Home > Store

CCNA Exam Prep (Exam 640-802), 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

CCNA Exam Prep (Exam 640-802), 2nd Edition

Premium Website

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2008
  • Edition: 2nd
  • Premium Website
  • ISBN-10: 0-7897-3713-2
  • ISBN-13: 978-0-7897-3713-7

The CCNA Exam Prep, Second Edition,  is an in-depth training guide for the new CCNA (Cisco Certified Network Associate) certification from Cisco. Published in the popular Exam Prep series, the book incorporates all the topics tested in this newly-revised exam, including new security, VPN, wireless, IPv6, and troubleshooting coverage. The authors emphasize sub-netting concepts because this is historically a difficult roadblock for Cisco certification candidates. This Exam Prep covers all the exam objectives and will give you a thorough understanding of each testable concept in addition to real-world configuration examples for configuring a wide range of Cisco devices. The Prep begins with an objectives quick reference and includes chapter summaries with a list of key terms, exercises, review questions, and an exam on chapter content with detailed answers. Exam Preps include notes, tips, cautions, and exam alerts to help you focus on important issues. If you are preparing for this exam you will find the Exam Prep series to be the complete certification solution for the CCNA exam.

Sample Content

Online Sample Chapter

CCNA Exam Prep: Wireless Security and Implementation Considerations

Downloadable Sample Chapter

Download the chapter

Table of Contents

Introduction

CHAPTER 1:Standard Internetworking Models

Introduction

What Is an Internetwork?

Types of Internetworks

    Local Area Network (LAN)

    Metropolitan Area Network (MAN)

    Wide Area Network (WAN)

    Storage Area Network (SAN)

    Virtual Private Network (VPN)

Open Systems Interconnection (OSI) Model

    Upper Layers

    Application Layer

    Presentation Layer

    Session Layer

    Lower Layers

    Transport Layer

    Network Layer

    Data Link Layer

    Physical Layer

    OSI Layered Communications

TCP/IP Model

    Application Layer

    Transport Layer

    Internet Layer

    Network Interface Layer

Cisco 3-Layer Hierarchical Model

    Access Layer

    Distribution Layer

    Core Layer

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 2:Physical Layer Networking Concepts

Introduction

Network Topologies

    The Bus Topology

    The Ring Topology

    The Star Topology

    The Mesh Topology

Cabling

    Coaxial Cable

    Twisted-Pair Cable

    Fiber-Optic Cable

Wireless

    Wireless Fidelity (Wi-Fi)

    Infrared

    Bluetooth

Physical Layer Devices

    Repeaters

    Hubs

    Network Interfaces

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

Suggested Readings and Resources

CHAPTER 3:Data Link Networking Concepts

Introduction

Data Link Protocols

    Token Ring

    FDDI

    Ethernet at the Data Link Layer

Physical Ethernet Standards

    Ethernet

    Fast Ethernet

    Gigabit Ethernet

    10-Gigabit Ethernet (10GbE)

    Long Reach Ethernet

Data Link Layer Devices

    Bridges

    Switches

Duplex

Microsegmentation

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

Suggested Readings and Resources

CHAPTER 4: General Network Security

Introduction

Classes of Attack

    Access Attacks

    Reconnaissance Attacks

    Denial of Service (DoS) Attacks

Mitigating Network Threats

    AAA

    Cisco ACLs

    Cisco IOS Secure Management Features

    Encryption Protocols

    Security Appliances and Applications

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

Suggested Readings and Resources

CHAPTER 5:IP at the Network Layer

Introduction

Network Layer Functions

IP Addressing and Formats

    Binary

    Hexadecimal

    IP Address Classes

    Subnet Masks

    Private (RFC 1918) Addressing

Subnetting IP

    Calculating Hosts in a Subnet

    Calculating Networks in a Subnet

    The Increment

    Determining the Range of Valid IPs

IPv6

    IPv6 Communications

    IPv6 Address Format

    Types of IPv6 Addresses

    Autoconfiguration

    Integrating IPv4 and IPv6

    ICMPv6

Network Layer Devices

    Routers

    Layer 3 Switches

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 6: Introduction to Cisco Routers and Switches

Introduction

Interfaces and Modules

    LAN Interfaces

    WAN Interfaces

Cisco Memory Components

    ROM

    Flash

    RAM

    NVRAM

Cisco Internetworking Operating System

    Feature Sets

    IOS Image File Naming

Cisco Router Models and Features

Cisco Switch Models and Features

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 7: Foundation Cisco IOS Operations

Introduction

Terminal Options

    Console Port

    Auxiliary Port

    Telnet

    HTTP and HTTPS

    SSH

Router/Switch Startup Procedures

    POST

    Bootstrap

    IOS Loading

    Configuration Loading

Navigating the IOS

    User EXEC

    Privileged EXEC

    Global Configuration

    Context-Sensitive Help

    Abbreviations

    Shortcut Keys

    Common Syntax Errors

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 8: Foundation Cisco Configurations

Introduction

Global Configuration

    Altering the Boot Sequence

    Changing the Hostname

    Creating a Login Banner

    Assigning a Password for Privileged EXEC Mode

    Domain Name–Specific Commands

    Enabling SSH

Line Configurations

    Securing Console Access to User EXEC

    Securing Auxiliary Access to User EXEC

    Securing Telnet and SSH Access to User EXEC

Router Interface Configurations

    Assigning an IP Address

    Enabling the Interface

    LAN-Specific Commands

    WAN-Specific Commands

Saving Configurations

Using the show Command to Get Information

    Verifying Your Configurations

    Viewing Interface Statuses and Statistics

    IOS File Version show Commands

Troubleshooting Commands

Backing Up and Restoring Configurations and IOS Using TFTP

Neighbor Discovery with CDP

Using Telnet for Virtual Terminal Access

    Terminal Monitor

IOS DHCP

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 9: Understanding the Cisco SDM

Introduction

Getting Started

Global Configurations

    Changing the Hostname, Banner, Domain Name, and Secret Password

    Router Access

    DNS

    DHCP

Router Interface Configurations

    Assigning an IP Address

    Enabling the Interface

    Saving and Verifying Your Configurations

Monitoring

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 10: Introduction to Routing and Routing Protocols

Introduction

The Default Gateway

    Verifying and Troubleshooting the Default Gateway

Routing Sources

    Administrative Distance

Static Routes

    Configuring Static Routes

    Floating Static Routes

Default Routes

Configuring Static and Default Routes with SDM

Verifying Static and Default Routes

    Dynamic Routing Protocols

    Routing Metrics

    Classful and Classless Routing Updates

    VLSM

    Interior and Exterior Gateway Routing Protocols

    Distance Vector Routing Protocols

    Link-State Routing Protocols

    Advanced Distance Vector/Hybrid Routing Protocols

The Routing Table Revisited

Routing Redistribution

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 11: Distance Vector Routing Protocols

Introduction

Distance Vector Operations

    Routing Loops

Routing Loop Mitigation

    Counting to Infinity

    Split Horizon

    Route Poison, Poison Reverse, and Hold-Down Timers

    Triggered Updates

    Invalid/Dead Timers

RIP

    RIP Characteristics

    RIP Configuration

    Passive Interfaces

    RIPv2 Characteristics

    RIPv2 Configuration

    RIPv2 Update Authentication

    Configuring RIP with SDM

    RIP Verification

    Troubleshooting RIP

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 12: Link-State and Hybrid Routing Protocols

Introduction

Link-State Operations

OSPF

    OSPF Characteristics

    OSPF Initialization

    Introduction to Configuring OSPF

    OSPF Network Configuration

    Additional OSPF Commands

    Configuring OSPF with SDM

    Verifying OSPF

    Troubleshooting OSPF

Balanced Hybrid Operations

EIGRP

    EIGRP Characteristics

    EIGRP Stub Routing

    EIGRP Configuration

    EIGRP Verification

    EIGRP Troubleshooting

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 13: Foundation Switching Operations

Introduction

    Switching Functionality

Frame Transmission Methods

    Store-and-Forward

    Cut-Through

    Fragment-Free

Half- and Full-Duplex Connections

Switching Design

Spanning Tree Protocol

    Root Bridge

    Root Ports

    Designated Ports

    Blocked Ports

Port State Transitions

Initial Switch Configurations

    Assigning a Management IP Address to a Switch

    Defining a Default Gateway

    IP Assignment Using DHCP

    Configuring Multiple Switch Interfaces

Configuring and Verifying Spanning Tree Protocol

    Changing Priority and Port Cost

    Verifying Spanning Tree Protocol

Troubleshooting Basic Switch Connectivity

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 14: Enhanced Switching Operations

Introduction

Cisco Enhancements to Spanning Tree Protocol

    PortFast and BPDU Guard

    UplinkFast

    BackboneFast

    Configuring Cisco STP Enhancements

    EtherChannel

Rapid Spanning Tree Protocol

    Spanning Tree Similarities

    RSTP Port States and Roles

    RSTP Link and Edge Types

    BPDUs and Topology Changes

    Rapid Transition

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 15: Virtual LANs

Introduction

Overview of VLANs

    VLAN Membership Methods

    The Management VLAN

    Configuring and Verifying VLANs

VLAN Trunking

    ISL Trunks

    802.1q Trunks

    Configuring and Verifying ISL and 802.1Q Trunks

VLAN Trunking Protocol

    VTP Modes

    VTP Pruning

Configuring and Verifying VTP

InterVLAN Routing

    Router on a Stick

    Switched Virtual Interfaces

Voice VLANs

Troubleshooting VLAN

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 16: Implementing Switch Security

Introduction

Securing Physical Access to the Catalyst Switch

Securing Terminal Access to the Catalyst Switch

    To Telnet or Not to Telnet

    Additional IOS Security Practices

Layer 2 Security

    Port Security

    VLAN Security

    VTP Passwords

     “See”DP

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 17: Understanding Wireless Networking

Introduction

The Business Case

The Players in the 802.11 Market

Entering the Radio Frequency World

    Understanding Wireless Transmission

    Unlicensed RF Bands

    The Key to Successful Wireless: Channel Surfing

The 802.11 Standards Family

    Party Like It’s 1999: 802.11a and 802.11b

    2003 Delivers: 802.11g

    The Next Generation: 802.11n

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 18: Wireless Security and Implementation Considerations

Introduction

Understanding the Threats

    War Driving

    Direct Hacking

    Employee Ignorance

Deploying a Secure Wireless Network

    Wireless Encryption

    Wireless Authentication (802.1x)

    Wireless Intrusion Prevention System (IPS)

Wireless Implementation Guidelines

    Understanding Wireless Topologies

    Understanding Wireless Data Rates

    General Wireless Implementation Steps

    Wireless Troubleshooting

Chapter Summary

    Key Terms

Apply Your Knowledge

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 19: Using Cisco Access Lists

Introduction

Access List Concepts

Functions of an Access List

    Packet Filtering

    Quality of Service

    Dial-on-Demand Routing

    Network Address Translation

    Route Filtering

Standard Access Lists

    Configuration of Standard Access Lists

    Placement of Standard Access Lists

    Standard Access List Examples

Extended Access Lists

    Configuration of Extended Access Lists

    Practical Extended Access List Examples

Named Access List

Verifying Access Lists

    show running-config

    show ip interface

    show ip access-lists

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Reading and Resources

CHAPTER 20: Enabling Internet Connectivity with NAT

Introduction

NAT Concepts

    Static NAT

    Dynamic NAT

    NAT Overload and Port Address Translation

NAT Terminology

Configuring NAT Using Cisco SDM

    Configuring NAT Overload

Verifying NAT Configuration

Troubleshooting NAT

Chapter Summary

    Key Terms

Apply Your Knowledge

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Reading and Resources

CHAPTER 21: Command-Line NAT Implementation

Introduction

Reviewing NAT Concepts

NAT Configurations

    Static NAT

    Dynamic Pool Translations

    NAT Overload

Verifying NAT Operation

Troubleshooting NAT Operation

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercise

    Exam Questions

    Answers to Exam Questions

    Suggested Readings and Resources

CHAPTER 22: Wide Area Network Connections

Introduction

WAN Connection Types

    Leased Lines

    Circuit-Switched Networks

    Packet-Switched Networks

    Broadband

    Virtual Private Networks (VPNs)

    Metropolitan Ethernet (Metro Ethernet)

The WAN Physical Layer

WAN Data Link Encapsulations

    Serial Line Internet Protocol (SLIP)

    Point-to-Point Protocol (PPP)

    Cisco High-Level Data Link Control (HDLC)

    X.25 Link Access Procedure, Balanced (LAPB)

    Frame Relay

    Asynchronous Transfer Mode (ATM)

    PPP over Ethernet (PPPoE) and PPP over ATM (PPPoA)

Cisco HDLC

PPP

    Sub-Layer 1: ISO HDLC

    Sub-Layer 2: Link Control Protocol (LCP)

    Sub-Layer 3: Network Control Protocol

Configuring PPP

    Authentication

    Compression

Verifying PPP

Troubleshooting PPP

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Reading and Resources

CHAPTER 23: Frame Relay

Introduction

Frame Relay Overview

Virtual Circuits

    Hub and Spoke Design

    Partial Mesh Design

    Full Mesh Design

Frame Relay Terminology

    Permanent Virtual Circuit

    Switched Virtual Circuit

    Local Management Interface

    Data Link Connection Identifier

    Local Access Rate

    Committed Information Rate

    Backwards Explicit Congestion Notification

    Forward Explicit Congestion Notification

    Discard Eligible

The Nature of NBMA Networks

Subinterfaces

    Multipoint Subinterfaces

    Point-to-Point Subinterfaces

Address Mapping in Frame Relay

    Inverse ARP

    Static Mappings

Configuring Frame Relay

    Configuring Frame Relay for a Single Neighbor

    Configuring Frame Relay That Uses a Multipoint Interface

    Configuring Frame Relay That Uses Point-to-Point Interfaces

Verifying Frame Relay

    show frame-relay lmi

    show frame-relay pvc

    show frame-relay map

Troubleshooting Frame Relay

Chapter Summary

    Key Terms

Apply Your Knowledge

    Exercises

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Reading and Resources

CHAPTER 24: Understanding VPN Connectivity

Introduction

Understanding VPN Connectivity

    VPN Benefits and Considerations

    Types of VPNs

The Pieces That Make a VPN Tick

Understanding IPsec

    Encryption

    Diffie-Hellman

    Secure Socket Layer (SSL)

    Authentication/Data Integrity

    IPsec Protocols

Chapter Summary

    Key Terms

Apply Your Knowledge

    Review Questions

    Exam Questions

    Answers to Review Questions

    Answers to Exam Questions

    Suggested Readings and Resources

Fast Facts

OSI Model in Review

    Application Protocols Supported by the Application Layer

Network Domains

Cabling, Lines, and Services

MAC Addressing

Framing and Duplex Types

WAN Interfaces

Memory Types

IOS File Naming Conventions

Utilities Using ICMP

Network Security

    Access Attacks

    Reconnaissance Attacks

    Denial of Service (DoS) Attacks

Mitigating Network Threats

IP Addressing

    Classless Addressing

    Private Ranges

    Subnetting

IPv6

    Types of IPv6 Addresses

    Integrating IPv4 and IPv6

Layer 3 Functions

IOS Terminal Access Methodologies

IOS Boot Processes

IOS Navigation

    Context-Sensitive Help

    Terminal Editing Keys

    Syntax Errors

Global Configuration Commands

Securing the IOS

    SSH

Interface Configuration Commands

Switch Commands

The copy Command

The show Command

    Interface Status

Cisco Discovery Protocol

Telnet

DHCP

Switches

    Duplex Connections

    Spanning Tree Protocol IEEE 802.1d

Rapid Spanning Tree Protocol

    RSTP Convergence

Virtual LANs (VLANs)

    VLAN Configuration

    Voice VLANs

Trunks

    Trunk Configuration

VLAN Trunking Protocol

    VTP Configuration

InterVLAN Routing

    Port Security

Routing Characteristics

    Routing Sources

    Static and Default Routes

Dynamic Routing Protocols

    Routing Metrics

    Interior and Exterior Gateway Routing Protocols

    Classful and Classless Routing Updates

    Routing Protocol Classes

    Redistribution

Distance Vector Routing Loop Mitigation

RIP and RIPv2

    RIP Configuration

    Verifying and Troubleshooting RIP

OSPF Characteristics

    OSPF Configuration

    Verifying and Troubleshooting OSPF

EIGRP Characteristics

    EIGRP Configuration

    Verifying and Troubleshooting EIGRP

Passive Interfaces

Wireless Networking

Wireless Security and Implementation

Cisco Access Lists

    TCP Ports

    UDP Ports

Network Address Translation (NAT)

Wide-Area Networks

Frame Relay

VPN Connectivity

Practice Exam

Answers to Practice Exam

APPENDIX: What’s on the CD-ROM

Glossary

0789737132   TOC   11/21/2007

Index

Download the index

Introduction

Download the introduction

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020