Professional Documents
Culture Documents
PAT Uses Unique Source Port Numbers To Distinguish Between Translations
PAT Uses Unique Source Port Numbers To Distinguish Between Translations
• PAT uses the word "overload" at the end of the access-list statement to
share a single
registered address.
• Static NAT allows an unregistered address to map to multiple registered
addresses.
• Dynamic NAT allows hosts to receive the same global address each time
external access
is required.
• PAT uses unique source port numbers to distinguish between
translations.
40.
Refer to the exhibit. The graphic shows the output of a command issued on
router RTB.
According to the output, what two statements are true of router RTB?
(Choose two.)
• The router is connected to a router named Boise.
• Router RTB is connected to a Cisco 1841 router.
• Router RTB is directly connected to two other routers.
• The IP address of the router interface connected to router RTB is
192.168.2.6 .
• The RTB router is connected to two Cisco devices by Fast Ethernet links.
41.
Refer to the exhibit. The network administrator uses the command below to
configure a
default route to the ISP network : RTB(config)# ip route 0.0.0.0 0.0.0.0
10.1.1.6 A ping
issued from the ISP is successful to router RTB. However, ping echo
request packets
arrive at a host that is attached to the Fa0/0 interface of RTB, and the
replies do not make
it back to the ISP router. What will fix this problem?
• The ISP must be configured to forward packets from the 192.168.1.0
network.
• The ip route command needs to be edited so that the next hop address is
10.1.1.5.
• The ip route command needs to be edited so that the 192.168.1.1
address is the next hop
address.
• The ip route command should be removed from the RTB router
configuration.
42. A network technician is using a network management station to gather
data about theperformance of devices and links within the ISP. Which
application layer protocol makesthis possible?
• SNMP
• FTP
• DHCP
• SMTP
43. What are two purposes of DNS? (Choose two.)
• to dynamically assign IP addressing information to network hosts
• to simplify the administration of host and default gateway addressing on
client
computers
• to assign TCP port numbers to hosts as part of the data transfer process
• to resolve human-readable domain names to numeric IP addresses
• to replace the static HOSTS file with a more practical dynamic system
44. A hacker attempts to reach confidential information that is stored on a
server inside
the corporate network. A network security solution inspects the entire
packet, determines
that it is a threat, and blocks the packet from entering the inside network.
Which security
measure protected the network?
• an IDS
• an IPS
• a host-based firewall
• Anti-X software
45. How many host addresses may be assigned on each subnetwork when
using the
130.68.0.0 network address with a subnet mask of 255.255.248.0?
• 30
• 256
• 2046
• 2048• 4094• 4096
46. In an IPv4 environment, what information is used by the router to
forward data
packets from one interface of a router to another?
• destination network address
• source network address
• source MAC address
• well known port destination address