Use the custom application feature.
Configure static NAT for the host.
Use port address translation (PAT).
Use the address-persistent option.
第1题:
A. interface-based source NAT
B. source NAT with address shifting
C. source NAT using static source pool
D. interface-based source NAT without PAT
E. source NAT with address shifting and PAT
第2题:
A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address
第3题:
Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()
第4题:
Which three methods of source NAT does the Junos OS support?() (Choose three.)
第5题:
Which three methods of source NAT does JUNOS Software support?()
第6题:
Which of one the following fields is contained within an IEEE Ethernet frame header?()
第7题:
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
第8题:
You are a network administrator of your network. You want to install Windows 2000 professional on 100 computers from a central location. You want to copy a customized application with theinstallation process to all the 100 computers. What should you do to copy that application during the installation process to the computers.()
第9题:
from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
第10题:
The host needs to open the telnet port.
The host needs a route for the translated address.
The administrator must use a proxy-arp policy for the translated address.
The administrator must use a security policy, which will allow communication between the zones.
第11题:
interface-based source NAT
source NAT with address shifting
source NAT using static source pool
interface-based source NAT without PAT
source NAT with address shifting and PAT
第12题:
interface-based source NAT
source NAT with address shifting
source NAT using static source pool
interface-based source NAT without PAT
source NAT with address shifting and PAT
第13题:
Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level of activity.Which items should the administrator monitor using performance monitoring tools?()
A. Page File
B. Disk Utilization
C. System Temperature
D. Processor Utilization
E. Network Utilization
第14题:
Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level ofactivity. Which items should the administrator monitor using performance monitoring tools? ()
第15题:
Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()
第16题:
Which statement describes the behavior of source NAT with address shifting?()
第17题:
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
第18题:
An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()
第19题:
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
第20题:
Configure port Fa0/1 to accept connections only from the static IP address of the server.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
第21题:
Source NAT with address shifting translates both the source IP address and the source port of a packet.
Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.
Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.
Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.
第22题:
source NAT with address shifting
pool-based source NAT
static destination NAT
pool-based destination NAT
第23题:
Configure port Fa0/1 to accept connections only from the static IP address of the server.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.