|
Cisco Certified Support Technician (CCST) Networking Exam
Exam Description
To earn your CCST Networking certification, you must pass the exam. This
50-minute exam tests your knowledge of:
Cisco Certified Support Technician
Networking
The successful candidate has the foundational knowledge and skills necessary to
demonstrate how networks operate, including the devices, media, and protocols
that enable network communication. This
test will be an entry point into the Cisco certification program. The next
certification in the pathway is CCNA.
This is a certification for entry-level network technicians, networking
students, interns, etc. The exam targets secondary and immediate post-secondary
students, and entry-level IT and Networking
professionals. The successful candidates are qualified entry-level network
technicians and customer support technicians, students, and interns with at
least 150 hours of instruction and hands-on experience.
Objectives
1. Standards and Concepts
1.1. Identify the fundamental conceptual building blocks of networks.
• TCP/IP model, OSI model, frames and packets, addressing
1.2. Differentiate between bandwidth and throughput.
• Latency, delay, speed test vs. Iperf
1.3. Differentiate between LAN, WAN, MAN, CAN, PAN, and WLAN.
• Identify and illustrate common physical and logical network topologies.
1.4. Compare and contrast cloud and on-premises applications and services.
• Public, private, hybrid, SaaS, PaaS, IaaS, remote work/hybrid work
1.5. Describe common network applications and protocols.
• TCP vs. UDP (connection-oriented vs. connectionless), FTP, SFTP, TFTP, HTTP,
HTTPS,
DHCP, DNS, ICMP, NTP
2. Addressing and Subnet Formats
2.1. Compare and contrast private addresses and public addresses.
• Address classes, NAT concepts
2.2. Identify IPv4 addresses and subnet formats.
• Subnet concepts, Subnet Calculator, slash notation, and subnet mask; broadcast
domain
2.3. Identify IPv6 addresses and prefix formats.
• Types of addresses, prefix concepts
3. Endpoints and Media Types
3.1. Identify cables and connectors commonly used in local area networks.
• Cable types: fiber, copper, twisted pair; Connector types: coax, RJ-45, RJ-11,
fiber connector types
3.2. Differentiate between Wi-Fi, cellular, and wired network technologies.
• Copper, including sources of interference; fiber; wireless, including 802.11
(unlicensed,
2.4GHz, 5GHz, 6GHz), cellular (licensed), sources of interference
3.3. Describe endpoint devices.
• Internet of Things (IoT) devices, computers, mobile devices, IP Phone,
printer, server
3.4. Demonstrate how to set up and check network connectivity on Windows, Linux,
Mac OS, Android, and Apple iOS.
• Networking utilities on Windows, Linux, Android, and Apple operating systems;
how to run troubleshooting commands; wireless client settings (SSID,
authentication, WPA mode)
4. Infrastructure
4.1. Identify the status lights on a Cisco device when given instruction by an
engineer.
• Link light color and status (blinking or solid)
4.2. Use a network diagram provided by an engineer to attach the appropriate
cables.
• Patch cables, switches and routers, small topologies, power, rack layout
4.3. Identify the various ports on network devices.
• Console port, serial port, fiber port, Ethernet ports, SFPs, USB port, PoE
4.4. Explain basic routing concepts.
• Default gateway, layer 2 vs. layer 3 switches, local network vs. remote
network
4.5. Explain basic switching concepts.
• MAC address tables, MAC address filtering, VLAN
5. Diagnosing Problems
5.1. Demonstrate effective troubleshooting methodologies and help desk best
practices, including ticketing, documentation, and information gathering.
• Policies and procedures, accurate and complete documentation, prioritization
5.2. Perform a packet capture with Wireshark and save it to a file.
• Purpose of using a packet analyzer, saving and opening a .pcap file
5.3. Run basic diagnostic commands and interpret the results.
• ping, ipconfig/ifconfig/ip, tracert/traceroute, nslookup; recognize how
firewalls can influence the result
5.4. Differentiate between different ways to access and collect data about
network devices.
• Remote access (RDP, SSH, telnet), VPN, terminal emulators, Console, Network
Management Systems, cloud-managed network (Meraki), scripts
5.5. Run basic show commands on a Cisco network device.
• show run, show cdp neighbors, show ip interface brief, show ip route, show
version, show inventory, show switch, show mac address-table, show interface,
show interface x, show interface status; privilege levels; command help and
auto-complete
6. Security
6.1. Describe how firewalls operate to filter traffic.
• Firewalls (blocked ports and protocols); rules deny or permit access
6.2. Describe foundational security concepts.
• Confidentiality, integrity, and availability (CIA); authentication,
authorization, and accounting (AAA); Multifactor Authentication (MFA);
encryption, certificates, and password complexity; identity stores/databases
(Active Directory); threats and
vulnerabilities; spam, phishing, malware, and denial of service
6.3. Configure basic wireless security on a home router (WPAx).
• WPA, WPA2, WPA3; choosing between Personal and Enterprise; wireless security concepts
CCST-Networking Brain Dumps Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Now
Sample Question:
QUESTION 1
What is the most compressed valid format of the IPv6 address 2001
:0db8:0000:0016:0000:001b:2000:0056?
A. 2001:db8: : 16: : 1b:2:56
B. 2001:db8: : 16: : 1b: 2000: 56
C. 2001:db8: 16: :1b:2:56
D. 2001:db8: 0:16: :1b: 2000:56
Answer: D
Explanation:
IPv6 addresses can be compressed by removing leading zeros and replacing
consecutive groups of
zeros with a double colon (::). Heres how to compress the address
2001:0db8:0000:0016:0000:001b:2000:0056:
Remove leading zeros from each segment:
2001:db8:0000:0016:0000:001b:2000:0056 becomes 2001:db8:0:16:0:1b:2000:56
Replace the longest sequence of consecutive zeros with a double colon (::). In
this case, the two
consecutive zeros between the 16 and 1b:
2001:db8:0:16::1b:2000:56
Thus, the most compressed valid format of the IPv6 address is
2001:db8:0:16::1b:2000:56.
Reference :=
Cisco Learning Network
IPv6 Addressing (Cisco)
QUESTION 2
HOTSPOT
For each statement about bandwidth and throughput, select True or False.
Note: You will receive partial credit for each correct selection.
Answer:
Explanation:
Statement 1: Low bandwidth can increase network latency.
True: Low bandwidth can result in increased network latency because the network
may become
congested, leading to delays in data transmission.
Statement 2: High levels of network latency decrease network bandwidth.
False: High levels of network latency do not decrease the available network
bandwidth, but they do
affect the perceived performance and throughput of the network.
Statement 3: You can increase throughput by decreasing network latency.
True: Decreasing network latency can increase throughput because data can be
transmitted more
quickly and efficiently without delays.
Bandwidth vs. Latency: Bandwidth refers to the maximum rate at which data can be
transferred over
a network path. Latency is the time it takes for a data packet to travel from
the source to the
destination.
Low bandwidth can cause network congestion, which can increase latency as
packets wait to be transmitted.
High latency does not reduce the actual bandwidth but can affect the overall
performance and efficiency of data transmission.
Reducing latency can lead to higher throughput because the network can handle
more data in a given period without delays.
Reference:
Network Performance Metrics: Cisco Network Performance
Understanding Bandwidth and Latency: Bandwidth vs. Latency
QUESTION 3
DRAG DROP
Move each protocol from the list on the left to its correct example on the
right.
Answer:
Explanation:
The correct matching of the protocols to their examples is as follows:
DHCP: Assign the reserved IP address 10.10.10.200 to a web server at your
company.
DNS: Perform a query to translate companypro.net to an IP address.
ICMP: Perform a ping to ensure that a server is responding to network
connections.
Heres how each protocol corresponds to its example:
DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses to
devices on a network.
In this case, DHCP would be used to assign the reserved IP address 10.10.10.200
to a web server.
DNS (Domain Name System) is used to translate domain names into IP addresses.
Therefore, to
translate companypro.net to an IP address, DNS would be utilized.
ICMP (Internet Control Message Protocol) is used for sending error messages and
operational
information indicating success or failure when communicating with another IP
address. An example
of this is using the ping command to check if a server is responding to network
connections.
These protocols are essential for the smooth operation of networks and the
internet.
Perform a query to translate companypro.net to an IP address.
DNS (Domain Name System): DNS is used to resolve domain names to IP addresses.
Assign the reserved IP address 10.10.10.200 to a web server at your company.
DHCP (Dynamic Host Configuration Protocol): DHCP is used to assign IP addresses
to devices on a
network.
Perform a ping to ensure that a server is responding to network connections.
ICMP (Internet Control Message Protocol): ICMP is used by network devices to
send error messages
and operational information, and it is the protocol used by the ping command.
DNS (Domain Name System): DNS translates human-friendly domain names like "companypro.net"
into IP addresses that computers use to identify each other on the network.
DHCP (Dynamic Host Configuration Protocol): DHCP automatically assigns IP
addresses to devices on
a network, ensuring that no two devices have the same IP address.
ICMP (Internet Control Message Protocol): ICMP is used for diagnostic or control
purposes, and the
ping command uses ICMP to test the reachability of a host on an IP network.
Reference:
DNS Basics: What is DNS?
DHCP Overview: What is DHCP?
ICMP and Ping: Understanding ICMP
QUESTION 4
Which protocol allows you to securely upload files to another computer on the
internet?
A. SFTP
B. ICMP
C. NTP
D. HTTP
Answer: A
Explanation:
SFTP, or Secure File Transfer Protocol, is a protocol that allows for secure
file transfer capabilities
between networked hosts. It is a secure extension of the File Transfer Protocol
(FTP). SFTP encrypts
both commands and data, preventing passwords and sensitive information from
being transmitted
openly over the network. It is typically used for secure file transfers over the
internet and is built on
the Secure Shell (SSH) protocol1.
Reference :=
What Is SFTP? (Secure File Transfer Protocol)
How to Use SFTP to Safely Transfer Files: A Step-by-Step Guide
Secure File Transfers: Best Practices, Protocols And Tools
The Secure File Transfer Protocol (SFTP) is a secure version of the File
Transfer Protocol (FTP) that
uses SSH (Secure Shell) to encrypt all commands and data. This ensures that
sensitive information,
such as usernames, passwords, and files being transferred, are securely
transmitted over the
network.
ICMP (Internet Control Message Protocol) is used for network diagnostics and is
not
designed for file transfer.
NTP (Network Time Protocol) is used to synchronize clocks between computer
systems and is
not related to file transfer.
HTTP (HyperText Transfer Protocol) is used for transmitting web pages over the
internet and
does not inherently provide secure file transfer capabilities.
Thus, the correct protocol that allows secure uploading of files to another
computer on the internet
is SFTP.
Reference :=
Cisco Learning Network
SFTP Overview (Cisco)
QUESTION 5
A local company requires two networks in two new buildings. The addresses used
in these networks
must be in the private network range.
Which two address ranges should the company use? (Choose 2.)
Note: You will receive partial credit for each correct selection.
A. 172.16.0.0 to 172.31.255.255
B. 192.16.0.0 to 192.16.255.255
C. 11.0.0.0 to 11.255.255.255
D. 192.168.0.0 to 192.168.255.255
Answer: AD
Explanation:
The private IP address ranges that are set aside specifically for use within
private networks and not
routable on the internet are as follows:
Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255
These ranges are defined by the Internet Assigned Numbers Authority (IANA) and
are used for local
communications within a private network123.
Given the options:
A. 172.16.0.0 to 172.31.255.255 falls within the Class B private range. B.
192.16.0.0 to 192.16.255.255 is not a recognized private IP range. C. 11.0.0.0
to 11.255.255.255 is
not a recognized private IP range. D. 192.168.0.0 to 192.168.255.255 falls
within the Class C private
range.
Therefore, the correct selections that the company should use for their private
networks are A and D.
Reference :=
Reserved IP addresses on Wikipedia
Private IP Addresses in Networking - GeeksforGeeks
Understanding Private IP Ranges, Uses, Benefits, and Warnings
Students Feedback / Reviews/ Discussion
Bandile Ndlela Voted 2 weeks ago
Hello, with the new version released at 20th september, if this update all
questions?
upvoted 32 times
AGUIDI MAHAMAT Highly 4 months ago - Chad
95% of the questions are valid. Review the answers. Review discussions of why
some answers are inaccurate. This will provide better study and understanding of
content.
upvoted 32 times
Mahendrie Dwarika Most Recent 1 week - South Africa
More than 90% of the question on the exam were from here. Thxs Exam Topics
upvoted 5 times
valisetti ravishankar 3 weeks, 2 days ago - USA
Thank you so much for providing excellent study material. I prepared for my
350-501 exam and aced the exam with 950 marks
upvoted 7 times
Dos Santos Daniel 1 month, 1 week ago - Brazil
Passed My Exam on 19th , 91 multiple choice question , 5 new question and 86
question in here.
upvoted 23 times