Which two are uses of NAT?()A、enabling network migrationsB、conserving public IP addressesC、allowing stateful packet inspectionD、preventing unauthorized connections from outside the network
Which two are uses of NAT?()
- A、enabling network migrations
- B、conserving public IP addresses
- C、allowing stateful packet inspection
- D、preventing unauthorized connections from outside the network
相关考题:
A traditional router is better suited than a firewall device for which function? () A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation
Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?() A.NASB.FirewallC.HubD.Bridge
Which two statements about static NAT translations are true?() A. They are always present in the NAT table.B. They allow connection to be initiated from the outside.C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.D. They require no inside or outside interface markings because addresses are statically defined.
What are two benefits of using NAT?() A.NAT protects network security because private networks are not advertised.B.NAT accelerates the routing process because no modifications are made on the packets.C.Dynamic NAT facilitates connections from the outside of the network.D.NAT facilitates end-to-end communication when IPsec is enable.E.NAT eliminates the need to re-address all host that require extemal access.F.NAT conserves addresses through host MAC-level multiplexing.
Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?() A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB.(config-if) ip nat outside overloadC.(config) ip nat inside source list 1 interface ethernet1 overloadD.(config-if) ip nat inside overload
Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
Which two statements about static NAT translations are true?()A、They are always present in the NAT table.B、They allow connection to be initiated from the outside.C、They can be configured with access lists, to allow two or more connections to be initiated from theoutside.D、They require no inside or outside interface markings because addresses are statically defined.
Which two QoS classification and marking statements are true? ()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()A、They are separate from the central site and use NAT to route through the Internet to the Central SiteB、They are part of the VLANs at the Central Site; they are in the same subnetsC、They use public IP Addresses that are routable through the InternetD、They are in separate subnets but are part of the private address space of the network
Which two QoS classification and marking statements are true?()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldC、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation
What are two uses of NAT?()A、conserving public IP addressesB、allowing stateful packet inspectionC、preventing unauthorized connections from outside the networkD、allowing networks with overlapping private address space to communicate
Which two statements about static NAT translations are true?()A、They are always present in the NATt able.B、They allow connection to be initiated from the outside.C、They can be configured with access lists,to allow two or more connections to be initiated from the outside.D、They require no inside or outside interface markings because addresses are statically defined.
Which of these statements is true of clientless end-user devices?()A、They do not receive unique IP addressesB、RADIUS or LDAP is required in order to assign IP addressesC、They are assigned addresses from the internal DHCP poolD、Their traffic appears to originate from the originating host network
Which of the following network appliances can BEST be described as allowing multiple servers toshare requests for a website through the same public IP address?()A、VPN concentratorB、Content filterC、Load balancerD、Proxy server
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()A、NASB、FirewallC、HubD、Bridge
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.
多选题Which two statements about static NAT translations are true?()AThey are always present in the NATt able.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.
多选题What are two benefits of using NAT?()ANAT protects network security because privat enetworks are not advertised.BNAT accelerates the routing process because no modifications are made on the packets.CDynamic NAT facilitates connections from the outside of the network.DNAT facilitates end-to-end communication when IPsec is enable.ENAT eliminates the need to re-address all host that require extemal access.FNAT conserves addresses through host MAC-level multiplexing.
多选题What are two uses of NAT?()Aconserving public IP addressesBallowing stateful packet inspectionCpreventing unauthorized connections from outside the networkDallowing networks with overlapping private address space to communicate
多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists, to allow two or more connections to be initiated from theoutside.DThey require no inside or outside interface markings because addresses are statically defined.
多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network
多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.