Читать книгу CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies - Ben Piper, David Higby Clinton - Страница 21
Objective Map
ОглавлениеThe following table lists each domain and its weighting in the exam, along with the chapters in the book where that domain's objectives are covered.
Domain | Percentage of exam | Chapter |
Domain 1: Architecture | 15% | |
1.1 Explain the different design principles used in an enterprise network | 1, 3 | |
1.2 Analyze design principles of a WLAN deployment | 4 | |
1.3 Differentiate between on-premises and cloud infrastructure deployments | 11 | |
1.4 Explain the working principles of the Cisco SD-WAN solution | 11 | |
1.5 Explain the working principles of the Cisco SD-Access solution | 11 | |
1.6 Describe concepts of wired and wireless QoS | 9 | |
1.7 Differentiate hardware and software switching mechanisms | 1 | |
Domain 2: Virtualization | 10% | |
2.1 Describe device virtualization technologies | 10 | |
2.2 Configure and verify data path virtualization technologies | 10 | |
2.3 Describe network virtualization concepts | 10 | |
Domain 3: Infrastructure | 30% | |
3.1 Layer 2 | 1, 2, 3 | |
3.2 Layer 3 | 1, 5, 6, 7 | |
3.3 Wireless | 4 | |
3.4 IP Services | 3, 8, 12 | |
Domain 4: Network Assurance | 10% | |
4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog | 12 | |
4.2 Configure and verify device monitoring using syslog for remote logging | 12 | |
4.3 Configure and verify NetFlow and Flexible NetFlow | 12 | |
4.4 Configure and verify SPAN/RSPAN/ERSPAN | 12 | |
4.5 Configure and verify IPSLA | 12 | |
4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management | 11 | |
4.7 Configure and verify NETCONF and RESTCONF | 11 | |
Domain 5: Security | 20% | |
5.1 Configure and verify device access control | 12 | |
5.2 Configure and verify infrastructure security features | 12 | |
5.3 Describe REST API security | 11 | |
5.4 Configure and verify wireless security features | 4, 12 | |
5.5 Describe the components of network security design | 4, 12 | |
Domain 6: Automation | 15% | |
6.1 Interpret basic Python components and scripts | 11 | |
6.2 Construct valid JSON encoded file | 11 | |
6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG | 11 | |
6.4 Describe APIs for Cisco DNA Center and vManage | 11 | |
6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF | 11 | |
6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection | 11 | |
6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack | 11 |