Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

39. What is true regarding the differences between NAT and PAT?

• PAT uses the word "overload" at the end of the access-list statement to
share a single
registered address.
• Static NAT allows an unregistered address to map to multiple registered
addresses.
• Dynamic NAT allows hosts to receive the same global address each time
external access
is required.
• PAT uses unique source port numbers to distinguish between
translations.
40.
Refer to the exhibit. The graphic shows the output of a command issued on
router RTB.
According to the output, what two statements are true of router RTB?
(Choose two.)
• The router is connected to a router named Boise.
• Router RTB is connected to a Cisco 1841 router.
• Router RTB is directly connected to two other routers.
• The IP address of the router interface connected to router RTB is
192.168.2.6 .
• The RTB router is connected to two Cisco devices by Fast Ethernet links.
41.
Refer to the exhibit. The network administrator uses the command below to
configure a
default route to the ISP network : RTB(config)# ip route 0.0.0.0 0.0.0.0
10.1.1.6 A ping
issued from the ISP is successful to router RTB. However, ping echo
request packets
arrive at a host that is attached to the Fa0/0 interface of RTB, and the
replies do not make
it back to the ISP router. What will fix this problem?
• The ISP must be configured to forward packets from the 192.168.1.0
network.
• The ip route command needs to be edited so that the next hop address is
10.1.1.5.
• The ip route command needs to be edited so that the 192.168.1.1
address is the next hop
address.
• The ip route command should be removed from the RTB router
configuration.
42. A network technician is using a network management station to gather
data about theperformance of devices and links within the ISP. Which
application layer protocol makesthis possible?
• SNMP
• FTP
• DHCP
• SMTP
43. What are two purposes of DNS? (Choose two.)
• to dynamically assign IP addressing information to network hosts
• to simplify the administration of host and default gateway addressing on
client
computers
• to assign TCP port numbers to hosts as part of the data transfer process
• to resolve human-readable domain names to numeric IP addresses
• to replace the static HOSTS file with a more practical dynamic system
44. A hacker attempts to reach confidential information that is stored on a
server inside
the corporate network. A network security solution inspects the entire
packet, determines
that it is a threat, and blocks the packet from entering the inside network.
Which security
measure protected the network?
• an IDS
• an IPS
• a host-based firewall
• Anti-X software
45. How many host addresses may be assigned on each subnetwork when
using the
130.68.0.0 network address with a subnet mask of 255.255.248.0?
• 30
• 256
• 2046
• 2048• 4094• 4096
46. In an IPv4 environment, what information is used by the router to
forward data
packets from one interface of a router to another?
• destination network address
• source network address
• source MAC address
• well known port destination address

47. A small tire retailer requires a low-cost WAN connection to its


headquarters in order
to manage its inventory and process customer sales in real time. Which
WAN connection
type is best suited to its needs?
• Sonet
• T3
• dialup
• DSL
• leased line
48. The command copy tftp running-config has been entered on the router.
What will this
command do?
• copy the configuration in RAM to a server
• copy the configuration file from a server to RAM
• copy the configuration file in NVRAM to RAM
• copy the configuration file in NVRAM to a server
• copy the configuration file from a server to NVRAM
49.
Refer to the exhibit. The network administrator needs to configure the
Fa0/0 interface of
RTB so that hosts from RTA can connect to the server that is attached to
RTB. Which two
commands will the administrator use to accomplish this task? (Choose
two.)
• RTB# ip address 192.168.102.98 255.255.255.248
• RTB(config-if)# ip address 192.168.102.99 255.255.255.252
• RTB(config)# ip address 192.168.102.97 255.255.255.252
• RTB(config)# no shutdown
• RTB(config-if)# no shutdown
•  RTB(config-if)# ip address 192.168.102.97 255.255.255.252
50.

Refer to the exhibit. A NOC technician at an ISP enters the command


shown. What are
two reasons to use this command? (Choose two.)
• to map the path to 192.168.1.7
• to test reachability to 192.168.1.7
• to locate connectivity problems along the route to 192.168.1.7
• to identify the ISPs that interconnect the NOC with the remote host with
the address
192.168.1.7
• to measure the time that packets take to reach 192.168.1.7 and return to
the technician's
workstation

You might also like