多选题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address

题目
多选题
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
A

Use the custom application feature.

B

Configure static NAT for the host.

C

Use port address translation (PAT).

D

Use the address-persistent option.


相似考题

3.A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

更多“多选题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address ”相关问题
  • 第1题:

    Which three methods of source NAT does the Junos OS support?() (Choose three.)

    A. interface-based source NAT

    B. source NAT with address shifting

    C. source NAT using static source pool

    D. interface-based source NAT without PAT

    E. source NAT with address shifting and PAT


    参考答案:A, B, C

  • 第2题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    A. source and destination MAC address

    B. source MAC address and destination network address only

    C. source and destination network address only

    D. source network address and destination MAC address

    E. source and destination MAC address and source and destination network address


    参考答案:A

  • 第3题:

    Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()

    • A、source NAT with address shifting
    • B、pool-based source NAT
    • C、static destination NAT
    • D、pool-based destination NAT

    正确答案:D

  • 第4题:

    Which three methods of source NAT does the Junos OS support?() (Choose three.)

    • A、interface-based source NAT
    • B、source NAT with address shifting
    • C、source NAT using static source pool
    • D、interface-based source NAT without PAT
    • E、source NAT with address shifting and PAT

    正确答案:A,B,C

  • 第5题:

    Which three methods of source NAT does JUNOS Software support?()

    • A、interface-based source NAT
    • B、source NAT with address shifting
    • C、source NAT using static source pool
    • D、interface-based source NAT without PAT
    • E、source NAT with address shifting and PAT

    正确答案:A,B,C

  • 第6题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    • A、source and destination MAC address
    • B、source MAC address and destination network address only
    • C、source and destination network address only
    • D、source network address and destination MAC address
    • E、source and destination MAC address and source and destination network address

    正确答案:A

  • 第7题:

    A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()

    • A、The host needs to open the telnet port.
    • B、The host needs a route for the translated address.
    • C、The administrator must use a proxy-arp policy for the translated address.
    • D、The administrator must use a security policy, which will allow communication between the zones.

    正确答案:C

  • 第8题:

    You are a network administrator of your network. You want to install Windows 2000 professional on 100 computers from a central location. You want to copy a customized application with theinstallation process to all the 100 computers.  What should you do to copy that application during the installation process to the computers.()

    • A、 It cannot be done.
    • B、 Copy the application to the temp folder of the distribution server.
    • C、 Create a folder named $OEM$ as a sub folder in the distribution folder of  source files.
    • D、 Create a folder named $COPYDIR$ as a sub folder in the distribution folder of source files.

    正确答案:C

  • 第9题:

    单选题
    A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
    A

    from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    B

    from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    C

    from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }

    D

    from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
    A

    The host needs to open the telnet port.

    B

    The host needs a route for the translated address.

    C

    The administrator must use a proxy-arp policy for the translated address.

    D

    The administrator must use a security policy, which will allow communication between the zones.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    Which three methods of source NAT does the Junos OS support?() (Choose three.)
    A

    interface-based source NAT

    B

    source NAT with address shifting

    C

    source NAT using static source pool

    D

    interface-based source NAT without PAT

    E

    source NAT with address shifting and PAT


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three methods of source NAT does JUNOS Software support?()
    A

    interface-based source NAT

    B

    source NAT with address shifting

    C

    source NAT using static source pool

    D

    interface-based source NAT without PAT

    E

    source NAT with address shifting and PAT


    正确答案: A,B,C
    解析: 暂无解析

  • 第13题:

    Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level of activity.Which items should the administrator monitor using performance monitoring tools?()

    A. Page File

    B. Disk Utilization

    C. System Temperature

    D. Processor Utilization

    E. Network Utilization


    参考答案:A, B

  • 第14题:

    Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level ofactivity.  Which items should the administrator monitor using performance monitoring tools? ()

    • A、 Page File
    • B、 Disk Utilization
    • C、 System Temperature
    • D、 Processor Utilization
    • E、 Network Utilization

    正确答案:A,B

  • 第15题:

    Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()

    • A、source NAT with address shifting
    • B、pool-based source NAT
    • C、static destination NAT
    • D、pool-based destination NAT

    正确答案:D

  • 第16题:

    Which statement describes the behavior of source NAT with address shifting?()

    • A、Source NAT with address shifting translates both the source IP address and the source port of a packet.
    • B、Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.
    • C、Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.
    • D、Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.

    正确答案:B

  • 第17题:

    A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()

    • A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
    • B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
    • C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
    • D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    正确答案:B

  • 第18题:

    An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()

    • A、Log the administrator password used
    • B、Test the air temperature
    • C、Update the network diagram
    • D、Review the evacuation procedures

    正确答案:C

  • 第19题:

    A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)

    • A、Use the custom application feature.
    • B、Configure static NAT for the host.
    • C、Use port address translation (PAT).
    • D、Use the address-persistent option.

    正确答案:B,D

  • 第20题:

    多选题
    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。
    A

    Configure port Fa0/1 to accept connections only from the static IP address of the server.

    B

    Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

    C

    Configure the MAC address of the server as a static entry associated with port Fa0/1.

    D

    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

    E

    Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

    F

    Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


    正确答案: A,F
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement describes the behavior of source NAT with address shifting?()
    A

    Source NAT with address shifting translates both the source IP address and the source port of a packet.

    B

    Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.

    C

    Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.

    D

    Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()
    A

    source NAT with address shifting

    B

    pool-based source NAT

    C

    static destination NAT

    D

    pool-based destination NAT


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
    A

    Configure port Fa0/1 to accept connections only from the static IP address of the server.

    B

    Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

    C

    Configure the MAC address of the server as a static entry associated with port Fa0/1.

    D

    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

    E

    Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

    F

    Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


    正确答案: A,C
    解析: 暂无解析