多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

多选题
Which two are uses of NAT?()
A

enabling network migrations

B

conserving public IP addresses

C

allowing stateful packet inspection

D

preventing unauthorized connections from outside the network


参考解析

解析: 暂无解析

相关考题:

阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the routers network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the routers routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table

A traditional router is better suited than a firewall device for which function? () A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation

Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?() A.NASB.FirewallC.HubD.Bridge

Which two statements about static NAT translations are true?() A. They are always present in the NAT table.B. They allow connection to be initiated from the outside.C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.D. They require no inside or outside interface markings because addresses are statically defined.

What are two benefits of using NAT?() A.NAT protects network security because private networks are not advertised.B.NAT accelerates the routing process because no modifications are made on the packets.C.Dynamic NAT facilitates connections from the outside of the network.D.NAT facilitates end-to-end communication when IPsec is enable.E.NAT eliminates the need to re-address all host that require extemal access.F.NAT conserves addresses through host MAC-level multiplexing.

Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?() A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB.(config-if) ip nat outside overloadC.(config) ip nat inside source list 1 interface ethernet1 overloadD.(config-if) ip nat inside overload

Which two statements about static NAT translations are true?()A、They are always present in the NAT table.B、They allow connection to be initiated from the outside.C、They can be configured with access lists, to allow two or more connections to be initiated from theoutside.D、They require no inside or outside interface markings because addresses are statically defined.

Which two QoS classification and marking statements are true? ()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()A、They are separate from the central site and use NAT to route through the Internet to the Central SiteB、They are part of the VLANs at the Central Site; they are in the same subnetsC、They use public IP Addresses that are routable through the InternetD、They are in separate subnets but are part of the private address space of the network

Which two QoS classification and marking statements are true?()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldC、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation

What are two uses of NAT?()A、conserving public IP addressesB、allowing stateful packet inspectionC、preventing unauthorized connections from outside the networkD、allowing networks with overlapping private address space to communicate

In any NAT (network address translation) configuration, what is the Inside Global IP address?()A、The summarized address for all internal subnetted addresses.B、A private IP address assigned to a host on the inside network.C、A registered address that represents an inside host to an outside network.D、A unique IP address used on an internal networkE、Non of the above

Which two statements about static NAT translations are true?()A、They are always present in the NATt able.B、They allow connection to be initiated from the outside.C、They can be configured with access lists,to allow two or more connections to be initiated from the outside.D、They require no inside or outside interface markings because addresses are statically defined.

Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()A、NASB、FirewallC、HubD、Bridge

Which two are uses of NAT?()A、enabling network migrationsB、conserving public IP addressesC、allowing stateful packet inspectionD、preventing unauthorized connections from outside the network

Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption

多选题Which two statements about static NAT translations are true?()AThey are always present in the NATt able.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.

多选题What are two benefits of using NAT?()ANAT protects network security because privat enetworks are not advertised.BNAT accelerates the routing process because no modifications are made on the packets.CDynamic NAT facilitates connections from the outside of the network.DNAT facilitates end-to-end communication when IPsec is enable.ENAT eliminates the need to re-address all host that require extemal access.FNAT conserves addresses through host MAC-level multiplexing.

多选题What are two uses of NAT?()Aconserving public IP addressesBallowing stateful packet inspectionCpreventing unauthorized connections from outside the networkDallowing networks with overlapping private address space to communicate

多选题Which two QoS classification and marking statements are true? ()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.CIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

单选题Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()AThey are separate from the central site and use NAT to route through the Internet to the Central SiteBThey are part of the VLANs at the Central Site; they are in the same subnetsCThey use public IP Addresses that are routable through the InternetDThey are in separate subnets but are part of the private address space of the network

多选题Which two QoS classification and marking statements are true?()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldCIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists, to allow two or more connections to be initiated from theoutside.DThey require no inside or outside interface markings because addresses are statically defined.

多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.