Search Header Logo

HAHAHAHAHA

Authored by Minase Aoi

Computers

University

Used 8+ times

HAHAHAHAHA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes dynamic NAT?

  • It always maps a private IP address to a public IP address.

  • It provides an automated mapping of inside local to inside global IP addresses.

  • It provides a mapping of internal host names to IP addresses.

  • It dynamically provides IP addressing to internal hosts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? A side effect of NAT is that it hides the inside local IP address of a host from the outside network.

  • False

  • True

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? With NAT overload, each inside local IP address is translated to a unique inside global IP address on a one-for-one basis.

  • True

  • False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? The use of NAT makes end-to-end traceability between source and destination easier.

  • True

  • False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? Tunneling protocols such as IPsec do not work well through NAT.


  • True

  • False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

  • access-list standard VTY
    permit 10.7.0.0 0.0.0.127

  • access-list 5 permit 10.7.0.0 0.0.0.31

  • access-class 5 in

  • ip access-group 5 in

  • access-list 5 deny any

  • ip access-group 5 out

  • access-list 5 permit 10.7.0.0 0.0.0.31

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Consider the configured access list.

R1# show access-lists extended IP access list 100 deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet permit ip any any (15 matches)

What are two characteristics of this access list? (Choose two.)

  • Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.

  • A network administrator would not be able to tell if the access list has been applied to an interface or not.

  • Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telnet to the router that has the IP address 10.1.1.1 assigned.

  • The access list has been applied to an interface.

  • Any device can telnet to the 10.1.2.1 device.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?