32,99 €
The ideal prep guide for earning your CCST Networking certification CCST Cisco Certified Support Technician Study Guide: Networking Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco networking guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Networking exam objectives. You'll find detailed information and examples for must-know Cisco networking topics, as well as practical insights drawn from real-world scenarios. This Study Guide provides authoritative coverage of key exam topics, including standards and concepts, addressing and subnet formats, endpoints and media types, infrastructure, diagnosing problems, and security. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards, and a glossary of important terminology, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions. The CCST Networking certification is an entry point into the Cisco certification program, and a pathway to the higher-level CCNA, so it's a great place to start as you build a rewarding career! * Study 100% of the topics covered on the Cisco CCST Networking certification exam * Get access to flashcards, practice questions, and more great resources online * Master difficult concepts with real-world examples and clear explanations * Learn about the career paths you can follow and what comes next after the CCST This Sybex study guide is perfect for anyone wanting to earn their CCST Networking certification, including entry-level network technicians, networking students, interns, and IT professionals.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 670
Veröffentlichungsjahr: 2023
Cover
Table of Contents
Title Page
Copyright
Acknowledgments
About the Authors
About the Technical Editor
Introduction
Cisco's CCST Certifications
What Does This Book Cover?
Exam Objectives
How to Contact the Publisher
Assessment Test
Chapter 1: Internetworking
Internetworking Basics
Internetworking Models
The OSI Reference Model
Summary
Exam Essentials
Review Questions
Chapter 2: Introduction to TCP/IP
Introducing TCP/IP
TCP/IP and the DoD Model
IP Addressing
IPv4 Address Types
Summary
Exam Essentials
Review Questions
Chapter 3: Easy Subnetting
Subnetting Basics
Summary
Exam Essentials
Review Questions
Chapter 4: Network Address Translation (NAT) & IPv6
When Do We Use NAT?
Types of Network Address Translation
NAT Names
How NAT Works
Why Do We Need IPv6?
The Benefits and Uses of IPv6
IPv6 Addressing and Expressions
How IPv6 Works in an Internetwork
Summary
Exam Essentials
Review Questions
Chapter 5: IP Routing
Routing Basics
The IP Routing Process
Configuring IP Routing
Dynamic Routing
Summary
Exam Essentials
Review Questions
Chapter 6: Switching
Switching Services
VLAN Basics
Identifying VLANs
Routing Between VLANs
Summary
Exam Essentials
Review Questions
Chapter 7: Cables and Connectors
The Basic Network Topologies
Physical Network Topologies
Physical Media
Summary
Exam Essentials
Review Questions
Chapter 8: Wireless Technologies
Wireless Networks
Basic Wireless Devices
Wireless Principles
Nonoverlapping Wi-Fi channels
Cellular Technologies
Technologies That Facilitate the Internet of Things
Wireless Security
Network Host Utilities
Summary
Exam Essentials
Review Questions
Chapter 9: Cisco Devices
Status Lights
Connecting to a Cisco Device
Physical Ports and Cables
Remote Access
Cisco Device
show
Commands
Summary
Exam Essentials
Review Questions
Chapter 10: Security
Firewalls
Confidentiality, Integrity, Availability
Authentication Methods
Threats
Vulnerabilities
Summary
Exam Essentials
Review Questions
Chapter 11: Cloud & IoT
Cloud Computing and Its Effect on the Enterprise Network
Cloud Concepts
Cloud Endpoints
Summary
Exam Essentials
Review Questions
Chapter 12: Troubleshooting
Help Desk
The Security Policy
Information Gathering Using Network Documentation
Documentation and Diagrams
Seven-Step Troubleshooting Process
Wireshark
Diagnostic Commands
Summary
Exam Essentials
Review Questions
Appendix: Answers to Review Questions
Chapter 1: Internetworking
Chapter 2: Introduction to TCP/IP
Chapter 3: Easy Subnetting
Chapter 4: Network Address Translation (NAT) and IPv6
Chapter 5: IP Routing
Chapter 6: Switching
Chapter 7: Cables and Connectors
Chapter 8: Wireless Technologies
Chapter 9: Cisco Devices
Chapter 10: Security
Chapter 11: Cloud & IoT
Chapter 12: Troubleshooting
Index
End User License Agreement
Chapter 2
TABLE 2.1 Key features of TCP and UDP
TABLE 2.2 Key protocols that use TCP and UDP
TABLE 2.3 Possible protocols found in the Protocol field of an IP header
TABLE 2.4 Reserved IP addresses
TABLE 2.5 Reserved IP address space
Chapter 3
TABLE 3.1 Default subnet mask
TABLE 3.2 CIDR values
TABLE 3.3 What do you know?
Chapter 4
TABLE 4.1 Advantages and disadvantages of implementing NAT
TABLE 4.2 NAT terms
TABLE 4.3 Special IPv6 addresses
Chapter 5
TABLE 5.1 Default administrative distances
Chapter 7
TABLE 7.1 Coaxial cable specifications
Chapter 8
TABLE 8.1 Range and speed comparisons
TABLE 8.2 Cellular comparisons
TABLE 8.3 WPA, WPA2, and WPA3 compared
Chapter 9
TABLE 9.1 Output of the
show cdp neighbors
command
Chapter 12
TABLE 12.1 Standard TIA/EIA 568B wiring
Chapter 1
FIGURE 1.1 A very basic network
FIGURE 1.2 A switch can break up collision domains
FIGURE 1.3 Routers create an internetwork
FIGURE 1.4 Internetworking devices
FIGURE 1.5 Switched networks creating an internetwork
FIGURE 1.6 Other devices typically found in our internetworks today
FIGURE 1.7 The upper layers
FIGURE 1.8 The lower layers
FIGURE 1.9 OSI layer functions
FIGURE 1.10 Establishing a connection-oriented session
FIGURE 1.11 Transmitting segments with flow control
FIGURE 1.12 Windowing
FIGURE 1.13 Transport layer reliable delivery
FIGURE 1.14 A routing table used in a router
FIGURE 1.15 A router in an internetwork. Each router LAN interface is a bro...
FIGURE 1.16 The Data Link layer
FIGURE 1.17 A switch in an internetwork
FIGURE 1.18 A hub in a network
FIGURE 1.19 Physical vs. logical topologies
Chapter 2
FIGURE 2.1 The DoD and OSI models
FIGURE 2.2 The TCP/IP protocol suite
FIGURE 2.3 Telnet
FIGURE 2.4 Secure Shell
FIGURE 2.5 FTP
FIGURE 2.6 TFTP
FIGURE 2.7 SNMP
FIGURE 2.8 HTTP
FIGURE 2.9 NTP
FIGURE 2.10 DNS
FIGURE 2.11 DHCP client four-step process
FIGURE 2.12 TCP segment format
FIGURE 2.13 UDP segment
FIGURE 2.14 Port numbers for TCP and UDP
FIGURE 2.15 An IP header
FIGURE 2.16 The Protocol field in an IP header
FIGURE 2.17 An ICMP error message sent to the sending host from the remote ...
FIGURE 2.18 ICMP in action
FIGURE 2.19 A local ARP broadcast
FIGURE 2.20 A summary of the three classes of networks
FIGURE 2.21 Local layer 2 broadcasts
FIGURE 2.22 Layer 3 broadcasts
FIGURE 2.23 Unicast address
FIGURE 2.24 An EIGRP multicast example
Chapter 3
FIGURE 3.1 One network
FIGURE 3.2 Multiple networks connected together
FIGURE 3.3 Implementing a Class C /25 logical network
FIGURE 3.4 Implementing a class C /26 (with three networks)
FIGURE 3.5 Implementing a Class C /27 logical network
Chapter 4
FIGURE 4.1 Where to configure NAT
FIGURE 4.2 Basic NAT translation
FIGURE 4.3 NAT overloading example (PAT)
FIGURE 4.4 IPv6 address example
FIGURE 4.5 IPv6 global unicast addresses
FIGURE 4.6 IPv6 link local FE80::/10: The first 10 bits define the address ...
FIGURE 4.7 EUI-64 interface ID assignment
FIGURE 4.8 Router solicitation (RS) and router advertisement (RA)
FIGURE 4.9 Neighbor solicitation (NS) and neighbor advertisement (NA)
Chapter 5
FIGURE 5.1 A simple routing example
FIGURE 5.2 IP routing example using two hosts and one router
FIGURE 5.3 Frame used from Host A to the Lab_A router when Host B is pinged...
FIGURE 5.4 IP routing example 1
FIGURE 5.5 IP routing example 2
FIGURE 5.6 Basic IP routing using MAC and IP addresses
FIGURE 5.7 Testing basic routing knowledge
Chapter 6
FIGURE 6.1 An empty forward/filter table on a switch
FIGURE 6.2 How switches learn hosts’ locations
FIGURE 6.3 A forward/filter table
FIGURE 6.4 A forward/filter table answer
FIGURE 6.5 A broadcast storm
FIGURE 6.6 Multiple frame copies
FIGURE 6.7 The flat network structure
FIGURE 6.8 The benefit of a switched network
FIGURE 6.9 One switch, one LAN: Before VLANs, there were no separations bet...
FIGURE 6.10 One switch, two virtual LANs (
logical
separation between hosts)...
FIGURE 6.11 Access ports
FIGURE 6.12 VLANs can span across multiple switches by using trunk links, w...
FIGURE 6.13 A router connecting three VLANs together for inter-VLAN communi...
FIGURE 6.14 Router on a stick: a single router interface connecting all thr...
FIGURE 6.15 A router creates logical interfaces.
FIGURE 6.16 With IVR, routing runs on the backplane of the switch, and it a...
Chapter 7
FIGURE 7.1 A basic network
FIGURE 7.2 Two separate LANs (workgroups)
FIGURE 7.3 A router connects LANs.
FIGURE 7.4 An internetwork
FIGURE 7.5 A typical bus network's physical topology
FIGURE 7.6 Typical star topology with a hub
FIGURE 7.7 A typical ring topology
FIGURE 7.8 A typical mesh topology
FIGURE 7.9 Three point-to-point connections
FIGURE 7.10 A point-to-multipoint network, example 1
FIGURE 7.11 A point-to-multipoint network, example 2
FIGURE 7.12 A simple hybrid network
FIGURE 7.13 A stripped-back thinnet cable
FIGURE 7.14 Male and female BNC connectors
FIGURE 7.15 Cat 5e UTP cable
FIGURE 7.16 RJ-11 and RJ-45 connectors
FIGURE 7.17 The pinouts in an RJ-45 connector, T568B standard
FIGURE 7.18 An example of an ST connector
FIGURE 7.19 A sample SC connector
FIGURE 7.20 An MT-RJ fiber-optic connector
FIGURE 7.21 An LC fiber-optic connector
Chapter 8
FIGURE 8.1 Wireless LANs are an extension of our existing LANs.
FIGURE 8.2 Today's wireless networks
FIGURE 8.3 A wireless access point
FIGURE 8.4 A wireless NIC
FIGURE 8.5 A wireless network in ad hoc mode
FIGURE 8.6 Basic service set/basic service area
FIGURE 8.7 A network with MBSSIDs configured on an AP
FIGURE 8.8 An extended service set (ESS) network
FIGURE 8.9 2.4 GHz band 22 MHz-wide channels
FIGURE 8.10 5 GHz band 20 MHz-wide channels
FIGURE 8.11 Comparing Wi-Fi 5 to Wi-Fi 6
FIGURE 8.12 Shared-key authentication
FIGURE 8.13 Open access process
Chapter 9
FIGURE 9.1 A typical Cisco Catalyst switch
FIGURE 9.2 A Cisco modular router
FIGURE 9.3 A Cisco 1000 router with 6G
FIGURE 9.4 Adding a device into a rack
FIGURE 9.5 A rolled Ethernet cable
FIGURE 9.6 Configuring your console emulation program
FIGURE 9.7 A Cisco switch with two console ports
FIGURE 9.8 A Cisco 2500 router with serial ports
FIGURE 9.9 A USB connector
FIGURE 9.10 A USB plug
FIGURE 9.11 A Cisco GLC-T 1000BaseT transceiver
FIGURE 9.12 A Cisco GLC-LH-SMD transceiver
FIGURE 9.13 Category 5 enhanced UTP cable
FIGURE 9.14 A straight-through Ethernet cable
FIGURE 9.15 A crossover Ethernet cable
FIGURE 9.16 Typical uses for straight-through and cross-over Ethernet cable...
FIGURE 9.17 UTP Gigabit crossover Ethernet cable
FIGURE 9.18 NGFW ports provide PoE
FIGURE 9.19 Telnet
FIGURE 9.20 Secure Shell
FIGURE 9.21 An example of using a VPN
FIGURE 9.22 SNMP GET and TRAP messages
FIGURE 9.23 A Meraki switch configuration
FIGURE 9.24 Documenting a network topology using CDP
FIGURE 9.25 Network topology documented
FIGURE 9.26 Forward/filter table
FIGURE 9.27 Forward/filter table answer
Chapter 10
FIGURE 10.1 Firewalls with a DMZ
FIGURE 10.2 Two networks with an ACL-enabled router
FIGURE 10.3 Adding a new AD user
FIGURE 10.4 Adding a user to an AD group
FIGURE 10.5 External authentication options
FIGURE 10.6 Password Policy settings
FIGURE 10.7 An email virus spreading rapidly
FIGURE 10.8 A botnet
Chapter 11
FIGURE 11.1 Cloud computing is on demand.
FIGURE 11.2 Advantages of cloud computing
FIGURE 11.3 Cloud computing services
FIGURE 11.4 A hardened industrial switch
FIGURE 11.5 An IoT VoIP phone
Chapter 12
FIGURE 12.1 A sample help desk flowchart
FIGURE 12.2 A security policy flowchart
FIGURE 12.3 A sample help desk ticket
FIGURE 12.4 SNMP NMS station receiving a trap
FIGURE 12.5 An RJ-45 connector
FIGURE 12.6 Two ends of a crossover cable
FIGURE 12.7 Cisco's seven-step troubleshooting process
FIGURE 12.8 Selecting an interface
FIGURE 12.9 A running packet capture
FIGURE 12.10 Saving a packet capture
FIGURE 12.11 ICMP being blocked by the Cisco NGFW
FIGURE 12.12 The Network Connections page
FIGURE 12.13 The IPv4 Properties page
FIGURE 12.14 Setting the IP and DNS addresses
FIGURE 12.15 The IP Settings tab
FIGURE 12.16 The DNS tab
FIGURE 12.17 Verifying IP information
FIGURE 12.18
ipconfig
FIGURE 12.19
ipconfig /all
FIGURE 12.20 PowerShell
FIGURE 12.21 MacOS
FIGURE 12.22 The MacOS TCP/IP tab
FIGURE 12.23 The MacOS DNS tab
FIGURE 12.24 The MacOS
ifconfig command
FIGURE 12.25 Ubuntu IP Settings
FIGURE 12.26 The Linux gear icon
FIGURE 12.27
Fast.com
FIGURE 12.28
Speedof.me
Cover
Table of Contents
Title Page
Copyright
Acknowledgments
About the Authors
About the Technical Editor
Introduction
Begin Reading
Appendix: Answers to Review Questions
Index
End User License Agreement
iii
iv
v
vii
ix
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
Todd Lammle
Donald Robb
Copyright © 2024 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada and the United Kingdom.
ISBNs: 9781394205806 (paperback), 9781394205820 (ePDF), 9781394205813 (ePub)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.
Trademarks: WILEY, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Control Number: 2023945430
Cover image: © Jeremy Woodhouse/Getty ImagesCover design: Wiley
Many people helped me build the new Cisco certification books in 2023 and 2024. Kenyon Brown helped me put together the book direction. He managed the internal editing at Wiley, so thank you, Ken, for working diligently for many months to keep these books moving.
Kim Wimpsett is always such a pleasure to work with that I get excited when she is assigned to work with me on a new project because I know the project will be okay. As a developmental editor, Kim is top-notch, low-key, and she helps keep everyone calm and on track. Not an easy thing in this field!
Thanks to Donald Robb, who is helping me assemble the CCST series! He was instrumental in helping me build the table of contents of both books and helped with some chapters in this book. He is writing most of the Cyber CCST book as well.
This is the first time I have worked with John Sleeva as CE, and he has done an excellent job, keeping edits to the minimum so as not to lose the voicing created for this book series. Thank you, John! Looking forward to working with you on the rest of the series.
The technical editor I used for the first book in the CCST series was Jon Buhagiar, who read each chapter in the entire series multiple times, making extraordinary discoveries both technically and editorially. Thank you, Jon!
Todd Lammle is the authority on Cisco certification and internetworking and is certified in most Cisco certification categories. He is a world-renowned author, speaker, trainer, and consultant. Todd has three decades of experience working with LANs, WANs, and large enterprise licensed and unlicensed wireless networks, and lately he's been implementing large Cisco Security networks using Firepower/FTD and ISE.
His years of real-world experience are evident in his writing; he is not just an author but an experienced networking engineer with very practical experience from working on the largest networks in the world, at such companies as Xerox, Hughes Aircraft, Texaco, AAA, Cisco, and Toshiba, among many others.
Todd has published over 130 books, including the very popular CCNA: Cisco Certified Network Associate Study Guide, CCNA Wireless Study Guide, CCNA Data Center Study Guide, and CCNP Security—among over a hundred more—all from Sybex. He runs an international consulting and training company based in northern Idaho, where he spends his free time in the mountains playing with his golden retrievers.
You can reach Todd through his website at www.lammle.com.
Donald Robb, also known as the-packet-thrower, has become very well known in the networking and security field for his ability to thrive in complex environments during his 15+ years in the industry. He has worked with practically every major vendor in the industry and has earned more than 100 certifications, including a Juniper JNCIE and many Cisco certifications.
Donald is an author, a trainer who frequently works with Todd Lammle, and a consultant. He currently works as a principal network architect for a world-wide company. In his free time, he enjoys playing with his kitties and explaining to his wife that she needs to read this book to know why Netflix isn't working.
Jon Buhagiar (Network+, A+, CCNA, MCSA, MCSE, BS/ITM) is an information technology professional with two decades of experience in higher education. During the past 23 years, he has been responsible for Network Operations at Pittsburgh Technical College and has lead several projects, such as virtualization (server and desktop), VoIP, Microsoft 365, and many other projects supporting the quality of education at the college. He has achieved several certifications from Cisco, CompTIA, and Microsoft, and has taught many of the certification paths. He is the author of several books, including Sybex's CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 (2022), CompTIA Network+ Review Guide: Exam N10-008 (2021) and CCNA Certification Practice Tests: Exam 200-301 (2020).
Welcome to the exciting world of internetworking and your path towards Cisco certification. If you've picked up this book because you want to improve yourself and your life with a better, more satisfying, and secure job, you've chosen well!
Whether you're striving to enter the thriving, dynamic IT sector or seeking to enhance your skill set and advance your position within it, being Cisco certified can seriously stack the odds in your favor to help you attain your goals. This book is a great start.
Cisco certifications are powerful instruments of success that also markedly improve your grasp of all things internetworking. As you progress through this book, you'll gain a strong, foundational understanding of networking that reaches far beyond Cisco devices. And when you finish this book, you'll be ready to tackle the next step toward Cisco certification.
Essentially, by beginning your journey towards becoming Cisco certified, you're proudly announcing that you want to become an unrivaled networking expert, a goal that this book will help get you underway to achieving.
Congratulations in advance for taking the first step towards your brilliant future!
To find bonus material, including Todd Lammle videos and extra practice questions, please see www.lammle.com/ccst.
It used to be that to secure the holy grail of Cisco certifications—the CCIE—you passed only one written test before being faced with a grueling, formidable hands-on lab. This intensely daunting, all-or-nothing approach made it nearly impossible to succeed and predictably didn't work out too well for most people.
Cisco responded to this issue by creating a series of new certifications, which not only created a sensible, stepping-stone-path to the highly coveted CCIE prize but also gave employers a way to accurately rate and measure the skill levels of prospective and current employees.
The CCNA and CCNP exams were born and are still the most popular certifications in the world. This exciting paradigm shift in Cisco's certification path truly opened doors that few were allowed through before!
Now Cisco has reached down and created a new introductory-level certification program, below the CCNA, called the Cisco Certified Support Technician (CCST). There are two exams/certifications: Networking and Cybersecurity.
The Cisco Certified Support Technician (CCST) Networking certification validates an individual's skills and knowledge of entry-level networking concepts and topics. The certification demonstrates foundational knowledge and skills needed to show how networks operate, including the devices, media, and protocols that enable network communications. The Networking certification is also a first step toward working on achieving your CCNA Certification.
The Cisco Certified Support Technician (CCST) Cybersecurity certification validates a candidate's skills and knowledge of entry-level cybersecurity concepts and topics, including security principles, network security and endpoint security concepts, vulnerability assessment and risk management, and incident handling. The Cybersecurity certification is also a first step toward CyberOps Associate certification.
This book is a powerful tool to get you started in your Cisco certification studies, and it's vital to understand the material in it before you go on to conquer any other certifications!
Exam policies can change from time to time. We highly recommend that you check both Cisco and Certiport (www.certiport.com) sites for the most up-to-date information when you begin your preparing when you register, and then again a few days before your scheduled exam date.
Here are some general tips for taking your exam successfully (assuming you are going in person, as online testing is available as well):
This is not like the CCNA or other Cisco certification tests that are available on
www.vue.com
. You need to instead go to
www.certiport.com/locator
to both register and pay for your exam. You can take the exams in person at a center or in your home or office, under direct video and audio supervision. For exams at home information and to sign up, call (800) 589-6871.
Bring two forms of ID with you. One must be a photo ID, such as a driver's license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so that you can relax and review your study materials, particularly tables and lists of exam-related information. After you are ready to enter the testing room, you will need to leave everything outside; you won't be able to bring any materials into the testing area.
Read the questions carefully. Don't be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.
Don't leave any questions unanswered. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions you're not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
You—if want to pass the CCST Networking exam confidently! This book is chock-full of the exact information you need and directly maps to CCST Networking exam objectives, so if you use it to study for the exam, your odds of passing shoot way up.
In addition to including every bit of knowledge you need to learn to pass the exam, I've included some really great tips and solid wisdom to equip you even further to successfully work in the real IT world.
I've included several study tools throughout the book:
Assessment Test
At the end of this Introduction is an assessment test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas you might need to brush up on. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.
Objective Map and Opening List of Objectives
This Introduction includes a detailed exam objective map showing you where each of the exam objectives is covered in the book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each exam topic is covered.
Exam Essentials
Each chapter, just after the summary, includes a number of exam essentials. These are the key topics you should take from the chapter in terms of areas to focus on when preparing for the exam.
Chapter Review Questions
To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and check your answers; the correct answers and explanations are in Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you correctly answer the next time you're tested on the material.
The interactive online learning environment that accompanies this book provides a test bank with study tools to help you prepare for the certification exam and increase your chances of passing it the first time! The test bank includes the following tools:
Sample Tests
All of the questions in this book are provided, including the assessment test, which you'll find at the end of this Introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there is an online practice exam. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards
Approximately 100 questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools
A glossary of key terms from this book is available as a fully searchable PDF.
Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank.
If you want a solid foundation for the serious effort of preparing for the Cisco CCST Networking exam, then look no further, because I've spent countless hours putting together this book with the sole intention of helping you pass it!
This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here's a list that describes how to approach studying:
Take the assessment test immediately following this Introduction. (The answers are at the end of the test, but no peeking!) It's okay if you don't know any of the answers—that's what this book is for. Carefully read over the explanations for any question you get wrong and make note of the chapters where that material is covered.
Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.
Answer all the review questions related to each chapter. Specifically note any questions that confuse you and study the corresponding sections of the book again. And don't just skim these questions—make sure you understand each answer completely.
Before you take your test, be sure to visit my website
www.lammle.com
for questions, videos, audios, and other useful information.
Test yourself using all the electronic flashcards. This is a brand-new and updated flashcard program to help you prepare for the latest Cisco CCST Network exam, and it is a great study tool.
I tell you no lies—learning every bit of the material in this book is going to require applying yourself with a good measure of discipline. So, try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.
The figures in this book are in black and white in the print edition; however, in the e-book, they are all in color.
This book covers everything you need to know to solidly prepare you for getting into your CCST studies. Be advised that just because much of the material in this book won't be official Cisco CCST objectives in the future, that doesn't mean you won't be tested on it. Understanding the foundational, real-world networking information and skills offered in this book is critical to your certifications and your career!
Here's a snapshot of what you'll learn as you move through the book:
Chapter 1
: Internetworking
In
Chapter 1
, you'll learn the basics of the Open Systems Interconnection (OSI) model the way Cisco wants you to learn it.
Chapter 2
: Introduction to TCP/IP
Chapter 2
provides you with the background necessary for success on the CCST/CCNA/NP exams, as well as in the real world, with a thorough presentation of TCP/IP. It's an in-depth chapter that covers the very beginnings of the Internet Protocol stack and moves all the way to IP addressing. You'll gain an understanding of the difference between a network address and a broadcast address before finally ending with valuable network troubleshooting tips.
Chapter 3
: Easy Subnetting
Believe it or not, you'll actually be able to subnet a network in your head after reading this chapter! Success will take a little determination, but you can do it.
Chapter 4
: Network Address Translation (NAT) and IPv6
Network Address Translation (NAT) is very useful in today's world. Maybe people believed that IPv6 would take over the world, but because of NAT, it's still not as prevalent as IPv4. After learning about NAT, you'll find a small but powerful section on IPv6. You'll love it!
Chapter 5
: IP Routing
This is a super fun chapter because you will learn about static, default, and dynamic routing. The fundamentals covered in this chapter are probably the most important in the book because understanding the IP routing process is what Cisco is all about! It's actually assumed that you solidly possess this knowledge when you get into the CCNA and CCNP studies, but rest assured, I wrote this as an introduction chapter.
Chapter 6
: Switching
In
Chapter 6
, you'll learn how switches break up large collision domains into smaller ones and that a collision domain is a network segment with two or more devices sharing the same bandwidth. You will learn how switch ports create one collision domain per host. The chapter also surveys and compares how networks were designed before and after switching technologies were introduced.
Chapter 7
: Cables and Connectors
Chapter 7
discusses the various types of devices and technologies that are used to create networks, as well as the basic network topologies and how they work together. Ethernet cabling is important, and this chapter covers that fully.
Chapter 8
: Wireless Technologies
Chapter 8
begins by defining a basic wireless network as well as basic wireless principles. I'll also talk about different types of wireless networks, the minimum devices required to create a simple wireless network, and some basic wireless topologies. Finally, I'll get into basic security by covering WPA, WPA2, and WPA3.
Chapter 9
: Cisco Devices
This chapter covers both network infrastructure and diagnosing problems. You need to be able to look at a basic Cisco device and understand some simple lights and their meaning, as well as be able to understand various type of cables and how they will be used for connecting to devices using different types of ports. I'll also cover how to connect and access local and remote network devices, as well as some basic Cisco IOS commands to help you find and diagnose problems.
Chapter 10
: Security
This chapter covers authentication, authorization, and accounting, or AAA. AAA is a technology that gives us substantial control over users and what they're permitted to do inside our networks. That's just the beginning—there are more tools in the box! RADIUS and TACACS+ and security servers, like Identity Services Engine (ISE), help us implement a centralized security plan by recording network events to the security server, or to a Syslog server via logging.
Chapter 11
: Cloud & IoT
Basically, cloud computing can provide virtualized processing, storage, and computing resources to users remotely, making the resources transparently available regardless of the user connection.
Chapter 11
starts by discussing cloud computing and then moves on to cloud concepts and IoT endpoints.
Chapter 12
: Troubleshooting
Chapter 12
discusses the help desk, including its purpose, policies and procedures, ticking, documentation, and information gathering. From there, you need to understand documentation and that maintaining updated documents is a large part of working a help desk. You also need to know Cisco's seven steps for helping help-desk personnel find and solve problems. In addition, Wireshark is an important objective, so I'll introduce that product to you. Lastly, you'll learn some important Cisco IP and network troubleshooting techniques to ensure that you're well equipped with these key skills.
You're probably pretty curious about the CCST Networking exam's objectives, right? Cisco asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam.
The following table lists the objectives and which chapter discusses them. Note that a single objective can be covered in multiple chapters.
Objective
Chapter
1. Standards and Concepts
1
,
2
,
7
,
11
,
12
1.1. Identify the fundamental conceptual building blocks of networks.
1
,
2
TCP/IP model, OSI model, frames and packets, addressing
1
,
2
1.2. Differentiate between bandwidth and throughput.
12
Latency, delay, speed test vs. Iperf
12
1.3. Differentiate between LAN, WAN, MAN, CAN, PAN, and WLAN.
7
Identify and illustrate common physical and logical network topologies
7
1.4. Compare and contrast cloud and on-premises applications and services.
11
Public, private, hybrid, SaaS, PaaS, IaaS, remote work/hybrid work
11
1.5. Describe common network applications and protocols.
2
TCP vs. UDP (connection-oriented vs. connectionless), FTP, SFTP, TFTP, HTTP, HTTPS, DHCP, DNS, ICMP, NTP
2
2. Addressing and Subnet Formats
3
,
4
2.1. Compare and contrast private addresses and public addresses.
3
,
4
Address classes, NAT concepts
3
,
4
2.2. Identify IPv4 addresses and subnet formats.
3
Subnet concepts, Subnet Calculator, slash notation, and subnet mask; broadcast domain
3
2.3. Identify IPv6 addresses and prefix formats.
3
,
4
Types of addresses, prefix concepts
3
,
4
3. Endpoints and Media Types
7
,
8
,
11
3.1. Identify cables and connectors commonly used in local area networks.
7
Cable types: fiber, copper, twisted pair; Connector types: coax, RJ-45, RJ-11, fiber connector types
7
3.2. Differentiate between Wi-Fi, cellular, and wired network technologies.
8
Copper, including sources of interference; fiber; wireless, including 802.11 (unlicensed, 2.4GHz, 5GHz, 6GHz), cellular (licensed), sources of interference
8
3.3. Describe endpoint devices.
11
Internet of Things (IoT) devices, computers, mobile devices, IP Phone, printer, server
11
3.4. Demonstrate how to set up and check network connectivity on Windows, Linux, Mac OS, Android, and Apple iOS.
8
Networking utilities on Windows, Linux, Android, and Apple operating systems; how to run troubleshooting commands; wireless client settings (SSID, authentication, WPA mode)
8
4. Infrastructure
5
,
6
4.1. Identify the status lights on a Cisco device when given instruction by an engineer.
9
Link light color and status (blinking or solid)
9
4.2. Use a network diagram provided by an engineer to attach the appropriate cables.
9
Patch cables, switches and routers, small topologies, power, rack layout
9
4.3. Identify the various ports on network devices.
9
Console port, serial port, fiber port, Ethernet ports, SFPs, USB port, PoE
9
4.4. Explain basic routing concepts.
5
,
6
Default gateway, layer 2 vs. layer 3 switches, local network vs. remote network
5
,
6
4.5. Explain basic switching concepts.
6
MAC address tables, MAC address filtering, VLAN
6
5. Diagnosing Problems
9
,
12
5.1. Demonstrate effective troubleshooting methodologies and help desk best practices, including ticketing, documentation, and information gathering.
12
Policies and procedures, accurate and complete documentation, prioritization
12
5.2. Perform a packet capture with Wireshark and save it to a file.
12
Purpose of using a packet analyzer, saving and opening a .pcap file
12
5.3. Run basic diagnostic commands and interpret the results.
12
ping, ipconfig/ifconfig/ip, tracert/traceroute, nslookup; recognize how firewalls can influence the result
12
5.4. Differentiate between different ways to access and collect data about network devices.
9
Remote access (RDP, SSH, telnet), VPN, terminal emulators, Console, Network Management Systems, cloud-managed network (Meraki), scripts
9
5.5. Run basic show commands on a Cisco network device.
9
show run, show cdp neighbors, show ip interface brief, show ip route, show version, show inventory, show switch, show mac address-table, show interface, show interface x, show interface status; privilege levels; command help and auto-complete
9
6. Security
8
,
10
6.1. Describe how firewalls operate to filter traffic.
10
Firewalls (blocked ports and protocols); rules deny or permit access
10
6.2. Describe foundational security concepts.
10
Confidentiality, integrity, and availability (CIA); authentication, authorization, and accounting (AAA); Multifactor Authentication (MFA); encryption, certificates, and password complexity; identity stores/databases (Active Directory); threats and vulnerabilities; spam, phishing, malware, and denial of service
10
6.3. Configure basic wireless security on a home router (WPAx).
8
WPA, WPA2, WPA3; choosing between Personal and Enterprise; wireless security concepts
8
Like all exams, the Cisco CCST certification is updated periodically and may eventually be retired or replaced. At some point after Cisco is no longer offering this exam, the old editions of our books and online tools will be retired. If you have purchased this book after the exam was retired or are attempting to register in the Sybex online learning environment after the exam was retired, please know that we make no guarantees that this exam's online Sybex tools will be available once the exam is no longer available.
If you believe you have found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.
In order to submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”
In which of the following layers of the OSI model are MAC addresses defined?
Data Link
Presentation
Transport
Physical
Which of the following is a function of an access point (AP)?
To automatically handle the configuration of wireless access points
To monitor and control the incoming and outgoing network traffic
To allow wireless devices to connect to a wireless network and connect to wired resources
To connect networks and intelligently choose the best paths between networks
Which of the following statements regarding ICMP packets are true? (Choose two.)
ICMP guarantees datagram delivery.
ICMP can provide hosts with information about network problems.
ICMP is encapsulated within layer 3 packets.
ICMP is encapsulated within UDP datagrams.
What is the address range of a Class A network address in binary?
01
xxxxxx
0
xxxxxxx
10
xxxxxx
110
xxxxx
You have an interface on a router with the IP address of 192.168.192.20/29. What is the broadcast address on this LAN?
192.168.192.23
192.168.192.31
192.168.192.63
192.168.192.127
192.168.192.255
You need to subnet a network that has 10 subnets, each with at least 10 hosts. Which classful subnet mask would you use?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
Which of the following descriptions about IPv6 is correct?
Addresses are not hierarchical and are assigned at random.
Broadcasts have been eliminated and replaced with multicasts.
There are 2.7 billion addresses.
An interface can be configured with only one IPv6 address.
In NAT, an inside global address is which of the following?
The inside host's address before translation
The inside host's address after translation
The address that inside hosts use to get to the Internet
The outside address used by the external router port
What does the
99
at the end of the following command mean?
Router(config)#
ip route 192.168.13.0 255.255.255.0 10.31.2.4 99
Metric
Administrative distance
Hop count
Cost
A network administrator views the output from the
show ip route
command. A network that is advertised by both RIP and OSPF appears in the routing table flagged as an OSPF route. Why is the RIP route to this network not used in the routing table?
OSPF has a faster update timer.
OSPF has a lower administrative distance.
RIP has a higher metric value for that route.
The OSPF route has fewer hops.
The RIP path has a routing loop.
You log into a switch CLI and type a command. What command generated the following output?
Vlan Mac Address Type Ports]]>
---- ----------- -------- -----
All 0100.0ccc.cccc STATIC CPU
[output cut]
1 000e.83b2.e34b DYNAMIC Fa0/1
1 0011.1191.556f DYNAMIC Fa0/1
1 0011.3206.25cb DYNAMIC Fa0/1
1 001a.2f55.c9e8 DYNAMIC Fa0/1
1 001a.4d55.2f7e DYNAMIC Fa0/1
1 001c.575e.c891 DYNAMIC Fa0/1
1 b414.89d9.1886 DYNAMIC Fa0/5
1 b414.89d9.1887 DYNAMIC Fa0/6
Spanning Tree Protocol (STP) is used on layer 2 switches to solve problems. Which of the following problems are addressed by STP? (Choose three.)
Broadcast storms
Layer 2 loops
A device receiving multiple copies of the same frame
Gateway redundancy
Your boss asks you if you need to put single-mode fiber (SMF) or multimode fiber (MMF) between buildings. What is the difference between the two?
Electrical signals
Number of light rays
Number of digital signals
That signal-mode can be run a shorter distance
You have a group of accountants who have their computers and printers all connected into a single switch. What is this logical grouping of network users and resources called?
WAN
LAN
MPLS
Host
Two workers have established wireless communication directly between their wireless laptops. You need to create a wireless topology so that two finance employees can connect their laptops directly only to each other. What type of network is this?
IBSS
SSID
BSS
ESS
You start a new job and find that the company is running the older wireless security standard WPA instead of WPA2 or 3. What defines this WPA standard? (Choose two.)
It requires that all devices must use the same encryption key.
It specifies the use of dynamic encryption keys that change throughout the users connection time.
Static keys must be used.
It can use PSK authentication.
Which of the following is a network protocol that is designed as a secure alternative to command-based utilities such as Telnet?
SSL
SSH
STP
STFP
Which of the following commands provides a quick overview of all a device's interfaces, including the logical address and interface status at layers 1 and 2?
show running-config
show processes
show ip interface brief
show mac address-table
show interfaces
You need to secure your Cisco routers and switches with security protocols. Which of the following security server protocols are supported by Cisco routers and switches? (Choose three.)
AAA
RADIUS
Kerberos
DIA
TACACS+
Your boss asks you in a meeting of executives to define an exploit. What do you tell them?
This is when antivirus software uses definition files that identify known malware.
This is a system of ranking vulnerabilities that are discovered based on predefined metrics.
This is when a threat agent takes advantage of a vulnerability and uses it to advance an attack.
This is when a hacker confuses an internal user and gets them to turn over their credentials.
You want to move part of your data center to another location that is managed by someone else. You only want to move the server VMs. What is this called?
SaaS
PaaS
IaaS
DaaS
You want to move your data center and have the data center run the operating systems and the network infrastructure, and you can then load and run your own applications. What is this called?
SaaS
DaaS
IaaS
PaaS
Which of the following would you do after analyzing the problem described in the trouble ticket you are working on?
Gather information.
Eliminate possible causes.
Solve the problem.
Define the problem.
You just loaded the Wireshark program on your computer. What is the first thing you need to do before starting to capture packets?
Read the first frame you receive for license info.
Save the file.
Open all TCP packets, which always show the problem.
Choose the interface on which you want to receive the packets.
A. The IEEE Ethernet Data Link layer has two sublayers: the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. MAC addresses are defined in the MAC sublayer. See
Chapter 1
for more information.
C. Wireless APs are very popular today. The idea behind these devices (which are layer 2 bridge devices) is to connect wireless products to a wired Ethernet network. See
Chapter 1
for more information.
B, C. ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and, because it is used for diagnostics, it will provide hosts with information about network problems. See
Chapter 2
for more information.
B. The range of a Class A network address is 0–127. This makes our binary range 00000000 – 01111111. See
Chapter 2
for more information.
A. A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are 0, 8, 16, 24, etc. 20 is in the 16 subnet. The next subnet is 24, so 23 is the broadcast address. See
Chapter 3
for more information.
C. You need 10 subnets, each with at least 10 hosts. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts—this will not work. The mask 255.255.255.240 provides 16 subnets with 14 hosts. This is the best answer. See
Chapter 3
for more information.
B. There are no broadcasts with IPv6. Unicast, multicast, anycast, global, and link-local unicast addresses are used. See
Chapter 4
for more information.
C. An inside local address is an inside host address before translation. An inside global address is the address an inside host will use to get to the Internet or out of the local network. See
Chapter 4
for more information.
B. The
99
at the end changes the default administrative distance (AD) of 1 to 99. See
Chapter 5
for more information.
B. RIP has an administrative distance (AD) of 120, whereas OSPF has an administrative distance of 110, so the router will choose the route with a lower AD to the same network. See
Chapter 5
for more information.
show mac address-table
This command displays the forward filter table, also called a content-addressable memory (CAM) table. See Chapter 6 for more information.
A, B, C. STP provides loop protection in layer 2 switched networks, which also stops multiple frame copies and broadcast storms. Gateway redundancy issues can be solved with Hot Standby Router Protocol (HSRP), which provides dynamic default gateways. See
Chapter 6
for more information.
B. The difference between single-mode fibers and multimode fibers is in the number of light rays (and thus the number of signals) they can carry. Generally speaking, multimode fiber is used for shorter-distance applications, and single-mode fiber for longer distances. See
Chapter 7
for more information.
B. A logical grouping of hosts is called a LAN, and you typically group them by connecting them to a hub or switch. See
Chapter 7
for more information.
A. Two wireless hosts directly connected wirelessly is no different from two hosts connecting with a crossover cable. They are both ad hoc networks, but in wireless, we call this an independent basic service set (IBSS). See
Chapter 8
for more information.
B, D. WPA, although using the same RC4 encryption that WEP uses, provides enhancements to the WEP protocol by using dynamic keys that change constantly. It also provides a pre-shared key (PSK) method of authentication. See
Chapter 8
for more information.
B. Secure Shell (SSH) creates a secure channel between devices and provides confidentiality and integrity of the data transmission. It uses public-key cryptography to authenticate the remote computer and allows the remote computer to authenticate the user, if necessary. See
Chapter 9
for more information.
C. The output of the Cisco IOS command
show ip interface brief
is very useful, providing all the device's interfaces, including the logical address and interface status at layers 1 and 2. See
Chapter 9
for more information.
B, C, E. RADIUS, TACACS+, and Kerberos are the three types of security server protocols supported by Cisco routers. See
Chapter 10
for more information.
C. An exploit occurs when a threat agent takes advantage of a vulnerability and uses it to advance an attack. Snort rules are created to stop hackers from attacking a known vulnerability. See
Chapter 10
for more information.
C. IaaS delivers computer infrastructure—a platform virtualization environment where you can load your own server VMs. This is where the customer has the most control and management capability. See
Chapter 11
for more information.
D. The vendor provides the hardware platform or data center and the software running on the platform, allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an application. An example is Windows Azure. See
Chapter 11
for more information.
B. Cisco has created a seven-step troubleshooting process for help desk technicians to have a step-by-step approach to help find and fix issues. See
Chapter 12
for more information.
D. Once the Wireshark program loads, you need to select which interface you want to do a packet capture on. If you have multiple interfaces in your computer, then you'll need to select the one that would have the traffic you are interested in seeing. See
Chapter 12
for more information.
THE CCST EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:
1.0 Standards and Concepts
1.1. Identify the fundamental conceptual building blocks of networks.
TCP/IP model, OSI model, frames and packets, addressing
Welcome to the exciting world of internetworking. This first chapter will serve as an internetworking review by focusing on how to connect networks together using Cisco routers and switches, and I've written it with the assumption that you have some simple basic networking knowledge.
Let's start by defining exactly what an internetwork is: You create an internetwork when you connect two or more networks via a router and configure a logical network addressing scheme with a protocol such as IP or IPv6.
This chapter will also describe in detail each part of the Open Systems Interconnection (OSI) model. Understanding the OSI model is key for the solid foundation you'll need to build upon with the more advanced Cisco networking knowledge gained as you become increasingly more skilled.
The OSI model has seven hierarchical layers, which were developed to enable different networks to communicate reliably between disparate systems.
To find up-to-the-minute updates for this chapter, please see www.lammle.com/ccst.