当前位置:网站首页>Cisco -- an external tool for WAN's concept examination
Cisco -- an external tool for WAN's concept examination
2022-07-01 22:57:00 【ThumpBo】
See illustration . The network administrator is PAT To configure R2. Why is the configuration incorrect ?
NAT-POOL2 Bound the wrong ACL
See illustration . According to the command given ,R1 How many hosts can be connected to the LAN at the same time R1 on NAT transformation ?
1
Both sides of the communication use PAT What are the disadvantages of ?
End to end IPv4 Traceability will be lost .
See illustration . stay RT1 and RT2 Configured NAT.PC Sending request to Web The server . Which one? IPv4 The address is RT2 And Web Packet sources between servers IP Address ?
209.165.200.245
See illustration . Output information according to the displayed command , You can see what type of NAT?
Implemented using external interfaces PAT
See illustration . Configure static NAT With permission PC 1 Access... On the internal network Web The server . Instead of A and B Complete static NAT What are the two addresses required for configuration ?( Choose two .)
B = 209.165.201.1
A = 10.1.0.13
** ip nat inside source list 1 pool NAT_POOL overload** In the command overload What is the use of keywords ?
Allow multiple internal hosts to share one or more internal global addresses .
See illustration . Router R1 What is the source address of the packet used to forward to the Internet ?
209.165.200.225
See illustration . Applied to routers NAT The configuration is as follows :
ERtr(config)#access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)#ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)#ip nat inside source list 1 pool corp overload
ERtr(config)#ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)#interface gigabitethernet 0/0
ERtr(config-if)#ip nat inside
ERtr(config-if)#interface serial 0/0/0
ERtr(config-if)#ip nat outside
According to the configuration and output shown in the figure , Which one can determine NAT state ?
There is not enough information to determine static and dynamic NAT Is it working .
Which of the following describes the transmission of data over a WAN connection ?
Employees share data files with colleagues in branch offices on the other side of the city .
A company is considering upgrading the park WAN Connect . Which two of the following WAN Options are dedicated WAN An example of Architecture ?( Choose two .)
Leased line
Ethernet WAN
Which situation will make the enterprise decide to implement the company WAN?
When employees are distributed in many branches
Set up IPsec VPN when , Hash message authentication code (Hashed Message Authentication Code,HMAC) What is the function of the algorithm ?
Ensure message integrity
IPsec What algorithm is used to provide data confidentiality ?
AES
Which two algorithms can become IPsec Part of the strategy , Protect traffic that needs attention by providing encryption and hashing ?( Choose two .)
AES
SHA
What kind VPN The solution allows Web The browser is established to ASA Remote access security VPN Tunnel ?
No client SSL
What kind IPsec The safety function can ensure that VPN The received data has not been modified during transmission ?
integrity
Which two of the following VPN It belongs to the remote access of enterprise management VPN?( Choose two .)
No client SSL VPN
Client based IPsec VPN
Site to site VPN What you need ?
It needs to make both ends of the tunnel VPN Gateway encrypts and decrypts traffic .
NAT What will overload use to track the traffic of multiple internal hosts using the same internal global address ?
Port number
See illustration .R1 The configuration on is static NAT. Which Internet host will use IP Address to access PC1?
209.165.200.225
See illustration . The network administrator is viewing the command show ip nat translations Output information of . Which of the following correctly describes the router RT2 On going NAT transformation ?
Using static NAT To target the source IPv4 The address is 192.168.254.253, Purpose IPv4 The address is 192.0.2.88 Of traffic .
Which two of the following WAN Infrastructure services are private connections ?( Please choose two .)
Frame relay
T1/E1
Which two of the following correctly describe the relationship between LAN and WAN ?( Choose two .)
Compared with the rate of LAN connecting internal terminal devices , The bandwidth rate of Wan connected to LAN is lower
Wan usually consists of multiple ISP operating , But LAN is usually run by a single organization or individual .
Which of the following describes site to site VPN Characteristics of ?
Must be statically established .
stay VPN How to complete in “ Tunnel ”?
From one or more VPN The new header of the protocol will encapsulate the original packet .
Which of the following is true VPN Correct description of ?
VPN Use virtual connections to create private networks over public networks
Lead to PC-A What is the problem of being unable to access the Internet ?
Not properly allocated NAT Interface .
64.101.198.197 What kind of address ?
Public address
What kind of VPN Allow safe site to site VPN Send multicast and broadcast traffic ?
be based on IPsec Of GRE
See illustration . from R1 (NAT Router ) From the perspective of , Which address is the internal global address ?
209.165.200.225
Both sides of the communication use PAT What are the disadvantages of ?
End to end IPv4 Traceability will be lost .
See illustration . The network administrator has just configured address translation , Validating configuration . Which three items can the administrator verify ?( Please select three items .)
Address translation works normally .
The number is 1 The standard access list of is used as part of the configuration process .
Two types of NAT.
static state NAT Which two addresses are specified in the configuration ?
Internal local and internal global
IPsec AH What are the two hash algorithms used to ensure authenticity ?( Choose two .)
MD5
SHA
Which two terminals can be used ASDM Configured ASA Intersite VPN On the other end of ?( Choose two .)
ISR Router
the other one ASA
Which two of the following technologies provide for enterprise management VPN Solution ?( Choose two .)
Intersite VPN
The remote access VPN
Diffie-Hellman Algorithm in IPsec What are the functions within the framework ?
Allow peers to exchange shared keys
128.107.240.239 What kind of address ?
Public address
That type of VPN At the same time, it supports the 2 Tier and tier 3 Layer implementation ?
MPLS VPN
Which two technologies can be classified as dedicated WAN infrastructure ? ( Choose two .)
Frame relay
MetroE
Which network situation needs to be used WAN?
Employees need to pass VPN Connect to the company email server
Which protocol creates virtual point-to-point connections , To transmit unencrypted traffic between Cisco routers through various protocols ?
GRE
10.100.126.126 What kind of address ?
Private address
10.131.48.7 What kind of address ?
Private address
See illustration . In order to complete the R1 Static on NAT To configure , Which of the following actions must be performed ?
**
Public address
That type of VPN At the same time, it supports the 2 Tier and tier 3 Layer implementation ?
MPLS VPN
Which two technologies can be classified as dedicated WAN infrastructure ? ( Choose two .)
Frame relay
MetroE
Which network situation needs to be used WAN?
Employees need to pass VPN Connect to the company email server
Which protocol creates virtual point-to-point connections , To transmit unencrypted traffic between Cisco routers through various protocols ?
GRE
10.100.126.126 What kind of address ?
Private address
10.131.48.7 What kind of address ?
Private address
[ Outside the chain picture transfer in …(img-NuoMVoUn-1655986692000)]
See illustration . In order to complete the R1 Static on NAT To configure , Which of the following actions must be performed ?
You should use ip nat outside Command configuration interface S0/0/0
边栏推荐
- 死锁的处理策略—预防死锁、避免死锁、检测和解除死锁
- Hide the creation and use of users
- 正则系列之量词(Quantifiers)
- 效率提升 - 鼓捣个性化容器开发环境
- Stimulate new kinetic energy and promote digital economy in multiple places
- Efficiency improvement - encourage personalized container development environment
- redis配置文件中常用配置详解[通俗易懂]
- 447-哔哩哔哩面经1
- 使用 Three.js 实现'雪糕'地球,让地球也凉爽一夏
- Favorite transaction code management tool in SAP GUI
猜你喜欢
Cut noodles C language
Metauniverse may become a new direction of Internet development
转--原来gdb的底层调试原理这么简单
转--利用C语言中的setjmp和longjmp,来实现异常捕获和协程
转--拿来即用:分享一个检查内存泄漏的小工具
Explain ThreadLocal in detail
104. SAP ui5 table control supports multi select and how to select multiple table row items at a time with code
Map container
[target tracking] | single target tracking indicator
“信任机器”为发展赋能
随机推荐
半监督学习之数据增强
vSphere+、vSAN+来了!VMware 混合云聚焦:原生、快速迁移、混合负载
Happy number [fast and slow pointer of ring PROBLEMS]
leetcode - 287. Find duplicates
General use of qstringlist
Mysql database detailed learning tutorial
Appium automation test foundation - appium installation (I)
nn.Parameter】Pytorch特征融合自适应权重设置(可学习权重使用)
友善串口助手使用教程_友善串口调试助手怎么进行配置-友善串口调试助手使用教程…
[MySQL] index classification
[literacy] deep / shallow, local / global features in machine learning image processing
Genicam gentl standard ver1.5 (4) Chapter 5 acquisition engine
深度学习--数据操作
map容器
死锁的处理策略—预防死锁、避免死锁、检测和解除死锁
"Trust machine" empowers development
【c语言】malloc函数详解[通俗易懂]
激发新动能 多地发力数字经济
104. SAP UI5 表格控件的支持复选(Multi-Select)以及如何用代码一次选中多个表格行项目
Cutefishos system~