Questions Flashcards
(61 cards)
- Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
NAT provides a solution to slow down the IPv4 address depletion.
NAT introduces problems for some applications that require end-to-end connectivity.
- A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?
Router# show ip nat translations
- What are two tasks to perform when configuring static NAT? (Choose two.)
Create a mapping between the inside local and outside local addresses.
Identify the participating interfaces as inside or outside interfaces.
- What is a disadvantage of NAT?
There is no end-to-end addressing.
Refer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address?
209.165.200.225
Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?
1
- Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)
A standard access list numbered 1 was used as part of the configuration process.
Address translation is working.
Two types of NAT are enabled.
- Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?
209.165.200.245
- Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?
PAT using an external interface
- Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?
inside global
- Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)
A = 10.1.0.13 B = 209.165.201.1
- What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?
It allows many inside hosts to share one or a few inside global addresses.
- Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?
209.165.200.225
. Refer to the exhibit. The NAT configuration applied to the router is as follows:
ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)# ip nat inside source list 1 pool corp overload
ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside
Based on the configuration and the output shown, what can be determined about the NAT status within the organization?
Not enough information is given to determine if both static and dynamic NAT are working.
- Which situation describes data transmissions over a WAN connection?
An employee shares a database file with a co-worker who is located in a branch office on the other side of the city
- Which two technologies are categorized as private WAN infrastructures? (Choose two.)
FRAME RELAY
METROE
- Which network scenario will require the use of a WAN?
Employees need to connect to the corporate email server through a VPN while traveling.
- What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)
SHA EN MD5
- What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)
SHA EN AES
- Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
CLIENTLESS SSL
- Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
INTEGRETY
- Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)
clientless SSL VPN
client-based IPsec VPN
- Which is a requirement of a site-to-site VPN?
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
- What is the function of the Diffie-Hellman algorithm within the IPsec framework?
allows peers to exchange shared keys