CCNA 2 Chapter 11 v5.0 Exam Answers 2013

合集下载

ccna第二章答案

ccna第二章答案

1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for data 确定数据通路initiate data communicationsretime and retransmit data signals 重分发originate the flow of datamanage data flows 管理数据final termination point for data flow2. Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layers limit the need for hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors3. What are two functions of encapsulation? (Choose two.)tracks delay between end devicesenables consistent network paths for communicationallows modification of the original data before transmissionidentifies pieces of data as part of the same communicationensures that data pieces can be directed to the correct receiving end device4. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detection 支持错误检测‘ensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection5. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow6. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation 一个具体的封装层7. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flow 原数据流retime and retransmit data signalsdetermine pathways for data8.Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination devicean end devicean intermediate devicea media device9.Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown?(Choose three.)Network A -- WANNetwork B -- WANNetwork C -- LANNetwork B -- MANNetwork C -- WANNetwork A -- LAN10. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).11.Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexingencapsulation12. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating to identify the processes or services that are communicating within the end devices13. What device is considered an intermediary device?1.file serve2.IP phone ptop 4.printer 5.switch14.Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? sourceendtransferintermediary 中间设备15.Refer to the exhibit. What type of network is shown?WANMANLANWLAN16. Which layer encapsulates the segment into packets?physicaldata linknetwork 网络层封装的是数据包transport17. What can be identified by examining the network layer header?the destination device on the local mediathe destination host address 网络层头部封装目的主机的地址the bits that will be transferred over the mediathe source application or process creating the data18. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata presentationreliability, flow control, and error detectionnetwork media control 接入层控制网络媒体the division of segments into packets19. During the encapsulation process, what occurs at the data link layer? No address is added.The logical address is added.The physical address is added. 数据链路层添加一个物理地址The process port number is added.20.Refer to the exhibit. Which set of devices contains only end devices? A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?4physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application22. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)34NetworkTransportPhysicalData Link TCP/IP 工作在第一层和第二层Session。

ccna第二章练习答案.docx

ccna第二章练习答案.docx

yy1 ・ Refer to the exhibit・ Identify the devices labeled A, B, C, and D in the network physical documentation. 匚A=bridge, B=switch, C=router, D=hubK A=bridge, B=hub, C=router, D=switchC A=bridge, B=router, C=hub, D=switchc A=hub, B=bridge, C=router, D=switch2 The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented?匚busE starC ring匚mesh3. A switch has failed in the network. As a result, only one segment of the network is down. Which type of physical network topology is implemented?C busC ring匚starE extended star4. Which three features apply to LAN connections? (Choose three.)厂operate using serial in terfacesV make network connection using a hubV limited to operation over small geographic areas厂 provide part-time connectivity to remote servicesV typically operate under local administrative control厂provide lower bandwidth services compared to WANs5. What is one advantage of defining network communication by the seven layers of the OSI model? 【:It in creases the ban dwidth of a n etwork.E It makes networking easier to learn and understand・It eliminates many protocol restrictions.匚It increases the throughput of a network.c It reduces the need for testing network connectivity.6. What makes it easier for different networking vendors to design software and hardware that willin teroperate?E OSI modelc proprietary desig ns匚IP addressing schemec standard logical topologies匚standard physical topologies7. Which term describes the process of adding headers to data as it moves down OSI layers?匚division匚encoding匚separation匚segmentationE encapsulation8. What is the term used to describe the transport layer protocol data unit?匚bits c packetsE segments匚framesc data streams9. Which of the following are layers of the TCP/IP model? (Choose three.)▽ Applicati onr PhysicalV Internet0 Network Access厂Prese ntation10. Which of the following are data link layer encapsulation details? (Choose two.)0 A header and trailer are added・厂Data is con verted into packets ・V Packets are packaged into frames・厂Frames are divided into segments.厂Packets are changed into bits for Internet travel.11. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs?匚data link匚transport匚n etworkE application12. Which two features apply to WAN connections? (Choose two.)V operate using serial interfacesP make network connection using a hub厂limited to operation over small geographic areasI- typically operate under local administrative control▽provide lower bandwidth services compared to LANs13. Which of the following are ways that bandwidth is commonly measured? (Choose three.)厂GHzps▽kbpsV Mbps厂Nbps厂MHzpsV Gbps14. Refer to the following list. Choose the correct order of data encapsulation when a device sends information. segments bits packetsdata frames匚1 -3-5-4-2C 2- 1-3-5-4C 2-4-3-5-1匚4-3-1-2-5E 4-1 -3-5-2C 3-5-1-2-415. Which of the following are factors that determine throughput? (Choose two.)厂types of passwords used on servers厂type of Layer 3 protocol usedV n etwork topologywidth of the network cable0 number of users on the network16. Refer to the exhibit・ Which column shows the correct sequenee of OSI model layers?E D17. Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?c physical layer匚data link layerE network layer匚transport layer18. Which best describes the function of the physical layer?E Defines the electrical and functional specifications for the link between end systems・匚Provides reliable transit of data across a physical link.匚Provides connectivity and path selection between two end systems・匚Concerned with physical addressing, network topology and media access.。

CCNA 2 Chapter 10 V4.0 Answers

CCNA 2 Chapter 10 V4.0 Answers

1. What action does a link-state router take immediately upon receipt of an LSP from a neighboring router?floods the LSP to neighborscalculates the SPF algorithmruns the Bellman-Ford algorithmcomputes the best path to the destination network2. Why is it difficult for routing loops to occur in networks that use link-state routing?Each router builds a simple view of the network based on hop count. Routers flood the network with LSAs to discover routing loops.Each router builds a complete and synchronized view of the network. Routers use hold-down timers to prevent routing loops.3.Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL?hop countuptime of the routecost of the linka list of all the routing protocols in use4. To achieve network convergence, what three steps does each link state router take? (Choose three.)use automatic summarization to reduce the size of routing tablesbuild a Link State Packet (LSP) containing the state of each directly connected linkflood the LSP to all neighbors, who then store all LSPs received in a databasediscover neighbors and establish adjacencies using the hello packet sent at regular intervalsconstruct a complete map of the topology and compute the best path to each destination networkuse the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table5.Refer to the exhibit. When Router D is configured to use a link-state routing protocol and is added to the network, what is the first thing that it does to begin learning the network topology?It sends LSP packets to Routers B and C.It sends LSP packets to all routers in the network.It sends Hello packets to all routers in the network.It sends information about its directly connected neighbors to Routers A and E.It sends information about its directly connected neighbors to all routers in the network.It learns about its directly connected networks when its interfaces reach the up state.6. A new network administrator is given the task of selecting an appropriate dynamic routing protocol for a software development company. The company has over 100 routers, uses CIDR and VLSM, requires fast convergence, and uses both Cisco and non-Cisco equipment. Which routing protocol is appropriate for this company?RIP version 2IGRPEIGRPOSPFBGP7. What two events will cause a link state router to send LSPs to all neighbors? (Choose two.)30 second timer expireswhenever the network topology changesimmediately after the Bellman-Ford algorithm has runimmediately after the DUAL FSM has built the topology databaseupon initial startup of router or routing protocol8. What is the final step in the link state routing process? successors are placed into the routing tableSPF computes best path to each destination networkLSPs are flooded to all neighbors to converge the networkDUAL algorithm is run to find best path to destination networks9.Refer to the exhibit. What does JAX do with link-state packets from ORL? sends out its updated routing table to both ORL and BOS routerssends out the individual link-state packets out the interface connected to BOSqueries BOS to see if it has a better routeonly adds it to the local routing table and performs no other actions10. What two statements correctly describe the link state routing process? (Choose two.)each router in the area floods LSPs to all neighborsall routers in the area have identical link state databasesLSPs use the reserved multicast address of 224.0.0.10 to reach neighbors routing loops are prevented by running the Diffusing Update Algorithm (DUAL)Reliable Transport Protocol (RTP) is the protocol used by for the delivery and reception of LSPs11. Which database or table must be identical on all link-state routers within an area in order to construct an accurate SPF tree?routing tableadjacency tablelink-state databaseneighbor tabletopology database12.Refer to the exhibit. Which statement correctly describes the path traffic would take from the 10.0.0.0/24 network to the 192.168.1.0/24 network if a link-state routing protocol was in use?BOS -> ATL because this path is the least hopsBOS -> ATL because this path is highest costBOS -> ORL -> JAX -> ATL because this path is the lowest costtraffic would load balance across all links13. What feature do modern link-state protocols provide to minimize processing and memory requirements?splitting routing topologies into smaller areasassigning lower process priorities to route calculationsusing update timers to restrict routing updatesstrict split horizon rules to reduce routing table entries14. What speeds up convergence in a network using link-state routing? updates triggered by network changesupdates sent at regular intervalsupdates sent only to directly connected neighborsupdates that include complete routing tables15. Which algorithm is run by link-state routing protocols to calculate the shortest path to destination networks?DUALDijkstraBellman-FordDiffie-Hellman16. What are some of the advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)The topology database eliminates the need for a routing table.Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.Routers have direct knowledge of all links in the network and how they are connected.After the inital LSA flooding, they generally require less bandwidth to communicate changes in a topology.Link-state protocols require less router processor power than distance vector protocols.17.Refer to the exhibit. If all routers and interfaces are configured to use a link-state routing protocol, from which routers will router D receive hello packets?A and EB and CA, B, C, and EC only18. Which two routing protocols use Dijkstra’s shortest path first algorithm? (Choose two.)RIPv1RIPv2IS-ISBGPEIGRPOSPF19. When are link-state packets sent to neighbors?every 30 secondsevery 180 secondsafter the holddown time expireswhen a link goes up or downwhen a routing loop occurs20. What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)The topology database eliminates the need for a routing table.Each router independently determines the route to each network.Link-state protocols require less router processor power than distance vector protocols.After the inital LSP flooding, they generally require less bandwidth to communicate changes in a topology.Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.21. To achieve network convergence, what three steps does each link state router take? (Choose three.)use automatic summarization to reduce the size of routing tables build a Link State Packet (LSP) containing the state of each directly connected linkflood the LSP to all neighbors, who then store all LSPs received in a databasesend hello packages at regular intervals to discover neighbors and establish adjacenciesconstruct a complete map of the topology and compute the best path to each destination networkuse the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table。

CCNA第一学期各章习题及答案.doc

CCNA第一学期各章习题及答案.doc

诶了我累了目录第二章网络通信P2-8第三章应用层功能及协议P9-14 第四章 OSI 传输层 P15-20第五章 OSI 网络层 P21-27第六章网络编址-IPv4 P28-34第七章数据链路层P35-40第八章 OSI 物理层 P41-45第九章以太网P46-51第十章网络规划和布线P52-61 第十一章配置和测试网络P62-70 第一学期末考试P71-91文档末尾返回目录第二章网络通信001 TCP/IP 网络接入层有何作用路径确定和数据包交换数据表示、编码和控制可靠性、流量控制和错误检测详细规定构成物理链路的组件及其接入方法将数据段划分为数据包2下列哪些陈述正确指出了中间设备在网络中的作用(选择三项)确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点003 下列哪三项陈述是对局域网(LAN) 最准确的描述(选择三项)LAN 通常位于一个地域内。

此类网络由由一个组织管理。

LAN 中的不同网段之间一般通过租用连接的方式连接。

此类网络的安全和访问控制由服务提供商控制。

LAN 为同一个组织内的用户提供网络服务和应用程序访问。

此类网络的每个终端通常都连接到电信服务提供商(TSP)。

004 什么是PDU传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装005 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同(选择两项)网络层传输层物理层数据链路层会话层6请参见图示。

所示网络属于哪一类型WANMANLANWLAN7以下哪种特征正确代表了网络中的终端设备管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径008 第 4 层端口指定的主要作用是什么标识本地介质中的设备标识源设备和目的设备之间的跳数向中间设备标识通过该网络的最佳路径标识正在通信的源终端设备和目的终端设备标识终端设备内正在通信的进程或服务9请参见图示。

CCNA中英文试题两套

CCNA中英文试题两套

这是我学习过程中遇见的ccna试题,中文一份,英文一份,很经典呀。

1 技术人员需要为某幢已经布设有线以太网络的大厦提供无线连接。

哪三个因素会影响需要的接入点数目?(选择三项。

)大厦的规模大厦中实体内墙的数目多个办公室中有微波炉无线网络中使用的加密方法Windows 和Appletalk 操作系统的同时使用AP 中短波或红外线的使用2 下列关于无线网桥的陈述,哪一项是正确的?通过无线链路连接两个网络连接无线局域网的固定设备允许无线客户端连接到有线网络增强无线信号的强度3 接入点默认使用哪一类身份验证?开放式PSKWEPEAP4请参见图示。

在Linksys 集成路由器的Wireless 菜单选项中,Network Mode 选项Mixed 是什么意思?路由器支持加密和身份验证。

路由器支持有线和无线两种连接。

路由器支持802.11b、802.11g 和802.11n 设备。

路由器支持通过红外和无线电射频连接。

5 接入点可以使用哪两种身份验证方法?(选择两项。

)WEPWPAEAPASCII预共享密钥6 哪项接入点功能允许网络管理员定义可以进入无线网络的数据类型?加密黑客攻击拦截通信过滤MAC 地址过滤身份验证7 下列关于服务集标识符(SSID) 的陈述中,哪两个是正确的?(选择两项。

)标识无线设备所属的WLAN是一个包含32 个字符的字符串,不区分大小写负责确定信号强度同一WLAN 中的所有无线设备必须具有相同的SSID用于加密通过无线网络发送的数据8请参见图示。

在Linksys 集成路由器的Wireless 菜单中,哪个配置选项可用于让附近的客户端知道接入点的存在。

Network ModeNetwork Name (SSID)Radio BandWide ChannelStandard ChannelSSID Broadcast9 下列哪个术语准确描述了为防止黑客读取截取到的数据而进行的无线数据编码?地址过滤身份验证广播加密密码短语编码10 两种WEP 密钥长度分别是多少?(选择两项。

CCNA第二学期第二章考试答案

CCNA第二学期第二章考试答案

以下是针对您未获得满分的试题给出的反馈。

某些交互式试题可能不显示您的答案。

分项分数:1哪个接口是包含用于管理24 个端口以太网交换机的IP 地址的默认位置?正确响应您的响应VLAN 1Fa0/0Fa0/1连接到默认网关的接口VLAN 99此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.1 使用初始设置配置交换机2下列关于使用全双工快速以太网的陈述中,哪三项是正确的?(请选择三项。

)正确响应您的响应通过双向数据流改善了性能。

由于禁用了设备上的冲突检测功能,因此性能得到了改善。

节点以全双工单向数据流运行。

由于网卡可以检测到冲突,因此性能得到了改善。

全双工快速以太网在两个方向上提供100% 的效率。

由于网卡能更快速地处理帧,因此延迟减少了。

此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.2 配置交换机端口3使用mdix auto 配置命令会对交换机上的以太网接口产生什么影响?正确响应您的响应自动检测双工设置自动检测接口速度自动检测铜电缆类型自动将第一个检测到的MAC 地址分配给接口此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.2 配置交换机端口4在Cisco IOS 软件无法加载的情况下,网络管理员需要哪种类型的电缆将PC 与交换机连接才能恢复它?正确响应您的响应同轴电缆控制台电缆交叉电缆直通电缆因为交换机上没有运行Cisco IOS 软件,所以管理员需要使用控制台电缆将PC 连接到交换机控制台端口,比便将来自PC 的软件转移到交换机。

此试题参考以下领域的内容:Routing and Switching Essentials• 2.1.1 使用初始设置配置交换机5在对连接问题进行故障排除时,网络管理员发现交换机端口状态LED 在绿色和琥珀色之间跳转。

CISCO_CCNA网络工程师题库

CISCO_CCNA网络工程师题库

培训大讲堂官方YY 频道:3660mCCNA题库考试代号: 640-802考试时间:英文110+30=140分钟通过分数: 825题库版本: V104.4鸿鹄论坛招募CCNA、CCNP答疑讲师答疑地点:鸿鹄官方YY频道3660鸿鹄大讲堂:bbs.hh010./thread-46172-1-1.htmlCCNA题库战报交流QQ群:144288127 (500人超级群)CCNA题库战报交流区: bbs.hh010./forum-261-1.html1000 G视频教程免费下载:bbs.hh010./forum-228-1.htmlCCNA(640-802)题库V104.4CCNA(640-802)题库V104.4(情人节版)CCNA 题库战报500人超级QQ群 144288127V104系列是官方的终结版本,以后不会再出V105 V106 V108等等CCNA 最新题库/最新战报发布区: bbs.hh010./forum-261-1.html下载官方正版题库、看最新考试战报,请随时关注鸿鹄论坛 bbs.hh010.CCNA考试报名1900,详情请联系鸿鹄全国区十七名客服 QQ 71202306========================================更新容:V104.1修正V104中错误题目,确定经典争议题目答案;V104.2增加拖图题并可完美模拟考试,VCE题库增加中文注释;V104.3针对思科CCNA考试变题,更新考试新增题目93Q,更新V104.2实验题;V104.4增加全文中文注释,汇总V104.3九次更新,删除部分旧题目,为目前最新官方正版题库;2011.8.1 增加每日新题,修订部分错误。

2012.2.14 情人节版增加5道新题,分别是519、520、521、522、523题修改176题、375题、443题、482题答案错误修改59题、88题、453题、107题、270题注释错误增加个别疑难拖图题注释,优化实验题=============================================QUESTION 1When you are logged into a switch, which prompt indicates that you are in privileged mode?(当您登录到交换机,哪种提示表明你在特权模式?)A. %B.C. >D. $E. #Answer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:特权模式就是#提示符QUESTION 2Which command shows system hardware and software version information?(哪些命令显示系统硬件和软件的版本信息?)A. show configurationB. show environmentC. show inventoryD. show platformE. show versionAnswer: ESection: Chapter 4: Introduction to Cisco IOSExplanation/Reference:查看系统的软件和硬件信息使用的命令是show versionQUESTION 3Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802. 1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified.What will happen in this scenario?(思科 Catalyst 交换机 CAT1 和 CAT2 有它们之间的连接使用端口FA0/13。

ccna2答案第五章共10页

ccna2答案第五章共10页

第五章 RIPv1 CCNA2 Exploration: 路由协议和概念(2019-12-15 18:07:13)转载▼标签:杂谈分类: 2010|CCNA2官方试题--路由1 窗体顶端ERouting Chapter 7 - CCNA Exploration: 路由协议和概念(版本 4.0)以下行显示在 show ip route 命令的输出中。

R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0该路由度量的值是什么?3122030120 窗体底端2 窗体顶端下列关于 RIPv1 特性的陈述中,哪两项是正确的?(选择两项。

)它是一种距离矢量路由协议。

它会在路由更新中通告路由的地址和子网掩码。

RIP 消息的数据部分封装在 TCP 数据段中。

RIP 消息的数据部分封装在 UDP 数据段中。

它每 15 秒广播一次更新。

它最多允许路由域中存在 15 台路由器。

窗体底端3 窗体顶端请参见图示。

图中所示的网络运行 RIPv1。

不久前其中添加了192.168.10.0/24 网络,该网络将只包含最终用户。

如果要防止向新网络中的最终用户设备发送 RIPv1 更新,同时允许将此新网络通告给其它路由器,应该在 Router1 上输入什么命令?Router1(config-router)# no router ripRouter1(config-router)# network 192.168.10.0Router1(config-router)# no network 192.168.10.0Router1(config-router)# passive-interface fastethernet 0/0Router1(config-router)# passive-interface serial 0/0/0窗体底端4 窗体顶端请参见图示。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1Which version of NAT allows many hosts inside a private network to simultaneously use a single inside global address for connecting to the Internet?dynamic NATport forwardingPAT*static NAT2What is the group of public IPv4 addresses used on a NAT-enabled router known as?inside local addressesoutside global addressesinside global addresses*outside local addresses3Launch PT Hide and Save PTOpen the PT Activity. Perform the tasks in the activity instructions and then answer the question.What problem is causing PC-A to be unable to communicate with the Internet?The access list used in the NAT process is referencing the wrong subnet.The static route should not reference the interface, but the outside address instead. The NAT interfaces are not correctly assigned.*This router should be configured to use static NAT instead of PAT.The ip nat inside source command refers to the wrong interface.4What is a disadvantage of NAT?There is no end-to-end addressing.*The internal hosts have to use a single public IPv4 address for external communication. The router does not need to alter the checksum of the IPv4 packets.The costs of readdressing hosts can be significant for a publicly addressed network.5Which statement accurately describes dynamic NAT?It provides a mapping of internal host names to IP addresses.It always maps a private IP address to a public IP address.It provides an automated mapping of inside local to inside global IP addresses.*It dynamically provides IP addressing to internal hosts.6When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?All users can access the server.The first user gets disconnected when the seventh user makes the request.The request to the server for the seventh user fails.*No users can access the server.7What is the purpose of port forwarding?Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN.*Port forwarding allows users to reach servers on the Internet that are not using standard port numbers.Port forwarding allows an internal user to reach a service on a public IPv4 address that is located outside a LAN.Port forwarding allows for translating inside local IP addresses to outside local addresses.8Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?R1 should be configured with the command ip nat inside source static 209.165.200.1 192.168.11.11.R1 should be configured with the command ip nat inside source static 209.165.200.200 192.168.11.11.Interface S0/0/0 should be configured with the command ip nat outside.*Interface Fa0/0 should be configured with the command no ip nat inside.9When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?Internet-routable addressesboth private and public IP addressesprivate IP addresses*global public IP addresses10Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?defines which addresses can be translated*defines which addresses are allowed into the routerdefines which addresses are assigned to a NAT pooldefines which addresses are allowed out of the router11A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. What is required to be configured in order for this particular command to be functional?a VLAN named corp to be enabled and active and routed by R1an access list named corp that defines the private addresses that are affected by NATip nat outside to be enabled on the interface that connects to the LAN affected by the NAT an access list numbered 4 that defines the starting and ending public IP addressesa NAT pool named corp that defines the starting and ending public IP addresses*12Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?Access-list 1 is misconfigured.NAT-POOL2 is not bound to ACL 1.*Interface Fa0/0 should be identified as an outside NAT interface.The NAT pool is incorrect.13A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload. Why did the engineer use the overload option?The company needs to have more public IP addresses available to be used on the Internet. The company has a small number of servers that should be accessible by clients from the Internet.The company has more private IP addresses than available public IP addresses.*The company router must throttle or buffer traffic because the processing power of the router is not enough to handle the normal load of external-bound Internet traffic.14Refer to the exhibit. What will be the effect of entering the command that is shown in the exhibit on R2 as part of the dynamic NAT configuration?It will bind NAT-POOL1 with ACL 1.*It will identify an inside NAT interface.It will define a pool of addresses for translation.It will define the source ACL for the external interface.15Which configuration would be appropriate for a small business that has the public IP address of 209.165.200.225/30 assigned to the external interface on the router that connects to the Internet?access-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240ip nat inside source list 1 pool comp overloadaccess-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240ip nat inside source list 1 pool comp overloadip nat inside source static 10.0.0.5 209.165.200.225access-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240ip nat inside source list 1 pool compaccess-list 1 permit 10.0.0.0 0.255.255.255ip nat inside source list 1 interface serial 0/0/0 overload ********16Which type of NAT maps a single inside local address to a single inside global address?dynamicport address translationstatic*overloading17Typically, which network device would be used to perform NAT for a corporate environment?host devicerouter*DHCP serverserverswitch18Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?Use dynamic NAT to provide addresses for the servers.Place all of the servers in their own Class C private subnet.Use DHCP to assign addresses from the pool of Class B addresses.Assign static internal addresses and public external addresses to each of the servers.*19What is a characteristic of unique local addresses?They are designed to improve the security of IPv6 networks.Their implementation depends on ISPs providing the service.They allow sites to be combined without creating any address conflicts.*They are defined in RFC 3927.20Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?static NAT with a NAT poolPAT using an external interface*static NAT with one entrydynamic NAT with a pool of two public IP addresses21Refer to the exhibit. The NAT configuration applied to the router is as follows:ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224 ERtr(config)# ip nat inside source list 1 pool corp overloadERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4ERtr(config)# interface gigabitethernet 0/0ERtr(config-if)# ip nat insideERtr(config-if)# interface serial 0/0/0ERtr(config-if)# ip nat outsideBased on the configuration and the output shown, what can be determined about the NAT status within the organization?Static NAT is working, but dynamic NAT is not.NAT is working.Not enough information is given to determine if both static and dynamic NAT are working.* Dynamic NAT is working, but static NAT is not.22Place the options in the following order:- not scored –step 5step 2step 4step 1step 323What are two required steps to configure PAT? (Choose two.)Define the range of ports to be used.Define a pool of global addresses to be used for overload translation.*Identify the inside interface.*Define a standard access list that allow the outside global addresses to be used. Define a standard access list denying the addresses that should be translated.。

相关文档
最新文档