OSI |
- Explain, compare, and contrast the OSI layers
- Describe the function of each OSI layer
- Differentiate between the OSI layers
- Describe the purpose of the various address types at different OSI layers
- Explain protocols and technologies specific to the data link layer
- Explain the purpose of a switch’s forwarding database
- Explain the purpose and functionality of ARP
- Explain the purpose and functionality of MAC addresses
- Explain the purpose and functionality of a broadcast domain
- Explain the purpose and functionality of VLANs
- Explain the purpose and functionality of link aggregation
- Explain protocols and apply technologies specific to the network layer
- Explain the purpose and functionality of IP addressing and subnetting
- Given an IP address and net mask, determine the network IP and the broadcast IP
- Given a routing table and a destination IP address, identify which routing table entry the destination IP address will match
- Explain the purpose and functionality of Routing protocols
- Explain the purpose of fragmentation
- Given a fragment, identify what information is needed for reassembly
- Explain the purpose of TTL functionality
- Given a packet traversing a topology, document the source/destination IP address/MAC address changes at
each hop
- Explain the features and functionality of protocols and technologies specific to the transport layer
- Compare/Contrast purpose and functionality of MTU and MSS
- Explain the purpose and functionality of TCP
- Explain the purpose and functionality of UDP
- Explain the purpose and functionality of ports in general
- Explain how retransmissions occur
- Explain the purpose and process of a reset
- Describe various TCP options
- Describe a TCP checksum error
- Describe how TCP addresses error correction
- Describe how the flow control process occurs
- Explain the features and functionality of protocols and technologies specific to the application layer
- Explain the purpose and functionality of HTTP
- Differentiate between HTTP versions
- Interpret HTTP status codes
- Determine an HTTP request method for a given use case
- Explain the purpose and functionality of HTTP keepalives, HTTP headers, DNS, SIP, FTP
- Differentiate between passive and active FTP
- Explain the purpose and functionality of SMTP
- Explain the purpose and functionality of a cookie
- Given a situation in which a client connects to a remote host, explain how the name resolution process occurs
- Explain the purpose and functionality of a URL
|
F5 Solutions and Technology |
- Articulate the role of F5 products
- Explain the purpose, use, and benefits of APM, LTM, ASM, GTM
- Explain the purpose, use, and advantages of iRules
- Explain the purpose of iRules
- Explain the advantages of iRules
- Given a list of situations, determine which would be appropriate for the use of iRules
- Explain the purpose, use, and advantages of iApps
- Explain the purpose of iApps
- Explain the advantages of iApps
- Given a list of situations, determine which would be appropriate for the use of iApps
- Explain the purpose of and use cases for full proxy and packet forwarding/packet based architectures
- Describe a full proxy architecture
- Describe a packet forwarding/packet based architecture
- Given a list of situations, determine which is appropriate for a full proxy architecture
- Given a list of situations, determine which is appropriate for a packet based architecture
- Explain the advantages and configurations of high availability (HA)
- Explain active/active
- Explain active/standby
- Explain the benefits of deploying BIG-IP devices in a redundant configuration
|
Load Balancing Essentials |
- Discuss the purpose of, use cases for, and key considerations related to load
balancing
- Explain the purpose of distribution of load across multiple servers
- Given an environment, determine the appropriate load balancing algorithm that achieves a desired result
- Explain the concept of persistence
- Differentiate between a client and server
- Given a scenario, identify the client/server
- Explain the role of a client
- Explain the role of a server
|
Security |
- Compare and contrast positive and negative security models
- Describe the concept of a positive security model
- Describe the concept of a negative security model
- Given a list of scenarios, identify which is a positive security model
- Given a list of scenarios, identify which is a negative security model
- Describe the benefits of a positive security model
- Describe the benefits of a negative security model
- Explain the purpose of cryptographic services
- Describe the purpose of signing
- Describe the purpose of encryption
- Describe the purpose of certificates and the certificate chains
- Distinguish between private/public keys
- Compare and contrast symmetric/asymmetric encryption
- Describe the purpose and advantages of authentication
- Explain the purpose of authentication
- Explain the advantages of single sign on
- Explain the concepts of multifactor authentication
- Describe the role authentication plays in AAA
- Describe the purpose, advantages, and use cases of IPsec and SSL VPN
- Explain the purpose, advantages, and challenges associated with IPsec
- Explain the purpose, advantages, and challenges associated with SSL VPN
- Given a list of environments/situations, determine which is appropriate for an IPsec solution
- Given a list of environments/situations, determine which is appropriate for an SSL VPN solution
|
Application Delivery Platforms |
- Describe the purpose, advantages, use cases, and challenges associated with hardware based application delivery platforms and virtual machines
- Explain when a hardware based application deliver platform solution is appropriate
- Explain when a virtual machine solution is appropriate
- Explain the purpose, advantages, and challenges associated with hardware based application deliver platform
solutions
- Explain the purpose, advantages, and challenges associated with virtual machines
- Given a list of environments/situations, determine which is appropriate for a hardware based application
deliver platform solution
- Given a list of environments/situations, determine which is appropriate for a virtual machine solution
- Explain the advantages of dedicated hardware (SSL card, compression card)
- Describe the purpose of the various types of advanced acceleration techniques
- Describe the purpose of TCP optimization
- Describe the purpose of HTTP keepalives, caching, compression, and pipelining
|