网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?()

A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload

B.(config-if) ip nat outside overload

C.(config) ip nat inside source list 1 interface ethernet1 overload

D.(config-if) ip nat inside overload


参考答案

更多 “ Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?() A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB.(config-if) ip nat outside overloadC.(config) ip nat inside source list 1 interface ethernet1 overloadD.(config-if) ip nat inside overload ” 相关考题
考题 Refer to the exhibit. R1 and R2 have been configured to share routing information via EIGRP. What will be the result of the configuration section shown for R2? () A. Any routes learned by R2 from the interface tied to the 172.16.0.0 network will not be advertised to neighbors on the 192.168.2.0 network.B. Only routes learned by R2 from the interface tied to the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.C. Only the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.D. All networks, except the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network .

考题 Refer to the exhibit. Which command would verify if PBR reacts to packets sourced from 172.16.0.0/16?() A. show ip routeB. show policy - mapC. show access - listsD. show route - map

考题 Refer to the exhibit. ROUTE Enterprises has many stub networks in their enterprise network, such as router B and its associated network. EIGRP is to be implemented on router A so that neither the prefix for the S/0/0/0 interface nor the prefixes from router B appear in the routing tables for the router in the enterprise network. Which action will accomplish this goal?()A. Declare router B a stub router using the eigrp stub command.B. Use the passive - interface command for interface Serial0/0/0.C. Use a mask with the network command to exclude interface Serial0/0/0.D. Implement a distribute list to exclude the link prefix from the routi ng updates.

考题 Refer to the exhibit. What three statements are true about the IS - IS configuration?() A.The router is in area 49.0001.0002B.The router acts as a Level 1 - 2 routerC.CLNS routing is enable d for the routerD.The router has a system ID of 0003.0004E.The interfaces have a functional IS - IS configurationF.The network service access point selector (NSEL) byte has a value of 0

考题 Refer to the exhibit. Routers RTA and RTB are running BGP but the session is active. What command needs to be added to esta blish the BGP session? () A. ip route 10.10.10.1 255.255.255.255 s0/0 ip route 10.10.10.1 255.255.255.255 s0/1B. network 10.10.10.0C. no synchronizationD. neighbor 10.10.10.1 next - hop - self

考题 Refer to the exhibit. By default, when RTB passes BGP advertisements from RTA about network 192.168.2.0 to RTC, what address will be listed as the next - hop address? () A. 10.1.1.2B. 192.168.1.49C. 10.1.1.1D. 192.168.1.50

考题 In any NAT (network address translation) configuration, what is the Inside Global IP address?() A. The summarized address for all internal subnetted addresses.B. A private IP address assigned to a host on the inside network.C. A registered address that represents an inside host to an outside network.D. A unique IP address used on an internal networkE. Non of the above

考题 Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

考题 What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

考题 Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()A、As numbers must be changed to match on all the routers.B、Loopback interface must be configured so a DR is elected.C、The no auto-summary command is needed on Router A and Router C.D、Router B needs to have two network statements, one for each connected network.

考题 What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5()。A、It creates a global address pool for all outside NAT transactionsB、It establishes a dynamic address pool for an inside static addressC、It creates dynamic source translations for all inside local PAT transactionsD、It creates a one-to-one mapping between an inside local address and an inside global addressE、It maps one inside source address to a range of outside global addresses

考题 What does the "Inside Global" address represent in the configuration of NAT?()A、the summarized address for all of the internal subnetted addressesB、the MAC address of the router used by inside hosts to connect to the InternetC、a globally unique, private IP address assigned to a host on the inside networkD、a registered address that represents an inside host to an outside network

考题 What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5?()A、It creates a global address pool for all outside NAT transactions.B、It establishes a dynamic address pool for an inside static address.C、It creates dynamic source translations for all inside local PAT transactions.D、It creates a one-to-one mapping between an inside local address and an inside global address.E、It maps one inside source address to a range of outside global addresses.

考题 Refer to the exhibit.   What are three of the basic components of a VoIP network?()A、software voice applicationsB、multipoint control unit (MCU)  C、gatekeeper  D、call agentE、interactive voice response (IVR) systems  F、softphones

考题 What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption. 

考题 In any NAT (network address translation) configuration, what is the Inside Global IP address?()A、The summarized address for all internal subnetted addresses.B、A private IP address assigned to a host on the inside network.C、A registered address that represents an inside host to an outside network.D、A unique IP address used on an internal networkE、Non of the above

考题 多选题Refer to the exhibit. Which two statements are correct? (Choose two.)()AAll six routes will be installed in the routing table.BTwo routes will be installed in the routing table.CFour routes will be installed in the routing table.DAll the routes were redistributed into BGP from an IGP.EAll the routes were originated by BGP with the network command.

考题 单选题Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this RouterD?()A 10.1.1.2B 10.154.154.1C 172.16.5.1D 192.168.5.3

考题 单选题What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5?()A It creates a global address pool for all outside NAT transactions.B It establishes a dynamic address pool for an inside static address.C It creates dynamic source translations for all inside local PAT transactions.D It creates a one-to-one mapping between an inside local address and an inside global address.E It maps one inside source address to a range of outside global addresses.

考题 单选题What are the basic configuration steps to enable IS - IS?()A Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B Configure the net sy stem - id and the network net - id commands under routerisis.C Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.D Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.E Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

考题 多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption

考题 单选题Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()A As numbers must be changed to match on all the routers.B Loopback interface must be configured so a DR is elected.C The no auto-summary command is needed on Router A and Router C.D Router B needs to have two network statements, one for each connected network.

考题 多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

考题 单选题What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5()。A It creates a global address pool for all outside NAT transactionsB It establishes a dynamic address pool for an inside static addressC It creates dynamic source translations for all inside local PAT transactionsD It creates a one-to-one mapping between an inside local address and an inside global addressE It maps one inside source address to a range of outside global addresses

考题 单选题In any NAT (network address translation) configuration, what is the Inside Global IP address?()A The summarized address for all internal subnetted addresses.B A private IP address assigned to a host on the inside network.C A registered address that represents an inside host to an outside network.D A unique IP address used on an internal networkE Non of the above

考题 多选题Refer to the exhibit.   What are three of the basic components of a VoIP network?()Asoftware voice applicationsBmultipoint control unit (MCU)CgatekeeperDcall agentEinteractive voice response (IVR) systemsFsoftphones

考题 单选题Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?()A The network administrator faled to save the configuration.B The configuration register is set to 0x2100.C The boot system flash command is missing from the configuration.D The configuraiton register is set to 0x2102.E The router is configured with the boot system startup command.