber, copper, twisted pair; Connector types: coax, RJ-45, RJ-11, fiber connector types

7

3.2. Differentiate between Wi-Fi, cellular, and wired network technologies.

8

Copper, including sources of interference; fiber; wireless, including 802.11 (unlicensed, 2.4GHz, 5GHz, 6GHz), cellular (licensed), sources of interference

8

3.3. Describe endpoint devices.

11

Internet of Things (IoT) devices, computers, mobile devices, IP Phone, printer, server

11

3.4. Demonstrate how to set up and check network connectivity on Windows, Linux, Mac OS, Android, and Apple iOS.

8

Networking utilities on Windows, Linux, Android, and Apple operating systems; how to run troubleshooting commands; wireless client settings (SSID, authentication, WPA mode)

8

4. Infrastructure

5

,

6

4.1. Identify the status lights on a Cisco device when given instruction by an engineer.

9

Link light color and status (blinking or solid)

9

4.2. Use a network diagram provided by an engineer to attach the appropriate cables.

9

Patch cables, switches and routers, small topologies, power, rack layout

9

4.3. Identify the various ports on network devices.

9

Console port, serial port, fiber port, Ethernet ports, SFPs, USB port, PoE

9

4.4. Explain basic routing concepts.

5

,

6

Default gateway, layer 2 vs. layer 3 switches, local network vs. remote network

5

,

6

4.5. Explain basic switching concepts.

6

MAC address tables, MAC address filtering, VLAN

6

5. Diagnosing Problems

9

,

12

5.1. Demonstrate effective troubleshooting methodologies and help desk best practices, including ticketing, documentation, and information gathering.

12

Policies and procedures, accurate and complete documentation, prioritization

12

5.2. Perform a packet capture with Wireshark and save it to a file.

12

Purpose of using a packet analyzer, saving and opening a .pcap file

12

5.3. Run basic diagnostic commands and interpret the results.

12

ping, ipconfig/ifconfig/ip, tracert/traceroute, nslookup; recognize how firewalls can influence the result

12

5.4. Differentiate between different ways to access and collect data about network devices.

9

Remote access (RDP, SSH, telnet), VPN, terminal emulators, Console, Network Management Systems, cloud-managed network (Meraki), scripts

9

5.5. Run basic show commands on a Cisco network device.

9

show run, show cdp neighbors, show ip interface brief, show ip route, show version, show inventory, show switch, show mac address-table, show interface, show interface x, show interface status; privilege levels; command help and auto-complete

9

6. Security

8

,

10

6.1. Describe how firewalls operate to filter traffic.

10

Firewalls (blocked ports and protocols); rules deny or permit access

10

6.2. Describe foundational security concepts.

10

Confidentiality, integrity, and availability (CIA); authentication, authorization, and accounting (AAA); Multifactor Authentication (MFA); encryption, certificates, and password complexity; identity stores/databases (Active Directory); threats and vulnerabilities; spam, phishing, malware, and denial of service

10

6.3. Configure basic wireless security on a home router (WPAx).

8

WPA, WPA2, WPA3; choosing between Personal and Enterprise; wireless security concepts

8

Like all exams, the Cisco CCST certification is updated periodically and may eventually be retired or replaced. At some point after Cisco is no longer offering this exam, the old editions of our books and online tools will be retired. If you have purchased this book after the exam was retired or are attempting to register in the Sybex online learning environment after the exam was retired, please know that we make no guarantees that this exam's online Sybex tools will be available once the exam is no longer available.

How to Contact the Publisher

If you believe you have found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.

In order to submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”

Assessment Test

In which of the following layers of the OSI model are MAC addresses defined?

Data Link

Presentation

Transport

Physical

Which of the following is a function of an access point (AP)?

To automatically handle the configuration of wireless access points

To monitor and control the incoming and outgoing network traffic

To allow wireless devices to connect to a wireless network and connect to wired resources

To connect networks and intelligently choose the best paths between networks

Which of the following statements regarding ICMP packets are true? (Choose two.)

ICMP guarantees datagram delivery.

ICMP can provide hosts with information about network problems.

ICMP is encapsulated within layer 3 packets.

ICMP is encapsulated within UDP datagrams.

What is the address range of a Class A network address in binary?

01

xxxxxx

0

xxxxxxx

10

xxxxxx

110

xxxxx

You have an interface on a router with the IP address of 192.168.192.20/29. What is the broadcast address on this LAN?

192.168.192.23

192.168.192.31

192.168.192.63

192.168.192.127

192.168.192.255

You need to subnet a network that has 10 subnets, each with at least 10 hosts. Which classful subnet mask would you use?

255.255.255.192

255.255.255.224

255.255.255.240

255.255.255.248

Which of the following descriptions about IPv6 is correct?

Addresses are not hierarchical and are assigned at random.

Broadcasts have been eliminated and replaced with multicasts.

There are 2.7 billion addresses.

An interface can be configured with only one IPv6 address.

In NAT, an inside global address is which of the following?

The inside host's address before translation

The inside host's address after translation

The address that inside hosts use to get to the Internet

The outside address used by the external router port

What does the

99

at the end of the following command mean?

Router(config)#

ip route 192.168.13.0 255.255.255.0 10.31.2.4 99

Metric

Administrative distance

Hop count

Cost

A network administrator views the output from the

show ip route

command. A network that is advertised by both RIP and OSPF appears in the routing table flagged as an OSPF route. Why is the RIP route to this network not used in the routing table?

OSPF has a faster update timer.

OSPF has a lower administrative distance.

RIP has a higher metric value for that route.

The OSPF route has fewer hops.

The RIP path has a routing loop.

You log into a switch CLI and type a command. What command generated the following output?

Vlan Mac Address Type Ports]]>

---- ----------- -------- -----

All 0100.0ccc.cccc STATIC CPU

[output cut]

1 000e.83b2.e34b DYNAMIC Fa0/1

1 0011.1191.556f DYNAMIC Fa0/1

1 0011.3206.25cb DYNAMIC Fa0/1

1 001a.2f55.c9e8 DYNAMIC Fa0/1

1 001a.4d55.2f7e DYNAMIC Fa0/1

1 001c.575e.c891 DYNAMIC Fa0/1

1 b414.89d9.1886 DYNAMIC Fa0/5

1 b414.89d9.1887 DYNAMIC Fa0/6

Spanning Tree Protocol (STP) is used on layer 2 switches to solve problems. Which of the following problems are addressed by STP? (Choose three.)

Broadcast storms

Layer 2 loops

A device receiving multiple copies of the same frame

Gateway redundancy

Your boss asks you if you need to put single-mode fiber (SMF) or multimode fiber (MMF) between buildings. What is the difference between the two?

Electrical signals

Number of light rays

Number of digital signals

That signal-mode can be run a shorter distance

You have a group of accountants who have their computers and printers all connected into a single switch. What is this logical grouping of network users and resources called?

WAN

LAN

MPLS

Host

Two workers have established wireless communication directly between their wireless laptops. You need to create a wireless topology so that two finance employees can connect their laptops directly only to each other. What type of network is this?

IBSS

SSID

BSS

ESS

You start a new job and find that the company is running the older wireless security standard WPA instead of WPA2 or 3. What defines this WPA standard? (Choose two.)

It requires that all devices must use the same encryption key.

It specifies the use of dynamic encryption keys that change throughout the users connection time.

Static keys must be used.

It can use PSK authentication.

Which of the following is a network protocol that is designed as a secure alternative to command-based utilities such as Telnet?

SSL

SSH

STP

STFP

Which of the following commands provides a quick overview of all a device's interfaces, including the logical address and interface status at layers 1 and 2?

show running-config

show processes

show ip interface brief

show mac address-table

show interfaces

You need to secure your Cisco routers and switches with security protocols. Which of the following security server protocols are supported by Cisco routers and switches? (Choose three.)

AAA

RADIUS

Kerberos

DIA

TACACS+

Your boss asks you in a meeting of executives to define an exploit. What do you tell them?

This is when antivirus software uses definition files that identify known malware.

This is a system of ranking vulnerabilities that are discovered based on predefined metrics.

This is when a threat agent takes advantage of a vulnerability and uses it to advance an attack.

This is when a hacker confuses an internal user and gets them to turn over their credentials.

You want to move part of your data center to another location that is managed by someone else. You only want to move the server VMs. What is this called?

SaaS

PaaS

IaaS

DaaS

You want to move your data center and have the data center run the operating systems and the network infrastructure, and you can then load and run your own applications. What is this called?

SaaS

DaaS

IaaS

PaaS

Which of the following would you do after analyzing the problem described in the trouble ticket you are working on?

Gather information.

Eliminate possible causes.

Solve the problem.

Define the problem.

You just loaded the Wireshark program on your computer. What is the first thing you need to do before starting to capture packets?

Read the first frame you receive for license info.

Save the file.

Open all TCP packets, which always show the problem.

Choose the interface on which you want to receive the packets.

Answers to Assessment  Test

A.  The IEEE Ethernet Data Link layer has two sublayers: the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. MAC addresses are defined in the MAC sublayer. See

Chapter 1

for more information.

C.  Wireless APs are very popular today. The idea behind these devices (which are layer 2 bridge devices) is to connect wireless products to a wired Ethernet network. See

Chapter 1

for more information.

B, C.  ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and, because it is used for diagnostics, it will provide hosts with information about network problems. See

Chapter 2

for more information.

B.  The range of a Class A network address is 0–127. This makes our binary range 00000000 – 01111111. See

Chapter 2

for more information.

A.  A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are 0, 8, 16, 24, etc. 20 is in the 16 subnet. The next subnet is 24, so 23 is the broadcast address. See

Chapter 3

for more information.

C.  You need 10 subnets, each with at least 10 hosts. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts—this will not work. The mask 255.255.255.240 provides 16 subnets with 14 hosts. This is the best answer. See

Chapter 3

for more information.

B.  There are no broadcasts with IPv6. Unicast, multicast, anycast, global, and link-local unicast addresses are used. See

Chapter 4

for more information.

C.  An inside local address is an inside host address before translation. An inside global address is the address an inside host will use to get to the Internet or out of the local network. See

Chapter 4

for more information.

B.  The

99

at the end changes the default administrative distance (AD) of 1 to 99. See

Chapter 5

for more information.

B.  RIP has an administrative distance (AD) of 120, whereas OSPF has an administrative distance of 110, so the router will choose the route with a lower AD to the same network. See

Chapter 5

for more information.

show mac address-table

This command displays the forward filter table, also called a content-addressable memory (CAM) table. See Chapter 6 for more information.

A, B, C.  STP provides loop protection in layer 2 switched networks, which also stops multiple frame copies and broadcast storms. Gateway redundancy issues can be solved with Hot Standby Router Protocol (HSRP), which provides dynamic default gateways. See

Chapter 6

for more information.

B.  The difference between single-mode fibers and multimode fibers is in the number of light rays (and thus the number of signals) they can carry. Generally speaking, multimode fiber is used for shorter-distance applications, and single-mode fiber for longer distances. See

Chapter 7

for more information.

B.  A logical grouping of hosts is called a LAN, and you typically group them by connecting them to a hub or switch. See

Chapter 7

for more information.

A.  Two wireless hosts directly connected wirelessly is no different from two hosts connecting with a crossover cable. They are both ad hoc networks, but in wireless, we call this an independent basic service set (IBSS). See

Chapter 8

for more information.

B, D.  WPA, although using the same RC4 encryption that WEP uses, provides enhancements to the WEP protocol by using dynamic keys that change constantly. It also provides a pre-shared key (PSK) method of authentication. See

Chapter 8

for more information.

B.  Secure Shell (SSH) creates a secure channel between devices and provides confidentiality and integrity of the data transmission. It uses public-key cryptography to authenticate the remote computer and allows the remote computer to authenticate the user, if necessary. See

Chapter 9

for more information.

C.  The output of the Cisco IOS command

show ip interface brief

is very useful, providing all the device's interfaces, including the logical address and interface status at layers 1 and 2. See

Chapter 9

for more information.

B, C, E.  RADIUS, TACACS+, and Kerberos are the three types of security server protocols supported by Cisco routers. See

Chapter 10

for more information.

C.  An exploit occurs when a threat agent takes advantage of a vulnerability and uses it to advance an attack. Snort rules are created to stop hackers from attacking a known vulnerability. See

Chapter 10

for more information.

C.  IaaS delivers computer infrastructure—a platform virtualization environment where you can load your own server VMs. This is where the customer has the most control and management capability. See

Chapter 11

for more information.

D.  The vendor provides the hardware platform or data center and the software running on the platform, allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an application. An example is Windows Azure. See

Chapter 11

for more information.

B.  Cisco has created a seven-step troubleshooting process for help desk technicians to have a step-by-step approach to help find and fix issues. See

Chapter 12

for more information.

D.  Once the Wireshark program loads, you need to select which interface you want to do a packet capture on. If you have multiple interfaces in your computer, then you'll need to select the one that would have the traffic you are interested in seeing. See

Chapter 12

for more information.

Chapter 1Internetworking

THE CCST EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

1.0 Standards and Concepts

1.1. Identify the fundamental conceptual building blocks of networks.

TCP/IP model, OSI model, frames and packets, addressing

Welcome to the exciting world of internetworking. This first chapter will serve as an internetworking review by focusing on how to connect networks together using Cisco routers and switches, and I've written it with the assumption that you have some simple basic networking knowledge.

Let's start by defining exactly what an internetwork is: You create an internetwork when you connect two or more networks via a router and configure a logical network addressing scheme with a protocol such as IP or IPv6.

This chapter will also describe in detail each part of the Open Systems Interconnection (OSI) model. Understanding the OSI model is key for the solid foundation you'll need to build upon with the more advanced Cisco networking knowledge gained as you become increasingly more skilled.

The OSI model has seven hierarchical layers, which were developed to enable different networks to communicate reliably between disparate systems.

To find up-to-the-minute updates for this chapter, please see www.lammle.com/ccst.

Internetworking Basics