当前位置:网站首页>Cisco -- an external tool for WAN's concept examination
Cisco -- an external tool for WAN's concept examination
2022-07-01 22:57:00 【ThumpBo】






See illustration . The network administrator is PAT To configure R2. Why is the configuration incorrect ?
NAT-POOL2 Bound the wrong ACL

See illustration . According to the command given ,R1 How many hosts can be connected to the LAN at the same time R1 on NAT transformation ?
1
Both sides of the communication use PAT What are the disadvantages of ?
End to end IPv4 Traceability will be lost .

See illustration . stay RT1 and RT2 Configured NAT.PC Sending request to Web The server . Which one? IPv4 The address is RT2 And Web Packet sources between servers IP Address ?
209.165.200.245

See illustration . Output information according to the displayed command , You can see what type of NAT?
Implemented using external interfaces PAT

See illustration . Configure static NAT With permission PC 1 Access... On the internal network Web The server . Instead of A and B Complete static NAT What are the two addresses required for configuration ?( Choose two .)
B = 209.165.201.1
A = 10.1.0.13
** ip nat inside source list 1 pool NAT_POOL overload** In the command overload What is the use of keywords ?
Allow multiple internal hosts to share one or more internal global addresses .

See illustration . Router R1 What is the source address of the packet used to forward to the Internet ?
209.165.200.225

See illustration . Applied to routers NAT The configuration is as follows :
ERtr(config)#access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)#ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)#ip nat inside source list 1 pool corp overload
ERtr(config)#ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)#interface gigabitethernet 0/0
ERtr(config-if)#ip nat inside
ERtr(config-if)#interface serial 0/0/0
ERtr(config-if)#ip nat outside
According to the configuration and output shown in the figure , Which one can determine NAT state ?
There is not enough information to determine static and dynamic NAT Is it working .
Which of the following describes the transmission of data over a WAN connection ?
Employees share data files with colleagues in branch offices on the other side of the city .
A company is considering upgrading the park WAN Connect . Which two of the following WAN Options are dedicated WAN An example of Architecture ?( Choose two .)
Leased line
Ethernet WAN
Which situation will make the enterprise decide to implement the company WAN?
When employees are distributed in many branches
Set up IPsec VPN when , Hash message authentication code (Hashed Message Authentication Code,HMAC) What is the function of the algorithm ?
Ensure message integrity
IPsec What algorithm is used to provide data confidentiality ?
AES
Which two algorithms can become IPsec Part of the strategy , Protect traffic that needs attention by providing encryption and hashing ?( Choose two .)
AES
SHA
What kind VPN The solution allows Web The browser is established to ASA Remote access security VPN Tunnel ?
No client SSL
What kind IPsec The safety function can ensure that VPN The received data has not been modified during transmission ?
integrity
Which two of the following VPN It belongs to the remote access of enterprise management VPN?( Choose two .)
No client SSL VPN
Client based IPsec VPN
Site to site VPN What you need ?
It needs to make both ends of the tunnel VPN Gateway encrypts and decrypts traffic .
NAT What will overload use to track the traffic of multiple internal hosts using the same internal global address ?
Port number

See illustration .R1 The configuration on is static NAT. Which Internet host will use IP Address to access PC1?
209.165.200.225

See illustration . The network administrator is viewing the command show ip nat translations Output information of . Which of the following correctly describes the router RT2 On going NAT transformation ?
Using static NAT To target the source IPv4 The address is 192.168.254.253, Purpose IPv4 The address is 192.0.2.88 Of traffic .
Which two of the following WAN Infrastructure services are private connections ?( Please choose two .)
Frame relay
T1/E1
Which two of the following correctly describe the relationship between LAN and WAN ?( Choose two .)
Compared with the rate of LAN connecting internal terminal devices , The bandwidth rate of Wan connected to LAN is lower
Wan usually consists of multiple ISP operating , But LAN is usually run by a single organization or individual .
Which of the following describes site to site VPN Characteristics of ?
Must be statically established .
stay VPN How to complete in “ Tunnel ”?
From one or more VPN The new header of the protocol will encapsulate the original packet .
Which of the following is true VPN Correct description of ?
VPN Use virtual connections to create private networks over public networks
Lead to PC-A What is the problem of being unable to access the Internet ?
Not properly allocated NAT Interface .
64.101.198.197 What kind of address ?
Public address
What kind of VPN Allow safe site to site VPN Send multicast and broadcast traffic ?
be based on IPsec Of GRE

See illustration . from R1 (NAT Router ) From the perspective of , Which address is the internal global address ?
209.165.200.225
Both sides of the communication use PAT What are the disadvantages of ?
End to end IPv4 Traceability will be lost .

See illustration . The network administrator has just configured address translation , Validating configuration . Which three items can the administrator verify ?( Please select three items .)
Address translation works normally .
The number is 1 The standard access list of is used as part of the configuration process .
Two types of NAT.
static state NAT Which two addresses are specified in the configuration ?
Internal local and internal global
IPsec AH What are the two hash algorithms used to ensure authenticity ?( Choose two .)
MD5
SHA
Which two terminals can be used ASDM Configured ASA Intersite VPN On the other end of ?( Choose two .)
ISR Router
the other one ASA
Which two of the following technologies provide for enterprise management VPN Solution ?( Choose two .)
Intersite VPN
The remote access VPN
Diffie-Hellman Algorithm in IPsec What are the functions within the framework ?
Allow peers to exchange shared keys
128.107.240.239 What kind of address ?
Public address
That type of VPN At the same time, it supports the 2 Tier and tier 3 Layer implementation ?
MPLS VPN
Which two technologies can be classified as dedicated WAN infrastructure ? ( Choose two .)
Frame relay
MetroE
Which network situation needs to be used WAN?
Employees need to pass VPN Connect to the company email server
Which protocol creates virtual point-to-point connections , To transmit unencrypted traffic between Cisco routers through various protocols ?
GRE
10.100.126.126 What kind of address ?
Private address
10.131.48.7 What kind of address ?
Private address

See illustration . In order to complete the R1 Static on NAT To configure , Which of the following actions must be performed ?
**
Public address
That type of VPN At the same time, it supports the 2 Tier and tier 3 Layer implementation ?
MPLS VPN
Which two technologies can be classified as dedicated WAN infrastructure ? ( Choose two .)
Frame relay
MetroE
Which network situation needs to be used WAN?
Employees need to pass VPN Connect to the company email server
Which protocol creates virtual point-to-point connections , To transmit unencrypted traffic between Cisco routers through various protocols ?
GRE
10.100.126.126 What kind of address ?
Private address
10.131.48.7 What kind of address ?
Private address
[ Outside the chain picture transfer in …(img-NuoMVoUn-1655986692000)]
See illustration . In order to complete the R1 Static on NAT To configure , Which of the following actions must be performed ?
You should use ip nat outside Command configuration interface S0/0/0
边栏推荐
- vSphere+、vSAN+来了!VMware 混合云聚焦:原生、快速迁移、混合负载
- There is no signal in HDMI in computer games caused by memory, so it crashes
- Cloud Vulnerability Global Database
- 3DE resources have nothing or nothing wrong
- locust的使用
- Two schemes of transforming the heat map of human posture estimation into coordinate points
- [literacy] deep / shallow, local / global features in machine learning image processing
- tcpdump命令使用详解
- Appium automation test foundation - appium installation (I)
- Explain kubernetes network model in detail
猜你喜欢

Explain kubernetes network model in detail

多图预警~ 华为 ECS 与 阿里云 ECS 对比实战

Genicam gentl standard ver1.5 (4) Chapter 5 acquisition engine

Using emqx cloud to realize one machine one secret verification of IOT devices

rxjs Observable of 操作符的单步调试分析

Turn -- use setjmp and longjmp in C language to realize exception capture and collaboration

Unable to climb hill sort, directly insert sort

El input text field word limit, beyond which the display turns red and input is prohibited

MySQL5.7 设置密码策略(等保三级密码改造)

The last packet sent successfully to the server was 0 milliseconds ago. The driver has not received
随机推荐
SAP ui5 application development tutorial 104 - multi select support for SAP ui5 table controls and how to use code to select multiple table row items at a time
Efficiency improvement - encourage personalized container development environment
vSphere+、vSAN+来了!VMware 混合云聚焦:原生、快速迁移、混合负载
Favorite transaction code management tool in SAP GUI
Cut noodles C language
[image segmentation] 2021 segformer neurips
Fiori 应用通过 Adaptation Project 的增强方式分享
Happy number [fast and slow pointer of ring PROBLEMS]
转载csdn文章操作
The principle, testing and Countermeasures of malicious software reverse closing EDR
数字货币:影响深远的创新
Using securecrtportable to remotely connect virtual machines
I graduated from college in 14 years and changed to software testing in 3 months. My monthly salary was 13.5k. At the age of 32, I finally found the right direction
软件测试之「 性能测试」总结,新手上路必会知识点
激发新动能 多地发力数字经济
Turn -- bring it and use it: share a gadget for checking memory leaks
Configure filter
nn. Parameter] pytoch feature fusion adaptive weight setting (learnable weight use)
Understanding of transactions in MySQL
“信任机器”为发展赋能