Muutke küpsiste eelistusi

CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram [Multiple-component retail product, part(s) enclosed]

  • Formaat: Multiple-component retail product, part(s) enclosed, 800 pages, kõrgus x laius x paksus: 226x153x20 mm, kaal: 1115 g, Contains 1 Digital product license key and 1 Paperback / softback
  • Sari: Exam Cram
  • Ilmumisaeg: 18-Oct-2022
  • Kirjastus: Pearson IT Certification
  • ISBN-10: 0136891934
  • ISBN-13: 9780136891932
Teised raamatud teemal:
  • Multiple-component retail product, part(s) enclosed
  • Hind: 54,09 €
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, part(s) enclosed, 800 pages, kõrgus x laius x paksus: 226x153x20 mm, kaal: 1115 g, Contains 1 Digital product license key and 1 Paperback / softback
  • Sari: Exam Cram
  • Ilmumisaeg: 18-Oct-2022
  • Kirjastus: Pearson IT Certification
  • ISBN-10: 0136891934
  • ISBN-13: 9780136891932
Teised raamatud teemal:

CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram delivers expert coverage and practice questions for every exam topic, including implementation of core enterprise network technologies involving dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. It also offers comprehensive, proven preparation tools, including:

  • Exam objective mapping to help students focus their study
  • A self-assessment section for evaluating students' motivations and readiness
  • Concise, easy-to-read exam topic overviews Exam Alerts that highlight key concepts Bullet lists and summaries for easy review
  • Cram Savers, Cram Quizzes, and chapter-ending practice questions to help students assess their understanding
  • Notes indicating areas of concern or specialty training
  • Tips to help students build a better foundation of knowledge
  • An extensive Glossary of terms and acronyms
  • The popular Cram Sheet tear-out, collecting the most difficult-to-remember facts and numbers students should memorize before taking the test

Complementing all these study tools is the powerful Pearson IT Certification Practice Test software, with hundreds of exam-realistic practice questions. This assessment software offers students a wealth of customization option and reporting features, allowing them to test their knowledge in study mode, practice exam mode, or flash card mode.



CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram is the perfect study guide to help you pass the Cisco ENCOR 350-401 exam, a core requirement for your CCNP Enterprise, CCIE Enterprise Infrastructure, or CCIE Enterprise Wireless certification. This guide delivers expert coverage and practice questions for every exam topic, including implementation of core enterprise network technologies involving dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. It also offers comprehensive, proven preparation tools, including: 

  • Exam objective mapping to help you focus your study 
  • A self-assessment section for evaluating your motivations and readiness 
  • Concise, easy-to-read exam topic overviews 
  • Exam Alerts that highlight key concepts 
  • Bullet lists and summaries for easy review 
  • Cram Savers, Cram Quizzes, and chapter-ending practice questions to help you assess your understanding 
  • Notes indicating areas of concern or specialty training 
  • Tips to help you build a better foundation of knowledge 
  • An extensive Glossary of terms and acronyms 
  • The popular Cram Sheet tear-out, collecting the most difficult-to-remember facts and numbers you should memorize before taking the test

Complementing all these study tools is the powerful Pearson IT Certification Practice Test software, with hundreds of exam-realistic practice questions. This assessment software offers you a wealth of customization option and reporting features, allowing you to test your knowledge in study mode, practice exam mode, or flash card mode. 
Introduction xxiii
Part I Infrastructure
Chapter 1 Understanding Layer 2
1(58)
VLANs Overview
3(1)
VLAN Assignment
4(3)
802.1QTrunking
7(2)
Dynamic Trunking Protocol (DTP)
9(2)
VLAN Trunking Protocol (VTP)
11(5)
Inter-VLAN Routing
16(3)
Spanning Tree Protocol Overview
19(1)
Root Bridge, Root Port, and Designated Port Elections
20(5)
Rapid Spanning Tree Protocol (RSTP)
25(3)
Spanning Tree Protocol Tuning and Protection Mechanisms
28(1)
Switch Priorities Overview
28(12)
Multiple Spanning Tree Protocol (MST)
40(7)
EtherChannels
47(10)
Review Questions
57(1)
Answers to Review Questions
58(1)
Further Reading
58(1)
What's Next?
58(1)
Chapter 2 Understanding Layer 3: IGPs
59(44)
IP Routing Essentials
60(1)
Routing Algorithms
61(1)
Path Selection
62(3)
Static Routing
65(3)
Enhanced Interior Gateway Routing Protocol (EIGRP)
68(2)
Neighbor Table
70(2)
Topology Table
72(3)
Routing Tables
75(1)
EIGRP Authentication
76(1)
EIGRP Named Mode
76(2)
Route Summarization
78(2)
Open Shortest Path First (OSPF)
80(1)
OSPFCost
81(1)
OSPF Authentication
82(1)
OSPF Areas
83(2)
Neighbors and Adjacencies
85(2)
OSPF Packet Types
87(1)
Basic OSPF Configuration
87(4)
Router ID (RID)
91(1)
Passive Interfaces
91(1)
Default Route Advertisements
91(1)
OSPF Optimizations
92(1)
Link-State Advertisements (LSAs)
92(1)
OSPF Path Selection
93(2)
Route Summarization
95(1)
OSPFv3
95(5)
Review Questions
100(1)
Answers to Review Questions
101(1)
Further Reading
101(1)
What's Next
101(2)
Chapter 3 Understanding Layer 3: BGP
103(20)
BGP Fundamentals
104(8)
BGP Configuration and Verification
112(8)
Review Questions
120(1)
Answers to Review Questions
120(1)
Further Reading
121(1)
What's Next?
121(2)
Chapter 4 IP Services
123(44)
Network Time Protocol (NTP)
124(10)
Network Address Translation (NAT)
134(2)
Static NAT
136(1)
Dynamic NAT
137(1)
Port Address Translation (PAT)
138(5)
First-Hop Redundancy Protocols (FHRPs)
143(4)
Virtual Router Redundancy Protocol (VRRP)
147(3)
Gateway Load Balancing Protocol (GLBP)
150(4)
Object Tracking with FHRPs
154(2)
Multicast
156(1)
Multicast Fundamentals
156(1)
Multicast Group Addressing
157(1)
Internet Group Management Protocol (IGMP)
157(4)
Protocol Independent Multicast (PIM)
161(4)
Review Questions
165(1)
Answers to Review Questions
165(1)
Further Reading
166(1)
What's Next?
166(1)
Chapter 5 Enterprise Wireless
167(26)
Wireless Basics
168(1)
Radio Frequency (RF)
168(3)
Free Space Path Loss
171(1)
Received Signal Strength Indicator (RSSI)
171(1)
Signal-to-Noise Ratio (SNR)
171(1)
IEEE Wireless Standards
172(1)
Multiple Radios
173(3)
WLC and AP Operation and Pairing
176(2)
AP and WLC Interaction
178(7)
Wireless Roaming
185(3)
Troubleshooting WLAN Configuration and Client Connectivity Issues
188(3)
Review Questions
191(1)
Answers to Review Questions
192(1)
Further Reading
192(1)
What's Next?
192(1)
Part II Security
Chapter 6 Device Access Control
193(26)
Cisco IOS CLI Session Overview
194(3)
Protection of Access to Cisco IOS EXEC Modes
197(6)
Secured Access with SSH
203(3)
Privilege Levels and Role-Based Access Control (RBAC)
206(4)
Authentication, Authorization, and Accounting (AAA) Overview
210(1)
TACACS+ Overview
211(1)
RADIUS Overview
211(1)
AAA Configuration for Network Devices
212(5)
Review Questions
217(1)
Answers to Review Questions
217(1)
Further Reading
218(1)
What's Next?
218(1)
Chapter 7 Infrastructure Security
219(20)
Access Control Lists (ACLs) Overview
220(4)
Types of ACLs
224(5)
Port ACLs (PACLs) and VLAN ACLs (VACLs)
229(4)
Control Plane Policing (CoPP)
233(3)
Review Questions
236(1)
Answers to Review Questions
236(1)
Further Reading
237(1)
What's Next?
237(2)
Chapter 8 Securing REST APIs
239(8)
REST API Security
240(5)
Review Questions
245(1)
Answers to Review Questions
245(1)
Further Reading
245(1)
What's Next?
245(2)
Chapter 9 Wireless Security
247(18)
Wireless Authentication Overview
248(1)
Open Authentication
249(2)
Pre-Shared Key (PSK) Authentication
251(3)
Extensible Authentication Protocol (EAP) Authentication
254(3)
WebAuth
257(5)
Review Questions
262(1)
Answers to Review Questions
262(1)
Further Reading
262(1)
What's Next?
263(2)
Chapter 10 Network Security Design
265(22)
Threat Defense
266(4)
Network Security Components
270(9)
TrustSec, MACsec
279(1)
TrustSec
279(2)
MACsec
281(3)
Review Questions
284(1)
Answers to Review Questions
284(1)
Further Reading
285(1)
What's Next?
285(2)
Chapter 11 Network Access Control
287(12)
Cisco Identity Services Engine (ISE)
288(2)
Network Access Control (NAC)
290(6)
Review Questions
296(1)
Answers to Review Questions
296(1)
Further Reading
296(1)
What's Next?
297(2)
Part III Automation
Chapter 12 Anatomy of Python
299(16)
Interpreting Python Components and Scripts
300(1)
Python Overview
300(1)
Python Releases
301(1)
Setting Up Guest Shell
301(1)
Using Python
302(7)
Python Requirements
309(1)
Parsing Python Output to JSON
310(1)
Exception Handling
311(2)
Review Questions
313(1)
Answers to Review Questions
313(1)
Further Reading
314(1)
What's Next?
314(1)
Chapter 13 Building JSON Files
315(10)
Data Formats (XML and JSON)
316(1)
Extensible Markup Language (XML)
317(2)
JavaScript Object Notation GSON)
319(2)
XML and JSON Comparison
321(2)
Review Questions
323(1)
Answers to Review Questions
323(1)
Further Reading
324(1)
What's Next?
324(1)
Chapter 14 YANG Data Modeling
325(8)
YANG Data Modeling
326(1)
Different YANG Models
327(5)
Review Questions
332(1)
Answers to Review Questions
332(1)
Further Reading
332(1)
What's Next?
332(1)
Chapter 15 DNA Center and vManage APIs
333(12)
APIs for Cisco DNA Center and vManage
334(1)
DNA Center API Integrations
334(4)
vManage API Integrations
338(6)
Review Questions
344(1)
Answers to Review Questions
344(1)
Further Reading
344(1)
What's Next?
344(1)
Chapter 16 Interpreting REST API Codes
345(6)
Interpreting REST API Response Codes
346(1)
HTTP Status Codes
347(2)
Review Questions
349(1)
Answers to Review Questions
349(1)
Further Reading
349(1)
What's Next?
349(2)
Chapter 17 EEM Applets
351(12)
Embedded Event Manager (EEM)
352(2)
EEM Architecture
354(1)
EEM Policies
355(7)
Review Questions
362(1)
Answers to Review Questions
362(1)
Further Reading
362(1)
What's Next?
362(1)
Chapter 18 Configuration Management and Orchestration
363(16)
Agent-Based Orchestration Tools
365(1)
Puppet
365(2)
Chef
367(2)
SaltStack
369(3)
Agentless Orchestration Tools
372(1)
Ansible
372(3)
Bolt
375(1)
Configuration Management and Orchestration Tools Comparison
376(2)
Review Questions
378(1)
Answers to Review Questions
378(1)
Further Reading
378(1)
What's Next?
378(1)
Part IV Architecture
Chapter 19 Enterprise Network Design Principles
379(30)
Hierarchical LAN Design Model
380(1)
Access Layer
381(1)
Distribution Layer
382(1)
Core Layer
382(1)
Enterprise Network Architecture Options
383(9)
First-Hop Redundancy Protocols (FHRPs)
392(1)
Host Standby Router Protocol (HSRP)
392(4)
Virtual Router Redundancy Protocol (VRRP)
396(1)
Gateway Load Balancing Protocol (GLBP)
397(3)
Hardware Redundancy Mechanisms
400(1)
Stateful Switchover (SSO)
400(5)
Nonstop Forwarding (NSF)
405(2)
Review Questions
407(1)
Answers to Review Questions
408(1)
Further Reading
408(1)
What's Next?
408(1)
Chapter 20 Wireless LAN Deployments
409(24)
Wireless Deployment Models
410(1)
Autonomous Wireless Deployments
411(1)
Centralized Wireless Deployments
412(3)
Cisco FlexConnect Wireless Deployments
415(3)
Cloud-Based Wireless Deployments
418(4)
Embedded Wireless Deployments
422(5)
Wreless Location Services
427(3)
Review Questions
430(1)
Answers to Review Questions
431(1)
Further Reading
431(1)
What's Next?
431(2)
Chapter 21 On-Premises vs. Cloud Infrastructure
433(18)
Cloud Infrastructure Basics
434(4)
Cloud Services Models
438(1)
Infrastructure as a Service (IaaS)
438(2)
Platform as a Service (PaaS)
440(1)
Software as a Service (SaaS)
441(1)
Anything as a Service (XaaS)
442(2)
Cloud Deployment Models
444(3)
On-Premises or Cloud Infrastructure
447(2)
Review Questions
449(1)
Answers to Review Questions
449(1)
Further Reading
450(1)
What's Next?
450(1)
Chapter 22 SD-WAN
451(16)
SD-WAN Overview
452(1)
The Need for SD-WAN
453(1)
Secure Automated WAN
454(1)
Application Performance Optimization
455(1)
Secure Direct Internet Access (DIA)
456(1)
Multicloud
456(3)
SD-WAN Architecture Components
459(1)
vSmart Controllers
459(1)
WAN Edge Routers
460(1)
vBond Orchestra tors
461(1)
vManage
461(2)
SD-WAN Considerations
463(2)
Review Questions
465(1)
Answers to Review Questions
465(1)
Further Reading
466(1)
What's Next?
466(1)
Chapter 23 SD-Access
467(20)
SD-Access Overview
468(3)
SD-Access Architecture
471(3)
SD-Access Operational Planes
474(3)
SD-Access Fabric Roles and Components
477(1)
Control Plane Nodes
478(1)
Edge Nodes
479(1)
Intermediate Nodes
480(1)
Border Nodes
480(1)
Fabric Wireless LAN Controllers (WLCs)
481(1)
Fabric-Mode Access Points
481(1)
SD-Access Embedded Wreless
481(1)
Fabric in a Box
482(1)
Shared Services
482(2)
Review Questions
484(1)
Answers to Review Questions
484(1)
Further Reading
484(1)
What's Next?
485(2)
Chapter 24 QoS
487(18)
The Need for QoS
488(1)
Packet Loss
489(1)
Delay
490(1)
Jitter
491(1)
Lack of Bandwidth
491(2)
QoS Models and Components
493(2)
Classification and Marking
495(2)
DSCPs and Per-Hop Behaviors (PHBs)
497(1)
Policing and Shaping
497(2)
Congestion Management and Congestion Avoidance
499(1)
Congestion Management (Queuing)
499(1)
Congestion Avoidance
500(1)
Wireless QoS
500(3)
Review Questions
503(1)
Answers to Review Questions
503(1)
Further Reading
503(1)
What's Next?
504(1)
Chapter 25 Switching
505(20)
Traffic Forwarding Basics
506(5)
Forwarding Architectures
511(1)
Process Switching
511(1)
Fast Switching
512(1)
Cisco Express Forwarding (CEF)
512(3)
Tables Used in Switching
515(7)
Review Questions
522(1)
Answers to Review Questions
522(1)
Further Reading
523(1)
What's Next?
523(2)
Part V Virtualization
Chapter 26 Basic Virtualization
525(20)
Virtualization Overview
526(1)
Hypervisors
527(5)
Virtual Machines (VMs)
532(3)
Virtual Switching
535(2)
Network Virtualization
537(1)
Cisco Enterprise Network Function Virtualization (NFV)
537(1)
Cisco Enterprise NFV Architecture
538(1)
VNFs Supported in Cisco Enterprise NFV
539(1)
Cisco NFV Hardware Options
539(3)
Review Questions
542(1)
Answers to Review Questions
543(1)
Further Reading
543(1)
What's Next?
543(2)
Chapter 27 VRF Instances, GRE, and IPsec
545(28)
Virtual Routing and Forwarding (VRF)
546(1)
VRF-Lite
547(5)
Generic Routing Encapsulation (GRE)
552(6)
IPsec VPNs
558(1)
Site-to-Site VPNs
558(1)
Dynamic Multipoint VPN (DMVPN)
559(1)
Cisco IOS Virtual Tunnel Interfaces (VTIs)
560(1)
Cisco IOS FlexVPN
561(1)
IP Security (IPsec)
562(5)
GRE Tunneling over IPsec
567(3)
Review Questions
570(1)
Answers to Review Questions
570(1)
Further Reading
571(1)
What's Next?
571(2)
Chapter 28 Extending the Network Virtually
573(14)
Locator ID/Separation Protocol (LISP)
574(3)
LISP Architecture
577(3)
Virtual Extensible LAN (VXLAN)
580(5)
Review Questions
585(1)
Answers to Review Questions
585(1)
Further Reading
586(1)
What's Next?
586(1)
Part VI Network Assurance
Chapter 29 Troubleshooting
587(26)
Troubleshooting Overview
588(1)
Using debug to Analyze Traffic
589(4)
Troubleshooting with traceroute
593(4)
Troubleshooting with ping
597(7)
Simple Network Management Protocol (SNMP)
604(6)
Review Questions
610(1)
Answers to Review Questions
610(1)
Further Reading
611(1)
What's Next?
611(2)
Chapter 30 Monitoring
613(28)
Syslog
614(6)
NetFlow and Flexible NetFlow
620(12)
Switch Port Analyzer (SPAN), Remote SPAN (RSPAN), and Encapsulated Remote SPAN (ERSPAN)
632(2)
Remote SPAN (RSPAN)
634(1)
Encapsulated Remote SPAN (ERSPAN)
635(4)
Review Questions
639(1)
Answers to Review Questions
640(1)
Further Reading
640(1)
What's Next?
640(1)
Chapter 31 IP SLA and DNA Center
641(20)
IP SLA Overview
642(10)
Cisco DNA Center Assurance
652(8)
Review Questions
660(1)
Answers to Review Questions
660(1)
Further Reading
660(1)
What's Next?
660(1)
Chapter 32 NETCONF and RESTCONF
661(12)
Netconf
662(6)
Restconf
668(3)
Review Questions
671(1)
Answers to Review Questions
671(1)
Further Reading
671(1)
What's Next?
671(2)
Glossary 673(22)
Index 695
Donald Bacha is a systems engineer with a health research organization. He's the technical lead responsible for the design and implementation of networking, compute, virtualization, storage, and disaster recovery systems. Over the past 18 years, Donald has supported cloud services provider, enterprise, and data center environments by contributing to complex routing and switching, data center, storage, and virtualization projects in both greenfield and brownfield deployments. His certifications include CCNP Enterprise, CCNP Data Center, and VCAP-DCV. He holds a master's of business administration. Donald can be found at www.allthingsvirtual.net and on Twitter at @donald_bacha.