“Do I Know This Already?” Quiz–Cisco Troubleshooting
Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes,” …
Configuring Routing–Cisco Configuring a Network
Whenever there is a reachability problem, the best place to start looking for the problem is the routing table, which you can see by using show ip route. Figure 23-8 illustrates the parts of show ip route’s output. Figure 23-8 …
Failure Reports–Cisco Managing Networks
Every network failure is a chance to learn about how the network works, unanticipated hardware and software problems, etc. Those who do not document these things, however, are doomed to repeat the same troubleshooting steps and outages repeatedly. Every outage …
Network Documentation–Cisco Managing Networks
It often seems no one in network engineering enjoys documenting their networks. What every engineer enjoys, especially at 2 a.m., when the network is down, and they are on the phone with technical support, is having access to good network …
“Do I Know This Already?” Quiz–Cisco Managing Networks
Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes,” …
Chapter Review– Cisco Security Tools
The previous chapter considered all the various attacks—or rather, problems in network security. This chapter showed how each of these threats can be countered. The chapter began with an overview of authentication tools and concepts, including SSO, zero trust, 2FA, …
Virtual Private Networks– Cisco Security Tools
You often do not want network devices between your host and some destination to be able to see the information you are sending. Virtual private networks (VPNs) use cryptography to hide traffic passing across the Internet. Figure 20-14 illustrates a …
Exchanging Private Keys– Cisco Security Tools
Protocol designers combine the best aspects of public and private key cryptography to create secure transport protocols. Figure 20-12 illustrates how these protocols use these two forms of cryptography. Figure 20-12 Combining Public and Private Key Cryptography In Figure 20-12: …
How to Detect a Phish– Cisco Security Tools
Even though Internet mail systems contain many different checks, a large amount of spam and phishing email—especially well-researched spear phishing—is still delivered. You still need to know how to detect spam and phishing emails. Begin by checking the destination email …
Countering Spam and Phishing– Cisco Security Tools
Social engineering through email, text messages, and private messages is the most common information technology attack. Spam is any unwanted mail, including advertising, newsletters you did not ask for, and scams sent to thousands (or even millions) of users. A …