CCNA-Quick-Reference
CCNA-Quick-Reference
Page | 1 lammle.com
IP CONNECTIVITY IP SERVICES
Default Admin Distances (Cisco) Inside Source Dynamic PAT
Page | 3 lammle.com
WPA2: WPA2 is considered strong enough for use REST APIs: These APIs are often used for cloud and
today. It replaced TKIP (which had weaknesses) SDN technologies. They ensure that you can
with CCMP. Like WPA, it uses AES for encryption. retrieve data using “standard” URLs understood by
TKIP is still present in the protocol, but only for web browsers and Internet technologies.
backward compatibility with WPA. JSON: This is a very friendly way to represent data
WPA3: Like WPA2, this latest version of the in a human readable form. JSON presents data as a
security protocol permits you to configure a series of attribute-value pairs. It is very similar to
“personal” or home version, compared to a XML, but even more easily readable by us humans.
stronger “enterprise” version. Puppet, Chef, and Ansible: These tools allow you
to easily manage network devices from a central
Common Cybersecurity Threats location. The tools use different techniques. For
example, Puppet uses an agent on the various
Computer Viruses network devices, while Ansible is often celebrated
Malware as it is agent-less.
Trojans
Adware and spyware
Worms CRUD:
DDoS Create
Phishing Read
Rootkit Update
SQL injection attack Delete
Main-in-the-middle
Ransomware
Data exfiltration
AUTOMATION AND
PROGRAMMABILITY
Controller-based networking: Software defined
networking (SDN) often features the use of a
central controller that implements the control
plane functions required by the network. The
devices that are controlled in SDN can focus on the
forwarding of traffic. The SDN approach fosters
efficient, automated, highly controlled networks.
Page | 4 lammle.com