Network Address Translation1. Which of the following summarized subnets represent routes that could have been created for CIDR’s goal to reduce the size of Internet routing tables? Show
a. 10.0.0.0 255.255.255.0 b. 10.1.0.0 255.255.0.0 c. 200.1.1.0 255.255.255.0 d. 200.1.0.0 255.255.0.0 2. Which of the following are not private addresses according to RFC 1918? (Choose two answers.) a. 172.31.1.1 b. 172.33.1.1 c. 10.255.1.1 d. 10.1.255.1 e. 191.168.1.1 3. With static NAT, performing translation for inside addresses only, what causes NAT table entries to be created? a. The first packet from the inside network to the outside network b. The first packet from the outside network to the inside network c. Configuration using the ip nat inside source command d. Configuration using the ip nat outside source command 4. With dynamic NAT, performing translation for inside addresses only, what causes NAT table entries to be created? a. The first packet from the inside network to the outside network b. The first packet from the outside network to the inside network c. Configuration using the ip nat inside source command d. Configuration using the ip nat outside source command 5. NAT has been configured to translate source addresses of packets for the inside part of the network, but only for some hosts as identified by an access control list. Which of the following commands indirectly identifies the hosts? a. ip nat inside source list 1 pool barney b. ip nat pool barney 200.1.1.1 200.1.1.254 netmask 255.255.255.0 c. ip nat inside d. ip nat inside 200.1.1.1 200.1.1.2 6. Examine the following configuration commands:
--If the configuration is intended to enable source NAT overload, which of the following commands could be useful to complete the configuration? (Choose two answers.)-- a. The ip nat outside command b. The ip nat pat command c. The overload keyword d. The ip nat pool command 7. Examine the following
--Users are complaining about not being able to reach the Internet. Which of the following is the most likely cause?-- a. The problem is not related to NAT, based on the information in the command output. b. The NAT pool does not have enough entries to satisfy all requests. c. Standard ACL 1 cannot be used; an extended ACL must be used. d. The command output does not supply enough information to identify the problem. Hierarchical Navigation
What is the command for IP access list 101 to an interface?Explanation: To apply an access list, the proper command is ip access-group 101 in. 3.
Which of the following access list commands will restrict telnet access to the router?Which of the following series of commands will restrict Telnet access to the router? Explanation: Telnet access to the router is restricted by using either a standard or extended IP access list inbound on the VTY lines of the router. The command access-class is used to apply the access list to the VTY lines.
What are the show commands related to access lists?Access List Commands. clear access-list ipv4.. clear access-list ipv6.. copy access-list ipv4.. copy access-list ipv6.. deny (IPv4). deny (IPv6). ipv4 access-group.. ipv4 access-list.. Which of the following options are used in standard access list?Standard access-list uses the range 1-99 and extended range 1300-1999. Standard access-list is implemented using source IP address only. If numbered with standard Access-list is used then remember rules can't be deleted. If one of the rules is deleted then the whole access list will be deleted.
|