设为首页收藏本站language 语言切换
查看: 6516|回复: 50
收起左侧

[其他] CCNP ENCOR(350-401)考试大纲(必考科目)

[复制链接]
 成长值: 64420
发表于 2020-2-27 09:36:02 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2020-2-27 09:59 编辑
1 g3 f$ h0 d5 b) O# t4 X' H! y% l" @4 B" L: H# @
350-401 ENCOR Exam: Implementing Cisco Enterprise Network Core Technologies
- x# M; \4 z& `Exam Description3 `) f8 Y2 A4 F

- s$ R( O4 z- k' {3 YThe Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401) exam is a 120-minute exam associated with the CCNP Enterprise, CCIE Enterprise Infrastructure, CCIE Enterprise Wireless, and Cisco Certified Specialist – Enterprise Core certifications. This exam tests a candidate's knowledge of implementing core enterprise network technologies including dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. The course, Implementing Cisco Enterprise Network Core Technologies, helps candidates to prepare for this exam.
4 y( ~; L4 G' P% C7 B$ _3 P3 t/ r( i
5 q9 O+ F* m7 H, O" IThe following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
1 i& F- a8 e4 \7 S
4 f7 v3 C& `% t) I
1 j9 v) l# q  x+ J& r, E7 |. k! F) s
第一部分  architecture   15%- O" \4 j9 o, E1 M/ y+ I, ^
1.1 Explain the different design principles used in an enterprise network
8 w* W' Z9 D/ ~6 z4 x1 x1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
: I. N/ ~  x! P% x: y1.1.b High availability techniques such as redundancy, FHRP, and SSO" f5 Q- S4 q4 c. e
1.2 Analyze design principles of a WLAN deployment
1 v0 I: h( Y+ ^3 F9 K1.2.a Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)- I- g/ u) Z+ K% F
1.2.b Location services in a WLAN design0 z! o! p* M& }
1.3 Differentiate between on-premises and cloud infrastructure deployments
+ U; T; P- a% x. w6 R1.4 Explain the working principles of the Cisco SD-WAN solution6 {( A) Z& X$ y8 l+ H
1.4.a SD-WAN control and data planes elements
. q7 d6 Q" c# d2 x8 L; g1.4.b Traditional WAN and SD-WAN solutions$ X# U, ?; g% q
1.5 Explain the working principles of the Cisco SD-Access solution
6 |* d# `% b3 f+ n3 Z1.5.a SD-Access control and data planes elements7 M' S: L! z. X% }5 b) j( z! J- Q; [
1.5.b Traditional campus interoperating with SD-Access. m$ p/ M3 v5 w. h8 Q# n3 D" ^
1.6 Describe concepts of wired and wireless QoS
9 ?3 i4 w. N( @  @8 n! @2 P1.6.a QoS components
; h9 j; d4 D6 A) N1.6.b QoS policy# [3 p0 h! M2 y* C6 [0 f5 y
1.7 Differentiate hardware and software switching mechanisms( Y8 b* A0 d  [' q
1.7.a Process and CEF
) h3 ]5 ~3 u' w4 G0 r0 L& O0 V1.7.b MAC address table and TCAM$ g% O2 {: N! k2 x' I, R
1.7.c FIB vs. RIB
3 M- M/ m( P, Z& j6 ?
, R: i/ r, t. N+ G第二部分 virtualization   10%
; k) ]3 I* b, S+ _1 I2.1 Describe device virtualization technologies( M% e) X, e  c# N
2.1.a Hypervisor type 1 and 2
# y. y/ q( `1 x# j5 Y2.1.b Virtual machine
3 Y+ W$ o; O4 b" @- w3 `2.1.c Virtual switching0 Y# z: U( ^& j* T6 J4 }+ f0 R
2.2 Configure and verify data path virtualization technologies* x1 n$ V9 q, S0 _4 Q
2.2.a VRF- A4 Z* O0 M, ^8 i" D0 P7 |  K
2.2.b GRE and IPsec tunneling3 u; V( z, ]# s* X( u) a8 E! [  I
2.3 Describe network virtualization concepts
; N0 n$ h7 d- M7 z1 T* c2.3.a LISP
) B( ]- _$ u( B* ~* u2.3.b VXLAN# c5 n  T* p+ W5 r2 U9 k& e

0 D% O& u3 O. x2 T5 M& c3 t第三部分 infrastructure  30%: N+ R: o  G6 H* T! Y9 p
3.1 Layer 2" ~2 J7 N! A; b5 {" \
3.1.a Troubleshoot static and dynamic 802.1q trunking protocols7 ]& R' {( [/ S$ P6 f
3.1.b Troubleshoot static and dynamic EtherChannels
1 X) c' W, q- m4 U9 i  [. d/ C3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
6 ?8 l3 Q* }+ m3.2 Layer 3# N' S/ C4 D1 \) C
3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)2 T+ Y) V6 B& G% ]! b
3.2.b Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface): B0 n. d( n* l, @- E6 [, i
3.2.c Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
7 m& e1 U& M1 E# ^1 \3.3 Wireless) H) u+ C4 N7 i  {4 O8 M' q) z' v
3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities% E' E! u  E1 z: b; P$ Q
3.3.b Describe AP modes and antenna types
6 z" s+ I! F  u. u2 O: a" o. Y3.3.c Describe access point discovery and join process (discovery algorithms, WLC selection process); Y/ K' z7 Y& i- c- Z  H" e' B& E% `. A
3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming1 a4 }8 h3 }& t9 c. o
3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues6 `2 _; m5 ]% h
3.4 IP Services
9 k2 B% J4 a+ _8 ~+ H+ {3.4.a Describe Network Time Protocol (NTP)
& N. i5 Q* @# {% G' P, Y: e% U5 T3.4.b Configure and verify NAT/PAT
  ]0 R4 T3 O- \7 \6 \* ~; Y3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP5 W0 k9 r2 w% w2 a- U) @" R7 w
3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3, F- X1 |  J; }  D
' i8 Q0 K; E* h0 Y
第四部分  network assurance   10%
% r: r1 l6 J  a! m+ R" u4 `4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
/ {- [. j* s3 r7 l' s4.2 Configure and verify device monitoring using syslog for remote logging9 R3 g5 Q4 j) S' b
4.3 Configure and verify NetFlow and Flexible NetFlow, [& u: d" Y# [  |
4.4 Configure and verify SPAN/RSPAN/ERSPAN  w7 [, I. W8 B0 [; p
4.5 Configure and verify IPSLA
# [+ }6 u0 E# z4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
/ c/ J) O, x5 ^& ?1 Y# B1 i: `4.7 Configure and verify NETCONF and RESTCONF! T  t% @3 H( p  l; J0 j& S

4 d$ ]$ Y1 i4 a2 ^  l4 v第五部分 security   20%! A9 F4 \0 N5 s. g) K5 J8 L) g
5.1 Configure and verify device access control0 D8 \9 E) }9 u. R9 V
5.1.a Lines and password protection
- A+ _& Z# F5 u7 ?4 Q4 p( Y5.1.b Authentication and authorization using AAA. x  u) I! d9 a9 S2 Z% k
5.2 Configure and verify infrastructure security features9 U7 s2 c# R# q
5.2.a ACLs
2 Q) B$ b! b. L1 e2 F5.2.b CoPP
. N) _+ f) B4 e" J3 s5.3 Describe REST API security
2 b. ~2 Y% z9 F, L2 |) ~; W3 [5.4 Configure and verify wireless security features0 \$ ^# z% ~  B
5.4.a EAP9 P2 l6 R+ T3 r
5.4.b WebAuth
, @) U4 ^4 f) M! Z7 `+ ^5.4.c PSK
" q' b) b# K+ }" o  ~7 }5.5 Describe the components of network security design
! c, q; B: z" W- E5.5.a Threat defense
' \3 U* _, g3 b2 H4 q5 @# K) ]9 k5.5.b Endpoint security% R0 `0 U6 N% C! Q8 `
5.5.c Next-generation firewall
4 [7 V) ], ?2 t0 v: C: \5.5.d TrustSec, MACsec
" y7 D- `; q7 f% a6 S! w5.5.e Network access control with 802.1X, MAB, and WebAuth
5 C( X' v, w0 {! `5 J
+ K8 V* n- P! v8 f; r# s第六部分  automation   15%7 u% w0 M4 p" V
6.1 Interpret basic Python components and scripts3 S8 x* {- G! F- P- B
6.2 Construct valid JSON encoded file
/ P6 R6 F8 C  v" ^) E; F1 l6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG! m; s$ I: B6 H1 f. K1 s6 E6 _8 ~
6.4 Describe APIs for Cisco DNA Center and vManage
& k, k- x4 I; ^8 s& O7 _6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF) ^, R  k: v0 \
6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection
! `2 q0 d$ [! f: g2 k( b. v6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack/ u2 z; U  V. ]+ J

5 r0 k+ e) O3 |: y3 E# j1 B
; `# Q7 x2 V! [* W# ]  Q5 B
发表于 2020-2-27 10:23:44 来自手机 | 显示全部楼层
感謝喬大大,看來新課程仍有重上的必要……
沙发 2020-2-27 10:23:44 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-27 11:24:59 | 显示全部楼层
谢谢,不知道什么时候出题库啊
板凳 2020-2-27 11:24:59 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-28 10:16:08 | 显示全部楼层
谢谢分享啊
6# 2020-2-28 10:16:08 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-28 10:22:35 | 显示全部楼层
感謝喬大大, 快速更新
7# 2020-2-28 10:22:35 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-29 09:57:08 | 显示全部楼层
好东西谢谢楼主分享
9# 2020-2-29 09:57:08 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-1 09:48:57 | 显示全部楼层
英文 完全看不懂
1 ?7 @. `' R: t0 ?' e9 k" g
10# 2020-3-1 09:48:57 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-1 12:52:48 | 显示全部楼层
请问相关的参考指南出来吗?
12# 2020-3-1 12:52:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-1 20:29:51 | 显示全部楼层
CNP ENCOR(350-401)考试大纲(必考科目)
13# 2020-3-1 20:29:51 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-2 21:30:47 | 显示全部楼层
Useful, thank you for sharing
14# 2020-3-2 21:30:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-3 07:52:59 | 显示全部楼层
ycylovelsc 发表于 2020-2-27 11:240 \) g9 E* O# E2 h/ c
谢谢,不知道什么时候出题库啊
& U, w! c) r# k7 `# H+ a) {2 _, Z
同等好消息。
15# 2020-3-3 07:52:59 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-11 05:41 , Processed in 0.097723 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表