enabling network migrations
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network
第1题:
A.NAT protects network security because private networks are not advertised.
B.NAT accelerates the routing process because no modifications are made on the packets.
C.Dynamic NAT facilitates connections from the outside of the network.
D.NAT facilitates end-to-end communication when IPsec is enable.
E.NAT eliminates the need to re-address all host that require extemal access.
F.NAT conserves addresses through host MAC-level multiplexing.
第2题:
Which two statements about static NAT translations are true?()
第3题:
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()
第4题:
A traditional router is better suited than a firewall device for which function?()
第5题:
In any NAT (network address translation) configuration, what is the Inside Global IP address?()
第6题:
Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()
第7题:
Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()
第8题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第9题:
NAT protects network security because privat enetworks are not advertised.
NAT accelerates the routing process because no modifications are made on the packets.
Dynamic NAT facilitates connections from the outside of the network.
NAT facilitates end-to-end communication when IPsec is enable.
NAT eliminates the need to re-address all host that require extemal access.
NAT conserves addresses through host MAC-level multiplexing.
第10题:
In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.
In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
第11题:
In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field
In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
第12题:
enabling network migrations
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network
第13题:
A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload
B.(config-if) ip nat outside overload
C.(config) ip nat inside source list 1 interface ethernet1 overload
D.(config-if) ip nat inside overload
第14题:
Which two QoS classification and marking statements are true? ()
第15题:
Which two QoS classification and marking statements are true?()
第16题:
What are two uses of NAT?()
第17题:
Which two statements about static NAT translations are true?()
第18题:
Which two are uses of NAT?()
第19题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?()
第20题:
They are always present in the NATt able.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.
第21题:
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network
allowing networks with overlapping private address space to communicate
第22题:
They are separate from the central site and use NAT to route through the Internet to the Central Site
They are part of the VLANs at the Central Site; they are in the same subnets
They use public IP Addresses that are routable through the Internet
They are in separate subnets but are part of the private address space of the network
第23题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists, to allow two or more connections to be initiated from theoutside.
They require no inside or outside interface markings because addresses are statically defined.
第24题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.