Appendix E. Memory Tables Answer Key

Chapter 1

Image

Table 1-3 PBM Network Lifecycle Phases

Image

Table 1-8 PPDIOO Network Lifecycle Phases

Image

Table 1-11 Top-Down Design Compared to Bottom-Up Design

Image

Table 1-12 Sections of the Design Document

Chapter 2

Image
Image

Table 2-2 Cisco Enterprise Architecture Model

Image

Table 2-3 Cisco Enterprise Architecture Model

Image

Table 2-4 Redundancy Models

Chapter 3

Image

Table 3-6 LAN Device Comparison

Image
Image

Table 3-9 Campus Layer Design Best Practices

Image

Table 3-10 Mechanisms Within the Cisco STP Toolkit

Chapter 4

Image

Table 4-2 Summary of Data Center Facility Considerations

Image

Table 4-3 Data Center Core Drivers

Image

Table 4-4 Virtualization Key Drivers

Image

Table 4-5 Network Virtualization Design Considerations

Image

Table 4-6 DCI Transport Options

Chapter 5

Image

Table 5-2 WLAN Standards Summary

Image

Table 5-4 Cisco UWN Architecture

Image

Table 5-5 Access Point Modes

Image

Table 5-7 WLC Components

Image

Table 5-8 WLC Interface Types

Image

Table 5-10 WLC Redundancy

Image

Table 5-11 Wireless Mesh Components

Image

Table 5-12 WLAN Design Considerations

Chapter 6

Image

Table 6-2 WAN Comparison

Image

Table 6-3 Key Design Principles

Image

Table 6-4 Application Requirements

Image

Table 6-5 Physical Bandwidth Comparison

Image

Table 6-6 WAN Link Characteristics

Image

Table 6-7 QoS Considerations

Image

Table 6-8 Link-Efficiency Mechanisms

Chapter 7

Image

Table 7-2 Remote Site Connectivity Options: Pros and Cons

Image

Table 7-3 VPNs Found in Enterprise and Service Provider Environments

Image

Table 7-4 Enterprise VPN Comparison

Image

Table 7-6 WAN/MAN Architecture Comparison

Image

Table 7-7 Cisco Router/Switch Platform and Software Comparison

Chapter 8

Image

Table 8-2 IP Protocol Numbers

Image

Table 8-3 IPv4 Header Fields

Image

Table 8-4 IP Precedence Bit Values

Image

Table 8-8 IP DSCP Values

Image

Table 8-11 IPv4 Address Type

Image

Table 8-12 IPv4 Private Address Space

Image

Table 8-13 NAT Concepts

Image

Table 8-15 Subnet Masks

Image

Table 8-27 Public Versus Private IP Addresses

Image

Table 8-31 DNS Resource Records

Chapter 9

Image

Table 9-2 IP Protocol Numbers

Image
Image

Table 9-3 IPv6 Prefix Allocation

Image

Table 9-4 Multicast Scope Assignments

Image

Table 9-5 Well-Known IPv6 Multicast Addresses

Image

Table 9-7 IPv6 Addresses Prefix

Image

Table 9-8 IPv6 Address Autoconfiguration Scheme

Image

Table 9-9 IPv6 Mechanisms

Image

Table 9-12 IPv6 Deployment Model Comparison

Image

Table 9-13 IPv6 Deployment Models

Image

Table 9-14 IPv6 and IPv4 Characteristics

Chapter 10

Image

Table 10-2 IGP and EGP Protocol Selection

Image

Table 10-3 Distance-Vector Versus Link-State Routing Protocols

Image

Table 10-4 IPv4 and IPv6 Routing Protocols

Image

Table 10-5 Default Administrative Distances for IP Routes

Image

Table 10-6 Routing Protocol Characteristics

Chapter 11

Image

Table 11-4 Major LSA Types

Image

Table 11-6 OSPFv3 LSA Types

Image

Table 11-10 Multicast Addresses

Image

Table 11-11 Well-Known Multicast Addresses

Chapter 12

Image

Table 12-2 Security Legislation

Image

Table 12-3 Security Threats

Image

Table 12-4 Security Risks

Image

Table 12-5 Software Features to Manage DoS Attacks

Image

Table 12-6 Key Network Security Elements of the Network Security Lifecycle

Image

Table 12-7 Security Policy Documents

Image

Table 12-9 Steps for Continuous Security

Image

Table 12-10 Domains of Trust: Risks from Low to High

Chapter 13

Image

Table 13-2 IDS/IPS Pros and Cons

Image

Table 13-3 Cisco WSA Modes

Image

Table 13-4 Integrated Security for Cisco IOS

Image

Table 13-5 Security in the Campus

Image

Table 13-6 Security in the Data Center

Image

Table 13-7 Enterprise Edge Device Selection

Image

Table 13-8 Security in the Enterprise Edge

Chapter 14

Image

Table 14-2 Common CAS and CCS Signaling Types

Image

Table 14-5 IPT Functional Areas

Image

Table 14-8 Codec Standards

Image

Table 14-11 Significant Protocols in VoIP Networks

Image

Table 14-14 QoS Scheme Summary

Image

Table 14-15 Cisco Service Class PHB Recommendations

Chapter 15

Image

Table 15-2 Network Management Elements

Image

Table 15-3 SNMP Message Types

Image

Table 15-4 SNMP Security Levels

Image

Table 15-7 Syslog Message Levels

Image

Table 15-8 NetFlow, CDP, and Syslog

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.15.163.239