2022 CCNAExam StudyTool
2022 CCNAExam StudyTool
The following topics are likely to be included on the 200-301 CCNA exam. The topics are subject to change
at any time to reflect the latest technologies aligned to Cisco’s products.
Cisco Cert Prep Tip: Print out this document and use it as you assess your strengths and
challenges in preparing your study plan.
Exam Topics:
Section: 1.0 Network Fundamentals
1.1 Explain the role and function of Need to Complete by: Resource: Completed
network components Study?
1.1.a Routers Y / N
1.1.f Endpoints Y / N
1.1.g Servers Y / N
1.2.a 2 tier Y / N
1.2.b 3 tier Y / N
1.2.c Spine-leaf Y / N
1.2.d WAN Y / N
1.2.a Two-tier Y / N
1.2.b Three-tier Y / N
1.2.c Spine-leaf Y / N
1.2.d WAN Y / N
1.3 Compare physical interface and Need to Complete by: Resource: Completed
cabling types Study?
1.4 Identify interface and cable issues Need to Complete by: Resource: Completed
(collisions, errors, mismatch duplex, Study?
and/or speed)
Y / N
Y / N
1.6 Configure and verify IPv4 addressing Need to Complete by: Resource: Completed
and subnetting Study?
Y / N
1.7 Describe the need for private IPv4 Need to Complete by: Resource: Completed
addressing Study?
Y / N
1.8 Configure and verify IPv6 addressing Need to Complete by: Resource: Completed
and prefix Study?
Y / N
1.9 Describe IPv6 address types Need to Complete by: Resource: Completed
Study?
1.9.b Anycast Y / N
1.9.c Multicast Y / N
1.10 Verify IP parameters for Client OS Need to Complete by: Resource: Completed
(Windows, Mac OS, Linux) Study?
Y / N
1.11.b SSID Y / N
1.11.c RF Y / N
1.11.d Encryption Y / N
Y / N
2.1 Configure and verify VLANs (normal Need to Complete by: Resource: Completed
range) spanning multiple switches Study?
2.1.c Connectivity Y / N
2.2 Configure and verify interswitch con- Need to Complete by: Resource: Completed
nectivity Study?
2.2.b 802.1Q Y / N
2.3 Configure and verify Layer 2 discovery Need to Complete by: Resource: Completed
protocols (Cisco Discovery Protocol Study?
and LLDP)
Y / N
2.4 Configure and verify (Layer 2/Layer 3) Need to Complete by: Resource: Completed
EtherChannel (LACP) Study?
Y / N
2.5.c PortFast Y / N
2.6 Describe Cisco Wireless Architectures Need to Complete by: Resource: Completed
and AP modes Study?
Y / N
Y / N
2.8 Describe AP and WLC management Need to Complete by: Resource: Completed
access connections (Telnet, SSH, Study?
HTTP, HTTPS, console, and TACACS+/
RADIUS)
Y / N
2.9 Interpret the wireless LAN GUI config- Need to Complete by: Resource: Completed
uration for client connectivity, such as Study?
WLAN creation, security settings, QoS
profiles, and advanced settings
Y / N
3.1 Interpret the components of routing Need to Complete by: Resource: Completed
table Study?
3.1.b Prefix Y / N
3.1.f Metric Y / N
3.2 Determine how a router makes a Need to Complete by: Resource: Completed
forwarding decision by default Study?
3.4 Configure and verify single area OSPFv2 Need to Complete by: Resource: Completed
Study?
3.4.b Point-to-point Y / N
3.4.d Router ID Y / N
3.5 Describe the purpose, functions, Need to Complete by: Resource: Completed
and concepts of first hop redundancy Study?
protocols
Y / N
4.1 Configure and verify inside source NAT Need to Complete by: Resource: Completed
using static and pools Study?
Y / N
4.2 Configure and verify NTP operating in a Need to Complete by: Resource: Completed
client and server mode Study?
Y / N
4.3 Explain the role of DHCP and DNS with- Need to Complete by: Resource: Completed
in the network Study?
Y / N
4.4 Explain the function of SNMP in network Need to Complete by: Resource: Completed
operations Study?
Y / N
4.5 Describe the use of syslog features Need to Complete by: Resource: Completed
including facilities and levels Study?
Y / N
4.6 Configure and verify DHCP client Need to Complete by: Resource: Completed
and relay Study?
Y / N
Y / N
4.8 Configure network devices for remote Need to Complete by: Resource: Completed
access using SSH Study?
Y / N
4.9 Describe the capabilities and function of Need to Complete by: Resource: Completed
TFTP/FTP in the network Study?
Y / N
5.1 Define key security concepts (threats, Need to Complete by: Resource: Completed
vulnerabilities, exploits, and mitigation Study?
techniques)
Y / N
5.2 Describe security program elements Need to Complete by: Resource: Completed
(user awareness, training, and physical Study?
access control)
Y / N
5.3 Configure and verify device access Need to Complete by: Resource: Completed
control using local passwords Study?
Y / N
Y / N
5.5 Describe IPsec remote access and site- Need to Complete by: Resource: Completed
to-site VPNs Study?
Y / N
5.6 Configure and verify access control lists Need to Complete by: Resource: Completed
Study?
Y / N
5.7 Configure and verify Layer 2 security Need to Complete by: Resource: Completed
features (DHCP snooping, dynamic ARP Study?
inspection, and port security
Y / N
Y / N
5.9 Describe wireless security protocols Need to Complete by: Resource: Completed
(WPA, WPA2, and WPA3) Study?
Y / N
5.10 Configure and verify WLAN within the Need to Complete by: Resource: Completed
GUI using WPA2 PSK Study?
Y / N
6.1 Explain how automation impacts Need to Complete by: Resource: Completed
network management Study?
Y / N
6.2 Compare traditional networks with con- Need to Complete by: Resource: Completed
troller-based networking Study?
Y / N
6.4 Compare traditional campus device Need to Complete by: Resource: Completed
management with Cisco DNA Center Study?
enabled device management
Y / N
Y / N
Y / N
Y / N