HAHAHAHAHA

HAHAHAHAHA

University

52 Qs

quiz-placeholder

Similar activities

UH 1

UH 1

University

50 Qs

2nd C Programming Quiz

2nd C Programming Quiz

University

50 Qs

Tree dan Graph

Tree dan Graph

University

50 Qs

prelim_integ

prelim_integ

University

50 Qs

Aritmatika BinerUNIS

Aritmatika BinerUNIS

University

49 Qs

SOAL LATIHAN SAS BAHASA INGGRIS KELAS IX G SEM 1 TP 2024/2025

SOAL LATIHAN SAS BAHASA INGGRIS KELAS IX G SEM 1 TP 2024/2025

7th Grade - University

50 Qs

PKB - 6

PKB - 6

University

55 Qs

IT INFRA-MIDTERM EXAM

IT INFRA-MIDTERM EXAM

University

50 Qs

HAHAHAHAHA

HAHAHAHAHA

Assessment

Quiz

Computers

University

Medium

Created by

Minase Aoi

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes dynamic NAT?

  • It always maps a private IP address to a public IP address.

  • It provides an automated mapping of inside local to inside global IP addresses.

  • It provides a mapping of internal host names to IP addresses.

  • It dynamically provides IP addressing to internal hosts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? A side effect of NAT is that it hides the inside local IP address of a host from the outside network.

  • False

  • True

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? With NAT overload, each inside local IP address is translated to a unique inside global IP address on a one-for-one basis.

  • True

  • False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The use of NAT makes end-to-end traceability between source and destination easier.

  • True

  • False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? Tunneling protocols such as IPsec do not work well through NAT.


  • True

  • False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

  • access-list standard VTY
    permit 10.7.0.0 0.0.0.127

  • access-list 5 permit 10.7.0.0 0.0.0.31

  • access-class 5 in

  • ip access-group 5 in

  • access-list 5 deny any

  • ip access-group 5 out

  • access-list 5 permit 10.7.0.0 0.0.0.31

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Consider the configured access list.

R1# show access-lists extended IP access list 100 deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet permit ip any any (15 matches)

What are two characteristics of this access list? (Choose two.)

  • Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.

  • A network administrator would not be able to tell if the access list has been applied to an interface or not.

  • Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telnet to the router that has the IP address 10.1.1.1 assigned.

  • The access list has been applied to an interface.

  • Any device can telnet to the 10.1.2.1 device.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?