final part 2 Flashcards

1
Q

what are the steps for a R-2 NAT to translate and communicate with a webserver from a client on the web?

A

1- client uses inside global address of webserver
2-R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table.
3-R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server.
4-The web server uses the outside global address of the client as the destination address when responding.
5-R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address into an inside global address and forwards the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which method is used by a PAT-enabled router to send incoming packets to the correct inside hosts?​

A

It uses the destination TCP or UDP port number on the incoming packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. Which ACL is required to be configured in order for this command to function?

A

an access list that is numbered 4 that defines the private addresses that are affected by NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

A

show ip nat translations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of entering the command ip nat inside source static tcp 192.168.10.2 80 209.165.200.223 8080 at the global configuration prompt?

A

It binds the inside local address and local port to the specified inside global address and global port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three characteristics that help build a successful environment for a teleworker?

A

1- a distraction free workplace
2-a broadband Internet connection
3-a flexible approach to required work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the network designer identify as training needs?

A

1-tunneling protocols

2-encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an advantage offered by GRE tunnels?

A

support for IP multicast tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which three services are critical functions of the IPsec service?

A

data integrity
confidentiality
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which three statements are characteristics of generic routing encapsulation

A

GRE encapsulation supports any OSI Layer 3 protocol.
Correct!
GRE is stateless.
Correct Answer
GRE does not have strong security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When not in the office, network administrators in a company are required to establish an IPsec VPN connection to the company before accessing the intranet for network device management. Which Cisco Easy VPN component is needed for the administrators?

A

Cisco VPN Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which SNMPv2 configuration step is required?

  • documenting the location of the system contact
  • configuring the community string and access level
  • restricting SNMP access to NMS hosts
  • enabling traps on an SNMP agent
A

configuring the community string and access level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does the SNMP Get request do?

A

makes the SNMP agent retrieve specific information from the MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does the SNMP trap do?

A

makes the SNMP agent automatically send the value on an item from the MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which item will limit the amount of information that can be analyzed by a NetFlow collector?

A

Netflow version

17
Q

Data collected from a NetFlow analyzer can be used for which two purposes?

A

measuring what network resources are used and for what purposes
- accounting and charge back according to resource utilization

18
Q

A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case?

A

top-down

19
Q

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?

A

divide-and-conquer

20
Q

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?

A

Contact the administrator of the external system.

21
Q

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?

A

show tech-support

22
Q

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?

A

cable tester