Cisco Certified Network Associate (200-125) : Exam Description
Cisco Certified Network Associate (200-125) : Exam Description
Page 1
1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN
environment
2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
2.4.a Access ports (data and voice)
2.4.b Default VLAN
3.3 Describe how a routing table is populated by different routing information sources
3.3.a Admin distance
3.6 Compare and contrast distance vector and link state routing protocols
3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing
3.8.a Default route
3.8.b Network route
2016 Cisco Systems, Inc. This document is Cisco Public. Page 4
3.8.c Host route
3.8.d Floating static
3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication,
filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding
authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual
summarization, redistribution, stub)
3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual
summarization, redistribution, stub)
3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual
summarization, redistribution)
4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route
advertisement using Network command only)
6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
6.3.a Standard
6.3.b Extended
6.3.c Named
6.4 Verify ACLs using the APIC-EM Path Trace ACL Analysis tool
6.6 Describe device security using AAA with TACACS+ and RADIUS