More Cisco CCNA Certification Study Tips and Aids

Home > Blogs > Cisco > More Cisco CCNA Certification Study Tips and Aids

More Cisco CCNA Certification Study Tips and Aids

Like This Blog 0 Mark Jacob
Added by October 10, 2012

As you may know if you read my blogs or have been in my classes, I am a big believer in memory aids, or mnemonics. I have a previous blog; Cisco certification exam memory aids – My favorite mnemonics which lists a few of them, but the list is always growing.

One of the things I want to do today is to revisit the EIGRP blog; Cisco’s EIGRP metric – fact and not so fact where I discussed k-values. Perhaps you are looking for a good way to remember which K-value is assigned to which property of the metric. Here is my way: BLDRs is the acronym. Run this sentence through your mind: K-values are builders (BLDRs) of routing tables. K-1 is Bandwidth, k-2 is Load, k-3 is Delay, and k-4 and k-5 are both Reliability (which is why the ‘R’ is plural!). Thus, BLDRs will help you remember these values! \

Another one goes back to CCNA material. If you recall configuring port security on your switch, you may also recall that you have a choice when you assign a violation mode; that is, deciding what you want the port to do if a violation occurs. The three options are shutdown (the default), restrict, and protect. Shutdown is pretty clear – it shuts down the port, and you as the network admin must access the switch and shut/no shut the port to bring it back live again. The other two may challenge you memory, because while they are very similar, there is a difference. Both of the options will cause the port to block frames if a violation occurs, but one of them will increment the violation count, and one will not. Do you know which one is which? The restrict option is the one that increments the violation count and protect does not. How to remember this? I use the vowels in the words to help me keep this in mind. So for restrict, the vowel ‘i’ makes me think of the word ‘increment.’ It also looks like the number 1, so that is how much the violation count is incremented. The ‘o’ in protect looks like a zero, so the violation count is NOT incremented. Maybe this will help you as it does me. Sometimes the silliest things will jog your memory.

The next thing I want to discuss is a study guide I created for improving your subnetting skills. Of course, you can’t use it on the exam, but it is a great aid to have next to you on the desk while you are running through subnetting problem after subnetting problem. Here it is:

Subnetting Cisco CCNA Certification Study Tips and Aids

So if you are working a Class A subnetting problem, once you have determined the number of bits to borrow, you can find that number in the top row and see several other valuable pieces of information right in that column. For example, if you are subnetting 10.0.0.0 /8 and you determine that you need to borrow 13 bits, just find 13 in the top row. Below that you see that this scheme will create 8192 subnetworks and each subnet will have 2046 hosts per subnet. You also see that your subnets will be incrementing by 8. Lastly, you also obtain the CIDR notation for the subnets you have created, which in our example is /21.

I hope these suggestions make a difference for a future CCNA candidate as well as maybe even make someone’s job a little easier.

Go get that CCNA!

Until next time…

Mark Jacob
Cisco Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Agile Methodology in Project Management

0 153 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

JavaScript for C# Developers – September 24, 2014

0 487 3

Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 602 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.