Which two are uses of NAT?()
第1题:
A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload
B.(config-if) ip nat outside overload
C.(config) ip nat inside source list 1 interface ethernet1 overload
D.(config-if) ip nat inside overload
第2题:
Which two statements about static NAT translations are true?()
第3题:
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()
第4题:
Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()
第5题:
What are two uses of NAT?()
第6题:
Which of these statements is true of clientless end-user devices?()
第7题:
Physical and logical network diagrams are used for which of the following configuration management goals?()
第8题:
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
第9题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?()
第10题:
NAT protects network security because privat enetworks are not advertised.
NAT accelerates the routing process because no modifications are made on the packets.
Dynamic NAT facilitates connections from the outside of the network.
NAT facilitates end-to-end communication when IPsec is enable.
NAT eliminates the need to re-address all host that require extemal access.
NAT conserves addresses through host MAC-level multiplexing.
第11题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists, to allow two or more connections to be initiated from theoutside.
They require no inside or outside interface markings because addresses are statically defined.
第12题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.
第13题:
Which three functions are provided by JUNOS Software for security platforms?()
第14题:
Which two QoS classification and marking statements are true? ()
第15题:
Which two QoS classification and marking statements are true?()
第16题:
A traditional router is better suited than a firewall device for which function?()
第17题:
Which two statements about static NAT translations are true?()
第18题:
Which of the following network appliances can BEST be described as allowing multiple servers toshare requests for a website through the same public IP address?()
第19题:
Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()
第20题:
Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()
第21题:
They are always present in the NATt able.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.
第22题:
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network
allowing networks with overlapping private address space to communicate
第23题:
enabling network migrations
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network