niusouti.com

多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

题目
多选题
Which two are uses of NAT?()
A

enabling network migrations

B

conserving public IP addresses

C

allowing stateful packet inspection

D

preventing unauthorized connections from outside the network


相似考题

1.阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the router’s network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the router’s routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table

更多“多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network”相关问题
  • 第1题:

    What are two benefits of using NAT?()

    A.NAT protects network security because private networks are not advertised.

    B.NAT accelerates the routing process because no modifications are made on the packets.

    C.Dynamic NAT facilitates connections from the outside of the network.

    D.NAT facilitates end-to-end communication when IPsec is enable.

    E.NAT eliminates the need to re-address all host that require extemal access.

    F.NAT conserves addresses through host MAC-level multiplexing.


    参考答案:A, E

  • 第2题:

    Which two statements about static NAT translations are true?()

    • A、They are always present in the NAT table.
    • B、They allow connection to be initiated from the outside.
    • C、They can be configured with access lists, to allow two or more connections to be initiated from theoutside.
    • D、They require no inside or outside interface markings because addresses are statically defined.

    正确答案:A,B

  • 第3题:

    Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()

    • A、They are separate from the central site and use NAT to route through the Internet to the Central Site
    • B、They are part of the VLANs at the Central Site; they are in the same subnets
    • C、They use public IP Addresses that are routable through the Internet
    • D、They are in separate subnets but are part of the private address space of the network

    正确答案:D

  • 第4题:

    A traditional router is better suited than a firewall device for which function?()

    • A、VPN establishment
    • B、packet-based forwarding
    • C、stateful packet processing
    • D、Network Address Translation

    正确答案:B

  • 第5题:

    In any NAT (network address translation) configuration, what is the Inside Global IP address?()

    • A、The summarized address for all internal subnetted addresses.
    • B、A private IP address assigned to a host on the inside network.
    • C、A registered address that represents an inside host to an outside network.
    • D、A unique IP address used on an internal network
    • E、Non of the above

    正确答案:C

  • 第6题:

    Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()

    • A、NAS
    • B、Firewall
    • C、Hub
    • D、Bridge

    正确答案:B

  • 第7题:

    Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()

    • A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.
    • B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.
    • C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.
    • D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

    正确答案:C

  • 第8题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    What are two benefits of using NAT?()
    A

    NAT protects network security because privat enetworks are not advertised.

    B

    NAT accelerates the routing process because no modifications are made on the packets.

    C

    Dynamic NAT facilitates connections from the outside of the network.

    D

    NAT facilitates end-to-end communication when IPsec is enable.

    E

    NAT eliminates the need to re-address all host that require extemal access.

    F

    NAT conserves addresses through host MAC-level multiplexing.


    正确答案: B,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two QoS classification and marking statements are true? ()
    A

    In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.

    B

    In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.

    C

    In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.

    D

    The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.

    E

    The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two QoS classification and marking statements are true?()
    A

    In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.

    B

    In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field

    C

    In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.

    D

    The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.

    E

    The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.


    正确答案: E,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two are uses of NAT?()
    A

    enabling network migrations

    B

    conserving public IP addresses

    C

    allowing stateful packet inspection

    D

    preventing unauthorized connections from outside the network


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?()

    A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload

    B.(config-if) ip nat outside overload

    C.(config) ip nat inside source list 1 interface ethernet1 overload

    D.(config-if) ip nat inside overload


    参考答案:C

  • 第14题:

    Which two QoS classification and marking statements are true? ()

    • A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
    • B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.
    • C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
    • D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
    • E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

    正确答案:B,E

  • 第15题:

    Which two QoS classification and marking statements are true?()

    • A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
    • B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field
    • C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
    • D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
    • E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

    正确答案:B,E

  • 第16题:

    What are two uses of NAT?()

    • A、conserving public IP addresses
    • B、allowing stateful packet inspection
    • C、preventing unauthorized connections from outside the network
    • D、allowing networks with overlapping private address space to communicate

    正确答案:A,D

  • 第17题:

    Which two statements about static NAT translations are true?()

    • A、They are always present in the NATt able.
    • B、They allow connection to be initiated from the outside.
    • C、They can be configured with access lists,to allow two or more connections to be initiated from the outside.
    • D、They require no inside or outside interface markings because addresses are statically defined.

    正确答案:A,B

  • 第18题:

    Which two are uses of NAT?()

    • A、enabling network migrations
    • B、conserving public IP addresses
    • C、allowing stateful packet inspection
    • D、preventing unauthorized connections from outside the network

    正确答案:A,B

  • 第19题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() 

    • A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. 
    • B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. 
    • C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. 
    • D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

    正确答案:D

  • 第20题:

    多选题
    Which two statements about static NAT translations are true?()
    A

    They are always present in the NATt able.

    B

    They allow connection to be initiated from the outside.

    C

    They can be configured with access lists,to allow two or more connections to be initiated from the outside.

    D

    They require no inside or outside interface markings because addresses are statically defined.


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    What are two uses of NAT?()
    A

    conserving public IP addresses

    B

    allowing stateful packet inspection

    C

    preventing unauthorized connections from outside the network

    D

    allowing networks with overlapping private address space to communicate


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    单选题
    Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()
    A

    They are separate from the central site and use NAT to route through the Internet to the Central Site

    B

    They are part of the VLANs at the Central Site; they are in the same subnets

    C

    They use public IP Addresses that are routable through the Internet

    D

    They are in separate subnets but are part of the private address space of the network


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about static NAT translations are true?()
    A

    They are always present in the NAT table.

    B

    They allow connection to be initiated from the outside.

    C

    They can be configured with access lists, to allow two or more connections to be initiated from theoutside.

    D

    They require no inside or outside interface markings because addresses are statically defined.


    正确答案: D,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements about static NAT translations are true?()
    A

    They are always present in the NAT table.

    B

    They allow connection to be initiated from the outside.

    C

    They can be configured with access lists,to allow two or more connections to be initiated from the outside.

    D

    They require no inside or outside interface markings because addresses are statically defined.


    正确答案: D,B
    解析: 暂无解析