Summary: Ccie Written Objectives
- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding
Read the summary and the most important questions on CCIE Written Objectives
-
1 Network Principles
-
1.1.1 IOS and IOS XE
This is a preview. There are 21 more flashcards available for chapter 1.1.1
Show more cards here -
What is pre-emptive and non-preemptive scheduling?
Non-Preemptive scheduling: When a process enters the state of running, the state of that process is not deleted from the scheduler until it finishes its service time.
Preemptive scheduling: The preemptive scheduling is prioritized. The highest priority process should always be the process that is currently utilized.
Preemptive multitasking involves the use of an interrupt mechanism which suspends the currently executing process and invokes a scheduler to determine which process should execute next. -
What is the ESP card?
Embedded service processor card used for forwarding traffic -
What is the control-plane for ESP cards?
FECP forwarding engine control processor -
What is the control-plane for SPA?
IOCP i/o control processor -
What is the command to create an alias for configure?
alias exec c configure terminal
show aliases -
1.1.3.1 Unicast flooding
This is a preview. There are 1 more flashcards available for chapter 1.1.3.1
Show more cards here -
Whatdoes the command mac-address-table unicast-flood {limit kfps} {vlan vlan} {filter timeout | alert|shutdown}?
Used for unicast flood prevention -
1.1.3.4 Impact of micro burst
This is a preview. There are 2 more flashcards available for chapter 1.1.3.4
Show more cards here -
What does the command burst threshold [ingress | egress] size max_bytes interval interval_time?
Configure micro-burst monitoring on an interface level in max_size -
What does the command burst maximum [ingress | egress] burst-count max_bytes?
Configures the maximum number of bursts allowed within a time interval before generating an interrupt -
1.1.4 IP operations
This is a preview. There are 5 more flashcards available for chapter 1.1.4
Show more cards here -
What is protocol name for protocol numbers 1, 6, 17, 88, 89, 103?
1 ICMP
6 TCP
17 UDP
88 EIGRP
89 OSPF
103 PIM -
What are the IPv4 header field? (13)
Version
Internet Header length (IHL)
DS Field
Total Packet Length
Identification (for fragmentation)
Flags (for fragmentation)
Fragment offset (for fragmentation)
TTL
Protocol
Header checksum
Source IP
Destination IP
Optional Header field and Padding
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Topics related to Summary: Ccie Written Objectives
-
Network Principles - Network Theory - IP operations
-
Network Theory - TCP operations - IPv4 and IPv6 PMTU
-
Network Theory - TCP operations - MSS
-
Network Theory - TCP operations - Options
-
Network troubleshooting - Use IOS troubleshooting tools - debug, conditional debug
-
Network troubleshooting - Use IOS troubleshooting tools - Embedded packet capture
-
Layer 2 Technologies
-
Layer 3 Technologies - Addressing technologies - Identify, implement and troubleshoot IPv6 addressing and subnetting
-
Layer 3 Technologies - Layer 3 multicast - Implement and troubleshoot IPv4 protocol independent multicast
-
Layer 3 Technologies - EIGRP (for IPv4 and IPv6)
-
OSPF (v2 and v3) - Describe packet types - LSA types
-
Layer 3 Technologies - OSPF (v2 and v3) - Implement and troubleshoot neighbor relationship
-
Layer 3 Technologies - OSPF (v2 and v3) - Implement and troubleshoot network types, area types and router types
-
Layer 3 Technologies - OSPF (v2 and v3) - Implement, troubleshoot and optimize OSPF convergence and scalability
-
Layer 3 Technologies - BGP
-
VPN Technologies - Tunneling - Implement and troubleshoot DMVPN (single-‐hub)
-
Tunneling - Describe basic layer 2 VPN – wireline - L2TPv3 general principles
-
Tunneling - Describe basic layer 2 VPN – wireline - ATOM general principles
-
VPN Technologies - Tunneling - Describe basic L2VPN – LAN services
-
Encryption - Implement and troubleshoot IPSec with pre-‐shared key - Virtual tunneling Interface (VTI)
-
VPN Technologies - Encryption - Describe GET VPN
-
Network security - Implement and troubleshoot switch security features - Private VLAN
-
Network security - Implement and troubleshoot IPv6 first hop security - RA guard