 |




White Paper
Sample Questions
Answers & Explanations
Lab Scenario
Simulated CCIE R/S Exam
Subscribe Now
Order Form








|

Cisco CCIE Exam Objectives
Cisco CCIE Exam Objective Codes
CCIE R/S 1.0 (350-001) - Cisco Certified Internet Expert Routing & Switching Exam Objectives:
Topic |
Objective |
Description |
A |
|
Cisco Device Operation: |
|
A1 |
Commands: show, debug |
|
A2 |
Infrastructure: NVRAM, Flash, Memory & CPU, file system, config reg |
|
A3 |
Operations: file transfers, password recovery, Simple Network Management Protocol (SNMP), accessing devices, security (passwords) |
B |
|
General Networking Theory: |
|
B1 |
OSI model: Layer comparisons, functions |
|
B2 |
General Routing Concepts: Split horizon, difference between switching and routing, summarization, Link State vs. Distance Vector, loops, tunneling |
|
B3 |
Protocol comparisons: Internet Protocol (IP) vs. Internetwork Packet Exchange (IPX), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), etc. |
|
B4 |
Standards: 802.x, protocol limitations |
|
B5 |
Protocol Mechanics: Windowing/Acknowledgements (ACK), fragmentation, maximum transmission unit (MTU), handshaking, termination |
C |
|
Bridging & LAN Switching: |
|
C1 |
Transparent Bridging: IEEE/DEC spanning tree, translational, Configuration Bridging Protocol Data Unit (BPDU), Integrated Routed and Bridging (IRB), Concurrent Routing and Bridging (CRB), access lists |
|
C2 |
Source Route Bridging: Source-route translational bridging (SR/TLB), source- route transparent bridging (SRT), data-link switching (DLSw), remote source- route bridging (RSRB), access lists |
|
C3 |
LAN Switching: Trunking, VLAN Trunk Protocol (VTP), inter-switch link (ISL), Virtual LANs (VLANS), Fast Ether Channel (FEC), Cisco Discovery Protocol (CDP), Cisco Group Management Protocol (CGMP) |
|
C4 |
LANE: LAN Emulation Client (LEC), LAN Emulation Server (LES), Broadcast and Unknown Server (BUS), LAN Emulation Configuration Server (LECS), Simple Server Replication Protocol (SSRP) |
D |
|
Internet Protocol (IP): |
|
D1 |
Addressing: Classless Interdomain Routing (CIDR), subnetting, Address Resolution Protocol (ARP), Network Address Translation (NAT), Hot Standby Router Protocol (HSRP) |
|
D2 |
Services: Domain Name System (DNS), Bootstrap Protocol (BOOTP), Dynamic Host Configuration Protocol (DHCP), Internet Control Message Protocol (ICMP) |
|
D3 |
Applications: Telnet, File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP) |
|
D4 |
Transport: IP fragmentation, sockets, ports |
|
D5 |
Access Lists |
E |
|
IP Routing Protocols: |
|
E1a |
Open Shortest Path First (OSPF) Design: areas, virtual links, stub, not so stubby areas (NSSA), area border router (ABR) / autonomous system boundary router (ASBR) redistributions, media dependencies, external vs. internal, summarization |
|
E1b |
Open Shortest Path First (OSPF) Operation: Designated Router (DR), Backup Designated Router (BDR), adjacencies, link-state advertisement (LSA) types, link-state database, shortest path first (SPF) algorithm, authentication |
|
E2a |
Border Gateway Protocol (BGP) Design: Peer Groups, Route Reflectors, Confederations, Clusters, Attributes, Autonomous Systems (AS) |
|
E2b |
Border Gateway Protocol (BGP) Operation: Route Maps, Filters, Neighbors, decision algorithm, Interior Border Gateway Protocol (IBGP), Exterior Border Gateway Protocol (EBGP) |
|
E3 |
Enhanced Interior Gateway Routing Protocol (EIGRP): Metrics, mechanics, & design |
|
E4 |
Intermediate System to Intermediate System (IS-IS): Metrics, mechanics, & design |
|
E5 |
Routing Information Protocol RIP) & RIP v2: : Metrics, mechanics, & design |
|
E6 |
Multicast: Design, Protocol Independent Multicast (PIM - both sparse and dense), Distance Vector Multicast Routing Protocol (DVMRP), Internet Group Management Protocol (IGMP) |
|
E7 |
Access lists: distribute lists, route maps, policy routing, redistribution, route tagging |
F |
|
Desktop Protocols: |
|
F1 |
Internetwork Packet Exchange (IPX): NetWare Link Services Protocol. (NLSP), IPX-RIP, IPX-Service Advertising Protocol (SAP), IPX-EIGRP, Sequenced Packet Exchange (SPX), Network Control Protocol (NCP), IPXWAN, IPX addressing, Get Nearest Server (GNS), Nove |
|
F2 |
AppleTalk: Routing Table Maintenance Protocol (RTMP), AppleTalk Update- Based Routing Protocol (AURP), Appletalk-EIGRP, Datagram Delivery Protocol (DDP), Zone Information Protocol (ZIP), Name Binding Protocol (NBP), addressing (phase 1 & 2), access lists |
|
F3 |
DECnet/OSI: Addressing, access lists |
|
F4 |
Windows NT: NetBIOS, browsing, domain controller (e.g. WINS), access lists |
G |
|
Performance Management: |
|
G1 |
Traffic Management: Queuing, Weighted Fair Queuing (WFQ), Resource Reservation Protocol (RSVP), traffic shaping, load balancing |
H |
|
WAN: (addressing, signaling, framing) |
|
H1 |
ISDN: Link Access Procedure on the D channel (LAPD), Basic Rate Interface (BRI) / Primary Rate Interface (PRI) framing, signaling, mapping, dialer map, interface types, B/D channels, channel bonding |
|
H2 |
Frame relay: Local Management Interface (LMI), Data Link Connection Identifier (DLCI), Permanent Virtual Circuit (PVC), framing, traffic shaping, forward explicit congestion notification (FECN), backward explicit congestion notification (BECN), CIR, disca |
|
H3 |
X.25: addressing, routing, Link Access Procedure Balanced (LAPB), error control/recovery, windowing, signaling, mapping, Switched Virtual Circuit (SVC) / Permanent Virtual Circuit (PVC), Protocol Translation |
|
H4 |
ATM: Switched Virtual Connection (SVC) / Permanent Virtual Connection (PVC), ATM Adaptation Layer (AAL), Service Specific Connection Oriented Protocol (SSCOP), User-Network Interface (UNI) / Network-Network Interface (NNI), Interim Local Management Interf |
|
H5 |
Physical Layer: Synchronization, Synchronous Optical Network (SONET), T1, E1, encoding |
|
H6 |
Leased Line Protocols: High-Level Data Link Control (HDLC), Point to Point Protocol (PPP), async & modems, compression |
|
H7 |
Dial on Demand Routing (DDR): dial backup |
I |
|
LAN: |
|
I1 |
Datalink Layer: addressing, 802.2 Ethernet/Fast Ethernet/Gigabit Ethernet: encapsulation, carrier sense multiple access collision detect (CSMA/CD), topology, speed, controller errors, limitations, 802.3 |
|
I2 |
Token Ring: token passing, beaconing, Active Monitor, ring insertion, soft & hard errors, encapsulation, topology, maximum transmission unit (MTU), speed, limitations |
|
I3 |
FDDI/CDDI: dual ring, encapsulation, class, redundancy, dual homing, medium (copper, fiber), claims, Station Management (SMT), limitations |
J |
|
Security: |
|
J1 |
Authentication, Authorization, and Accounting (AAA), Terminal Access Controller Access Control System (TACACS), and RADIUS: general concepts, usage, comparisons |
|
J2 |
Firewalls: PIX, access lists, demilitarized zones (DMZ) |
|
J3 |
Encryption: public/private key, Data Encryption Standard (DES) |
K |
|
Multiservice: |
|
K1 |
Voice/Video: H.323, codecs, Signaling System 7 (SS7), Real-Time Transport Protocol (RTP), RTP Control Protocol (RTCP), Quality of Service (QoS) |
Last Updated on 2023-09-17
By Ken Fleming
Study Zone for CCNA |
Study Zone for CCIE |
CertificationZone Honor Roll
Have A Question? |
Meet this Area's ZoneMaster |
Links
Shopping Zone |
Become A ZoneMaster
- We are not Cisco ® -
Copyright � 2000 Genium Publishing Corporation. All rights reserved.
Do not duplicate or redistribute in any form.
|