PG1X

My Knowledge Base

User Tools

Site Tools


certification:tech:network:cisco:exam:encor-350-401:encor-350-401

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
certification:tech:network:cisco:exam:encor-350-401:encor-350-401 [2019/10/11 15:25]
wnoguchi
certification:tech:network:cisco:exam:encor-350-401:encor-350-401 [2019/10/11 15:28] (current)
wnoguchi
Line 5: Line 5:
  
  
-  * 1.0 Architecture  +  * 1.0 Architecture 
-    * 1.1 Explain the different design principles used in an enterprise network +    * 1.1 Explain the different design principles used in an enterprise network
       * 1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning       * 1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
       * 1.1.b High availability techniques such as redundancy, FHRP, and SSO       * 1.1.b High availability techniques such as redundancy, FHRP, and SSO
-    * 1.2 Analyze design principles of a WLAN deployment +    * 1.2 Analyze design principles of a WLAN deployment
       * 1.2.a Wireless deployment models (centralized,​ distributed,​ controller-less,​ controller based, cloud, remote branch)       * 1.2.a Wireless deployment models (centralized,​ distributed,​ controller-less,​ controller based, cloud, remote branch)
       * 1.2.b Location services in a WLAN design       * 1.2.b Location services in a WLAN design
-    * 1.3 Differentiate between on-premises and cloud infrastructure deployments  +    * 1.3 Differentiate between on-premises and cloud infrastructure deployments 
-    * 1.4 Explain the working principles of the Cisco SD-WAN solution +    * 1.4 Explain the working principles of the Cisco SD-WAN solution
       * 1.4.a SD-WAN control and data planes elements       * 1.4.a SD-WAN control and data planes elements
       * 1.4.b Traditional WAN and SD-WAN solutions       * 1.4.b Traditional WAN and SD-WAN solutions
-    * 1.5 Explain the working principles of the Cisco SD-Access solution +    * 1.5 Explain the working principles of the Cisco SD-Access solution
       * 1.5.a SD-Access control and data planes elements       * 1.5.a SD-Access control and data planes elements
       * 1.5.b Traditional campus interoperating with SD-Access       * 1.5.b Traditional campus interoperating with SD-Access
-    * 1.6 Describe concepts of wired and wireless QoS +    * 1.6 Describe concepts of wired and wireless QoS
       * 1.6.a QoS components       * 1.6.a QoS components
       * 1.6.b QoS policy       * 1.6.b QoS policy
-    * 1.7 Differentiate hardware and software switching mechanisms +    * 1.7 Differentiate hardware and software switching mechanisms
       * 1.7.a Process and CEF       * 1.7.a Process and CEF
       * 1.7.b MAC address table and TCAM       * 1.7.b MAC address table and TCAM
       * 1.7.c FIB vs. RIB       * 1.7.c FIB vs. RIB
-  * 2.0 Virtualization  +  * 2.0 Virtualization 
-    * 2.1 Describe device virtualization technologies +    * 2.1 Describe device virtualization technologies
       * 2.1.a Hypervisor type 1 and 2       * 2.1.a Hypervisor type 1 and 2
       * 2.1.b Virtual machine       * 2.1.b Virtual machine
       * 2.1.c Virtual switching       * 2.1.c Virtual switching
-    * 2.2 Configure and verify data path virtualization technologies +    * 2.2 Configure and verify data path virtualization technologies
       * 2.2.a VRF       * 2.2.a VRF
       * 2.2.b GRE and IPsec tunneling       * 2.2.b GRE and IPsec tunneling
-    * 2.3 Describe network virtualization concepts +    * 2.3 Describe network virtualization concepts
       * 2.3.a LISP       * 2.3.a LISP
       * 2.3.b VXLAN       * 2.3.b VXLAN
-  * 3.0 Infrastructure  +  * 3.0 Infrastructure 
-    * 3.1 Layer 2 +    * 3.1 Layer 2
       * 3.1.a Troubleshoot static and dynamic 802.1q trunking protocols       * 3.1.a Troubleshoot static and dynamic 802.1q trunking protocols
       * 3.1.b Troubleshoot static and dynamic EtherChannels       * 3.1.b Troubleshoot static and dynamic EtherChannels
       * 3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)       * 3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
-    * 3.2 Layer 3 +    * 3.2 Layer 3
       * 3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)       * 3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
       * 3.2.b Configure and verify simple OSPF environments,​ including multiple normal areas, summarization,​ and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)       * 3.2.b Configure and verify simple OSPF environments,​ including multiple normal areas, summarization,​ and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
       * 3.2.c Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)       * 3.2.c Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
-    * 3.3 Wireless +    * 3.3 Wireless
       * 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities       * 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
       * 3.3.b Describe AP modes and antenna types       * 3.3.b Describe AP modes and antenna types
Line 52: Line 52:
       * 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming       * 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
       * 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues       * 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues
-    * 3.4 IP Services +    * 3.4 IP Services
       * 3.4.a Describe Network Time Protocol (NTP)       * 3.4.a Describe Network Time Protocol (NTP)
       * 3.4.b Configure and verify NAT/PAT       * 3.4.b Configure and verify NAT/PAT
       * 3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP       * 3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP
       * 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3       * 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3
-  * 4.0 Network Assurance  +  * 4.0 Network Assurance 
-    * 4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog  +    * 4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog 
-    * 4.2 Configure and verify device monitoring using syslog for remote logging  +    * 4.2 Configure and verify device monitoring using syslog for remote logging 
-    * 4.3 Configure and verify NetFlow and Flexible NetFlow  +    * 4.3 Configure and verify NetFlow and Flexible NetFlow 
-    * 4.4 Configure and verify SPAN/​RSPAN/​ERSPAN  +    * 4.4 Configure and verify SPAN/​RSPAN/​ERSPAN 
-    * 4.5 Configure and verify IPSLA  +    * 4.5 Configure and verify IPSLA 
-    * 4.6 Describe Cisco DNA Center workflows to apply network configuration,​ monitoring, and management  +    * 4.6 Describe Cisco DNA Center workflows to apply network configuration,​ monitoring, and management 
-    * 4.7 Configure and verify NETCONF and RESTCONF  +    * 4.7 Configure and verify NETCONF and RESTCONF 
-  * 5.0 Security  +  * 5.0 Security 
-    * 5.1 Configure and verify device access control +    * 5.1 Configure and verify device access control
       * 5.1.a Lines and password protection       * 5.1.a Lines and password protection
       * 5.1.b Authentication and authorization using AAA       * 5.1.b Authentication and authorization using AAA
-    * 5.2 Configure and verify infrastructure security features +    * 5.2 Configure and verify infrastructure security features
       * 5.2.a ACLs       * 5.2.a ACLs
       * 5.2.b CoPP       * 5.2.b CoPP
-    * 5.3 Describe REST API security  +    * 5.3 Describe REST API security 
-    * 5.4 Configure and verify wireless security features +    * 5.4 Configure and verify wireless security features
       * 5.4.a EAP       * 5.4.a EAP
       * 5.4.b WebAuth       * 5.4.b WebAuth
       * 5.4.c PSK       * 5.4.c PSK
-    * 5.5 Describe the components of network security design +    * 5.5 Describe the components of network security design
       * 5.5.a Threat defense       * 5.5.a Threat defense
       * 5.5.b Endpoint security       * 5.5.b Endpoint security
Line 83: Line 83:
       * 5.5.d TrustSec, MACsec       * 5.5.d TrustSec, MACsec
       * 5.5.e Network access control with 802.1X, MAB, and WebAuth       * 5.5.e Network access control with 802.1X, MAB, and WebAuth
-  * 6.0 Automation  +  * 6.0 Automation 
-    * 6.1 Interpret basic Python components and scripts  +    * 6.1 Interpret basic Python components and scripts 
-    * 6.2 Construct valid JSON encoded file  +    * 6.2 Construct valid JSON encoded file 
-    * 6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG  +    * 6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG 
-    * 6.4 Describe APIs for Cisco DNA Center and vManage  +    * 6.4 Describe APIs for Cisco DNA Center and vManage 
-    * 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF  +    * 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF 
-    * 6.6 Construct EEM applet to automate configuration,​ troubleshooting,​ or data collection  +    * 6.6 Construct EEM applet to automate configuration,​ troubleshooting,​ or data collection 
-    * 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack +    * 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
  
certification/tech/network/cisco/exam/encor-350-401/encor-350-401.txt · Last modified: 2019/10/11 15:28 by wnoguchi