CCDA 200-310 Official Cert Guide

Fifth Edition

Copyright © 2017 Pearson Education, Inc.

ISBN-10: 1-58714-454-9
ISBN-13: 978-1-58714-454-7

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: June 2016

Corrections for November 9, 2017

Pg / Error – Second Printing / Correction
722 / Glossary, GLBP
Reads:
GLBP Global Load Balancing Protocol. Similar to HSRP, but provides load balancing between the redundant routers. / Should read:
GLBP Gateway Load Balancing Protocol. Similar to HSRP, but provides load balancing between the redundant routers.


Corrections for October 30, 2017

Pg / Error – Second Printing / Correction
429 / Chapter 11, Remove Question 12 and Answers / Remove
Question 12 and Answer
668 / Appendix A, “Answers to the Do I Know This Already?” Quizzes, Remove Chapter 11, Question 12 Answer / Remove
Answer to Chapter 11, Question 12

Corrections for July 20, 2017

Pg / Error – Second Printing / Correction
74 / Chapter 2 , Answers to the Q&A Questions, Question 42, Answer C
Reads:
C. Provides connectivity to end devices / Should read:
C. Performs Security Filtering
85 / Chapter 3, Table 3-2, Column: Maximum Segment Length, Third Row Down
Reads:
62.5 micrometers:
220 m
50 micrometers:
500 m / Should read:
62.5 micrometers:
260 m
50 micrometers:
550 m
87 / Chapter 3, Table 3-3, Column: Wavelength/Fiber (Short for Long)/UTP/Copper, Sixth Row Down
Reads:
Extra-long-wavelength SNMP / Should read:
Extra-long-wavelength SMF
168 / Chapter 5, “Do I Know This Already?” Quiz, Question 7
Reads:
7. What is the recommended maximum number of data devices associated to a WLAN? / Should read:
7. What is the recommended maximum number of data devices associated to a Access Point?
204 / Chapter 5, Q&A, Question and Answers for Question 11
Reads:
11. How many access points are supported in a mobility group using Cisco series 2500 WLCs?
a. 144
b. 1200
c. 1800
d. 7200 / Should read:
11. How many access points are supported in a mobility group using Cisco series 5508 WLCs?
a. 144
b. 1200
c. 2400
d. 12000
387 / Chapter 10, Last Paragraph, Remove Second and Third Sentences / Sentences to remove:
There is one exception. If the static route points to a connected interface, it inherits the administrative distance of connected interfaces, which is 0.
667 / Appendix A, Chapter 9, Answers to the “Do I Know This Already?” Quizzes, Question 7
Reads:
7. B. The IPv6 multicast address type handles broadcasts. / Should read:
7. B. IPv4 broadcasts traffic is replaced with the IPv6 ‘all-nodes’ multicast address.
679 / Appendix A, Chapter 5, Answers to the Q&A Questions, Question 11
Reads:
11. C. The 2500 series WLC supports 75 APs. 75 APs times 24 controllers in a mobility group equals 1800. / Should read:
11. D. Mobility Groups support up to 24 controllers. If 24 Cisco 5508 WLCs (500 APs supported per 5508 WLC) are used, 242*500 = 12000 APs are supported.

Corrections for May 31, 2017

Pg / Error – Second Printing / Correction
87 / Chapter 3, Table 3-3, Sixth Line, Column Two
Reads:
Extra-long-wavelength SNMP / Should read:
Extra-long-wavelength SMF
311 / Chapter 8, Performing Route Summarization, Last Paragraph
Reads:
Instead of announcing each and every subnet of this network to the WAN, the recommendation is to summarize the site with a10.10.128.0/26route. This subnet encompasses networks from 10.10.128.0/24to10.10.191.0/24, so this address block would be assigned to this site. / Should read:
Instead of announcing each and every subnet of this network to the WAN, the recommendation is to summarize the site with a10.10.128.0/18route. This subnet encompasses networks from 10.10.128.0/24to10.10.191.0/24, so this address block would be assigned to this site
315 / Chapter 8, Table 8-29, Ninth Row Down, Third Column
Reads:
/318 / Should read:
/
417 / Chapter 10, Question 26
Reads:
26. What is a major advantage of a classless structured network over a classless network? / Should read:
26. What is a major advantage of a classless network over a classful network?
687 / Appendix A, Chapter 10, Answer to Question 26
Reads:
26. A. Classless networks have less routing overhead. / Should read:
26. C. Less IP addresses are used in classful networks.

Corrections for April 18, 2017

Pg / Error – Second Printing / Correction
81 / Chapter 3, “Do I Know This Already?” Quiz, Question 1, f.
Reads:
f. a and d / Should read:
f. c and d
670 / Appendix A, Answers to the Q&A Questions, Chapter 1, Answer 5
Reads:
5. i = D, ii = F, iii = c, iv = B, V = E, vi = A. / Should read:
5. i = D, ii = F, iii = C, iv = A, v = F, vi = B.

Corrections for January 16, 2017

Pg / Error – First Printing / Correction
398 / Chapter 10, RIPng Summary, 10th Bullet Point
Reads:
§  Administrative distance for RIPv2 is 120. / Should read:
§  Administrative distance for RIPng is 120.

Corrections for November 21, 2016

Pg / Error – First Printing / Correction
67 / Chapter 2, First Reference
Reads:
RFC 3758: Virtual Router Redundancy Protocol (VRRP). / Should read:
RFC 3768: Virtual Router Redundancy Protocol (VRRP), http://tools.ietf.org/html/rfc3768
402 / Chapter 10, Tenth Paragraph, Second formula
Reads:
= 256 * 100 * 10 microseconds / Should read:
= 256 * 100 * 1 microseconds

Corrections for August 24, 2016

Pg / Error / Correction
16 / Chapter 1, First Paragraph, Second Sentence
Reads:
The first documents are high level in scope, and as the project works through the lifecycle phases, more details and generated. / Should read:
The first documents are high level in scope, and as the project works through the lifecycle phases, more details are generated.
138 / Chapter 4, Third Paragraph, Last Sentence
Reads:
Although estimating the size of the data center is challenging, it is also critically importance that it be done correctly. / Should Read:
Although estimating the size of the data center is challenging, it is also critically important that it be done correctly.
192 / Chapter 5, Radio Management and Radio Groups, First Paragraph, Third Sentence
Reads:
The recommended best practice is to limit the number of data devices connected to each AP to 20, or no more than seven concurrent voice over WLAN (VoWLAN) calls using G.711 or eight concurrent VoWLAN calls using G.729. / Should read:
The recommended best practice is to limit the number of data devices connected to each AP to 30, or no more than seven concurrent voice over WLAN (VoWLAN) calls using G.711 or eight concurrent VoWLAN calls using G.729.
197 / Chapter 5, Wireless and Quality of Service (QoS), First Paragraph, Second Sentence
Reads:
Whereas IEEE 802.1p is used for Layer 2 QoS in wired networks, IEEE 802.1e defines mechanisms for implementing Layer 2 QoS in wireless LANs. / Should read:
Whereas IEEE 802.1p is used for Layer 2 QoS in wired networks, IEEE 802.11e defines mechanisms for implementing Layer 2 QoS in wireless LANs.
197 / Chapter 5, Wireless and Quality of Service (QoS), First Paragraph, Third Sentence
Reads:
A translation between IP DSCP, 802.3e, and 802.3p values needs to occur. / Should read:
A translation between IP DSCP, 802.11e, and 802.1p values needs to occur.
201 / Chapter 5, Q&A, Question 11
Reads:
11. How many access points are supported in a mobility group using Cisco series WLCs? / Should read:
11. How many access points are supported in a mobility group using Cisco series 2500 WLCs?
201 / Chapter 5, Q&A, Question 11, Answer c
Reads:
c. 2400 / Should read:
c. 1800
206 / Chapter 5, Q&A, Question 21
Reads:
21. How many APs does the Cisco 6500 WLC module support? / Should read:
21. How many APs does the WiSM2 WLC module support?
206 / Chapter 5, Q&A, Question 21, Answer d
Reads:
d. 300 / Should read:
d. 1000
208 / Chapter 5, Q&A, Question 32
Reads:
32. What is necessary when you use H-LEAP for authentication? / Should read:
32. What is necessary when you use LEAP for authentication?
229 / Chapter 6, First Paragraph, Last Sentence
Reads:
Some carriers will also charge more additional CoS queues, so it is important to design the proper amount of CoS queues, factoring in room for growth. / Should read:
Some carriers charge more for additional CoS queues, so it is important to design the proper amount of CoS queues, factoring in room for growth.
240 / Chapter 6, First Paragraph, First Sentence
Reads:
Whether or not to backhaul Internet traffic from branches offices versus branches having direct Internet is a common decision that many companies now need to face. / Should read:
Whether or not to backhaul Internet traffic from branch offices versus branches having direct Internet is a common decision that many companies now need to face.
253 / Chapter 7, First Paragraph after Bullets, Second Sentence
Reads:
For example, if you have four sites, the six VCs are required: ((4-1) x 4/2) = 6. / Should read:
For example, if you have four sites, then six VCs are required: ((4-1) x 4/2) = 6.
256 / Chapter 7, Last Paragraph, Last Sentence
Reads:
Figure 7-3 shows the topology for IPsec direction encapsulation with multiple headend sites to provide resiliency for the branch offices. / Should read:
Figure 7-3 shows the topology for IPsec direct encapsulation with multiple headend sites to provide resiliency for the branch offices.
274 / Chapter 7, Second Paragraph, First Sentence
Reads:
Flat Layer 2 designs are commonly used to design branch small locations. / Should read:
Flat Layer 2 designs are commonly used to design small branch locations.
304 / Chapter 8, First Sentence after Table 8-16
Reads:
Use the formula 2n – 2 to calculate the number of hosts per subnet, where n is the number of bits for the host portion. / Should read:
Use the formula 2n – 2 to calculate the number of hosts per subnet, where n is the number of bits for the host portion.
311 / Chapter 8, First Paragraph, Third Sentence
Reads:
Route summarization reduces the size of the routing table and as a result reduces the amount the route update traffic on the network. / Should read:
Route summarization reduces the size of the routing table and as a result reduces the amount of route update traffic on the network.
319 / Chapter 8, Table 8-30, Third Network Location
Reads:
Allocation of IP addresses are permanently assign to a host. / Should read:
Allocation of IP addresses are permanently assigned to a host.
326 / Chapter 8, Q&A, Question 14
Reads:
14. Which network and mask summarize both the 192.170.20.16/30 and 192.170.20.20/30 networks? / Should read:
14. Which network and mask summarize the best smallest summary route?
346 / Chapter 9, First Paragraph, Second Sentence
Reads:
Table 9-7 summarizes the prefixes their respective address type. / Should read:
Table 9-7 summarizes the prefixes and their respective address type.
354 / Chapter 9, First Paragraph, Fourth Sentence
Reads:
Some IPv6 design concepts are similar to IPv6 (such as the goal to do summarization), and some concepts are unique to IPv6. / Should read:
Some IPv6 design concepts are similar to IPv4 (such as the goal to do summarization), and some concepts are unique to IPv6.
386 / Chapter 10, Last Paragraph, Fourth Sentence
Reads:
For example, if to reach a destination of 170.20.10.1 OSPF has a route prefix of 170.20.10.0/24 and EIGRP has a route prefix of 170.20.0.0/16, the OSPF route is preferred because the /24 prefix is longer than the /16 prefix. / Should read:
For example, to reach a destination of 170.20.10.1 OSPF has a route prefix of 170.20.10.0/24 and EIGRP has a route prefix of 170.20.0.0/16, the OSPF route is preferred because the /24 prefix is longer than the /16 prefix.
401 / Chapter 10, EIGRP, First Paragraph, First Sentence
Reads:
EIGRP sets updates only when necessary and sends them only to neighboring routers. / Should read:
EIGRP sends updates only when necessary and sends them only to neighboring routers.
420 / Chapter 10, Q&A, Question 44
Reads:
44. Which routing protocol uses multicast FF28::A and Next Header protocol 88? / Should read:
44. Which routing protocol uses multicast FF02::A and Next Header protocol 88?
439 / Chapter 11, OSPFv3, First Paragraph, Second Sentence
Reads:
Note that OSPFv3 is for IPv6 networks only and that it is not backward compatible with OSPFv2 (used in IPv4). / Should read:
Note that OSPFv3 is for IPv6 networks only and that it is not backward compatible with OSPFv2 (used in IPv4).
441 / Chapter 11, Last Paragraph, Last Sentence
Reads:
Each OSPFv3 LSA is described in more detail following the table. / Should read:
OSPFv3 initially supported IPv6 networks only, but it has been updated to support both IPv6 and IPv4 networks.
444 / Chapter 11, BGP Neighbors, First Paragraph, Second to last Sentence
Reads:
ASNs 65,512 through 65,535 are considered private ASNs. / Should read:
ASNs 64,512 through 65,535 are considered private ASNs.
449 / Chapter 11, BGP Path Attributes, First Paragraph, Third Sentence
Reads:
BGP path attributes include next hop, local preference, autonomous system path, origin, multi-exit discriminator (MED), atomic aggregate, and aggregator. / Should read:
BGP path attributes include next hop, local preference, autonomous system path, origin, multi-exit discriminator (MED), Community, atomic aggregate, and aggregator.
525 / Chapter 13, Network Security Platforms, First Bullet, First Sentence
Reads:
§  ASA is a high-performance firewall appliance with IPS, antivirus, IPsec, and Secure Shell (SSL) virtual private network (VPN) technologies integrated into a single unified architecture. / Should read:
§  ASA is a high-performance firewall appliance with IPS, antivirus, IPsec, and Secure Sockets Layer (SSL) virtual private network (VPN) technologies integrated into a single unified architecture.
538 / Chapter 13, Cisco ESA, Fifth Sentence
Reads:
One of the advantages of using Cisco EAS for your MTA in the message transfer chain is that ESA can determine the source IP address and query that against the Cisco SensorBase to get the sender’s reputation score. / Should read:
One of the advantages of using Cisco EAS for your MTA in the message transfer chain is that ESA can determine the source IP address and query that against the Cisco SenderBase to get the sender’s reputation score.
583 / Chapter 14, RTP and RTCP, Sixth Sentence
Reads:
Real-time traffic is carried over UDP ports ranging from 16,384 to 32767. / Should read:
Real-time traffic is carried over UDP ports ranging from 16,384 to 32,767.
587 / Chapter 14, Fourth Paragraph, Second Sentence
Reads:
RTCP is also a transport layer protocol. / Should read:
RTCP is a session layer protocol.
613 / Chapter 14, Question 53, Answer b
Reads:
b. Classifying the voice traffic, congesting management, and compression and fragmentation. / Should read:
b. Classifying the voice traffic, congestion management, and compression and fragmentation.
636 / Chapter 15, Q&A, Question 19, Part iii
Reads:
iii. alHost / Should read:
iii. Application-Layer Host
636 / Chapter 15, Q&A, Question 19, Part iv
Reads:
iv. protocoldir / Should read:
iv. Protocol Directory
671 / Appendix A, Chapter 1, Question 29, First Sentence in Answer
Reads:
29. C-1, A-2, B-3, C-4. / Should read:
29. D-1, A-2, B-3, C-4.
672 / Appendix A, Chapter 1
Add Answer 46 / Answer to add:
46. A. Plan
679 / Appendix A, Chapter 5, Answer to Question 11
Reads:
11. C. Each 4400 series WLC supports 100 Aps, 100 Aps times 24 controllers in a mobility group equals 2400. / Should read:
11. C. The 2500 series WLC supports 75 APs. 75 APs times 24 controllers in a mobility group equals 1800.

Corrections for July 12, 2016