HAHAHAHAHA

HAHAHAHAHA

University

52 Qs

quiz-placeholder

Similar activities

Security, Networking, and Windows Server Administration Final

Security, Networking, and Windows Server Administration Final

KG - University

50 Qs

UJI KOMPETENSI KELAS XI TKJ

UJI KOMPETENSI KELAS XI TKJ

11th Grade - University

55 Qs

KJDKU

KJDKU

University

50 Qs

Konsentrasi Keahlian TKJ

Konsentrasi Keahlian TKJ

12th Grade - University

53 Qs

Summer Quiz for Senior Class - Quiz Four

Summer Quiz for Senior Class - Quiz Four

11th Grade - University

50 Qs

Routing and Switching

Routing and Switching

University

54 Qs

Akt test (51-100)    Ескі вариант

Akt test (51-100) Ескі вариант

University

50 Qs

100Devs - LwL - Class03 - CSS Basics

100Devs - LwL - Class03 - CSS Basics

10th Grade - Professional Development

49 Qs

HAHAHAHAHA

HAHAHAHAHA

Assessment

Quiz

Computers

University

Medium

Created by

Minase Aoi

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes dynamic NAT?

  • It always maps a private IP address to a public IP address.

  • It provides an automated mapping of inside local to inside global IP addresses.

  • It provides a mapping of internal host names to IP addresses.

  • It dynamically provides IP addressing to internal hosts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? A side effect of NAT is that it hides the inside local IP address of a host from the outside network.

  • False

  • True

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? With NAT overload, each inside local IP address is translated to a unique inside global IP address on a one-for-one basis.

  • True

  • False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The use of NAT makes end-to-end traceability between source and destination easier.

  • True

  • False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? Tunneling protocols such as IPsec do not work well through NAT.


  • True

  • False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

  • access-list standard VTY
    permit 10.7.0.0 0.0.0.127

  • access-list 5 permit 10.7.0.0 0.0.0.31

  • access-class 5 in

  • ip access-group 5 in

  • access-list 5 deny any

  • ip access-group 5 out

  • access-list 5 permit 10.7.0.0 0.0.0.31

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Consider the configured access list.

R1# show access-lists extended IP access list 100 deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet permit ip any any (15 matches)

What are two characteristics of this access list? (Choose two.)

  • Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.

  • A network administrator would not be able to tell if the access list has been applied to an interface or not.

  • Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telnet to the router that has the IP address 10.1.1.1 assigned.

  • The access list has been applied to an interface.

  • Any device can telnet to the 10.1.2.1 device.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?