Chinaunix首页 | 论坛 | 博客
  • 博客访问: 174303
  • 博文数量: 200
  • 博客积分: 10
  • 博客等级: 民兵
  • 技术积分: 1285
  • 用 户 组: 普通用户
  • 注册时间: 2012-07-03 19:45
文章分类

全部博文(200)

文章存档

2012年(200)

我的朋友

分类:

2012-07-04 13:13:16

近日,公司发布三项新专项方向认证:安全(Security)、语音(Voice)和无线(Wireless)。若想获得专项方向的认证,除了要通过标准考试外,考生还需要通过一门专项附加的考试。安全考试(640-553) 和语音考试(640-460)目前已经在Pearson VUE考试中心生效,面对全世界所有考生开放,考试费用为250美元,和标准考试费用相同。而无线考试(640-721) 将会在7月26日开始实施。

教育产品开发部门高级经理斯汀.吉田(Christine Yoshida)表示,这三项考试是思科经过调查全球1500位人力资源部经理后决定推出的。吉田同时表示,调查结果显示众多雇主特别是在那些经济快速发展的国家,现在正在寻找在安全、语音、无线领域中走在前列的网络人才,并且,这些雇主都认为这些都是最紧俏的专业。

   “我们经过调查确实证实了这些专业的巨大需求”,据吉田介绍,这些专项考试在思科认证不断改进的考试改革中充当了很重要的角色。举例来说,一旦安全思科网络设备(SCND)在今年11月停考,安全专项认证将成为公司中级思科认证资深安全工程师(CCSP)的前提考试科目。同样的,语音专项认证将于2009年6月成为思科认证资深语音工程师(CCVP)认证所必须的先决条件。

   尽管思科目前还没有关于无线的资深认证,但吉田补充到,如果哪家公司创建了这个部门,那么的无线认证将会成为一个很好的敲门砖。

(上述红字来源于互联网)本文将放出安全及语音的部分考试题(由流出),及官方大纲.方便业内有认证需要的朋友查阅.由于版面限制,兜兜仅在文中放出大纲,如果需要参看试题的话,请在大纲后通过下载链接下载PDF格式的文档.文档系临时转存,可能会被删档.需要的话,请速度!

一.640-553 Q&A(安全)

Security meets the needs of IT professionals who are responsible for network security. It confirms an individual’s skills for job roles such as Network Security Specialists, Security Administrators, and Network Security Support Engineers. This validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that uses in its security structure.

Students completing the recommended training will gain an introduction to core security technologies as well as how to develop security policies and mitigate risks. IT organizations that employ Security-holders will have IT staff that can develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.

The following are some basic information about the examination:

IINS

Implementing IOS Network Security

Exam Number:

Associated Certifications:CCNA Security

Duration:90 minutes (55-65 questions)

Available Languages:English

Click Here to Register:

Exam Policies:Read current policies and requirements

Exam Tutorial:

Exam Description

The IINS Implementing IOS Network Security exam is associated with the Security . This exam tests a candidate’s knowledge of securing routers and switches and their associated networks. It leads to validated skills for installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that uses in its security infrastructure.
Candidates can prepare for this exam by taking the Implementing IOS Network Security (IINS)course.

Exam Topics

The following topics are general guidelines for the content likely to be included on the Implementing IOS Network Security exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe the security threats facing modern network infrastructures

  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Self Defending Network architecture

Secure routers

  • Secure routers using the SDM Security Audit feature
  • Use the One-Step Lockdown feature in SDM to secure a router
  • Secure administrative access to routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements
  • Secure administrative access to routers by configuring multiple privilege levels
  • Secure administrative access to routers by configuring role based CLI
  • Secure the IOS image and configuration file

Implement AAA on routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting

Mitigate threats to routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on routers to enable secured management access
  • Use CLI and SDM to configure routers to send Syslog messages to a Syslog server

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone Based Firewall using SDM

Implement the IOS IPS feature set using SDM

  • Define network based vs. host based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify IOS IPS operations using SDM

Implement site-to-site VPNs on Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

The following are part of Q&A from . You can go to and consult live-support for more information if you are interested in its products. Now let’s look at the following study-guides offered by .

(完整版本的640-553PDF文档—包含试题)

二.640-460 Q&A(语音)

The ® Voice confirms that you have the required skill set for specialized job roles in voice technologies such as voice technologies administrator, voice engineer, and voice manager. It validates skills in VoIP technologies such as IP PBX, IP telephony, handset, call control, and voicemail solutions. Candidates also get exposure to the Unified Communications architecture and design covering mobility, presence, and TelePresence applications.

The Voice enables employers to validate that their staff possess a strong foundation in voice applications and infrastructure concepts; and are capable of performing baseline installation, operating, and maintenance tasks on VoIP solutions, particularly the Smart Business Communications System from 8-250 lines.

The following are some basic information about the examination:

IIUC

Implementing IOS Unified Communications

Exam Number:

Associated Certifications:

Duration:90 minutes (60-70 questions)

Available Languages:English

Click Here to Register:

Exam Policies:Read current policies and requirements

Exam Tutorial:

Exam Description

The IIUC Implementing IOS Unified Communications exam is associated with the Voice . This exam confirms basic IP telephony installation, configuration, and maintenance skills by testing a candidate’s knowledge of implementing and configuring small- to medium sized IP Telephony solutions using Unified Communications Manager Express, Unity Express, and the UC500 Smart Business Communications System solutions.

Exam Topics

The following topics are general guidelines for the content likely to be included on the Implementing IOS Unified Communications exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe the components of the Unified Communications Architecture

  • Describe the function of the infrastructure in a UC environment
  • Describe the function of endpoints in a UC environment
  • Describe the function of the call processing agent in a UC environment
  • Describe the function of messaging in a UC environment
  • Describe the function of auto attendants and IVRs in a UC environment
  • Describe the function of contact center in a UC environment
  • Describe the applications available in the UC environment, including Mobility, Presence, and Telepresence
  • Describe how the Unified Communications components work together to create the Unified Communications Architecture

Describe PSTN components and technologies

  • Describe the services provided by the PSTN
  • Describe time division and statistical multiplexing
  • Describe supervisory, informational, and address signalling
  • Describe numbering plans
  • Describe analog circuits
  • Describe digital voice circuits
  • Describe PBX, trunk lines, key-systems, and tie lines

Describe VoIP components and technologies

  • Describe the process of voice packetization
  • Describe RTP and RTCP
  • Describe the function of and differences between codecs
  • Describe H.323, MGCP, SIP, and SCCP signalling protocols

Describe and configure gateways, voice ports, and dial peers to connect to the PSTN and service provider networks

  • Describe the function and application of a dial plan
  • Describe the function and application of voice Gateways
  • Describe the function and application of voice ports in a Gateway
  • Describe the function and operation of call-legs
  • Describe and configure voice dial peers
  • Describe the differences between PSTN and Internet Telephony Service Provider circuits

Describe and configure a network to support VoIP

  • Describe the purpose of VLANs in a VoIP environment
  • Describe the environmental considerations to support VoIP
  • Configure switched infrastructure to support voice and data VLANs
  • Describe the purpose and operation of PoE
  • Identify the factors that impact voice quality
  • Describe how QoS addresses voice quality issues
  • Identify where QoS is deployed in the UC infrastructure

Implement UC500 using Configuration Assistant

  • Describe the function and operation of Configuration Assistant
  • Configure UC500 device parameters
  • Configure UC500 network parameters
  • Configure UC500 dial plan and voicemail parameters
  • Configure UC500 SIP trunk parameters
  • Configure UC500 voice system features
  • Configure UC500 user parameters

Implement Unified Communications Manager Express to support endpoints using CLI

  • Describe the appropriate software components needed to support endpoints
  • Describe the requirements and correct settings for DHCP, NTP, and TFTP
  • Configure DHCP, NTP and TFTP
  • Describe the differences between key system and PBX mode
  • Describe the differences between the different types of ephones and ephone-dns
  • Configure Unified Communications Manager Express endpoints
  • Configure call-transfer per design specifications
  • Configure voice productivity features, including hunt groups, call park, call pickup, paging groups, and paging/intercom
  • Configure Music on Hold

Implement voicemail features using Unity Express

  • Describe the Unity Express hardware platforms
  • Configure the foundational elements required for Unified Communications Manager Express to support Unity Express
  • Describe the features available in Unity Express
  • Configure AutoAttendant services using Unity Express
  • Configure basic voicemail features using Unity Express

The following are part of Q&A from . You can go to and consult live-support for more information if you are interested in its products. Now let’s look at the following study-guides offered by .

(完整版本的640-460PDF文档—包含试题)

阅读(368) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~