Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SUMMATIVE 2

NETWORKING

QuestionAnswer
1. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) NAT provides a solution to slow down the IPv4 address depletion. NAT introduces problems for some applications that require end-to-end connectivity.
2. A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task? Router# show ip nat translations
3. What are two tasks to perform when configuring static NAT? (Choose two.) Create a mapping between the inside local and outside local addresses. Identify the participating interfaces as inside or outside interfaces.
4. What is a disadvantage of NAT? There is no end-to-end addressing.
5. Refer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address? 209.165.200.225
6. Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1? 1
7. Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.) A standard access list numbered 1 was used as part of the configuration process. Address translation is working. Two types of NAT are enabled.
8. Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server? 209.165.200.245
9. Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented? PAT using an external interface
10. Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1? inside global
11. Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.) A = 10.1.0.13 B = 209.165.201.1
12. What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command? It allows many inside hosts to share one or a few inside global addresses.
13. Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet? 209.165.200.225
14. Refer to the exhibit. The NAT configuration applied to the router is as follows: Based on the configuration and the output shown, what can be determined about the NAT status within the organization? Not enough information is given to determine if both static and dynamic NAT are working.
15. Which situation describes data transmissions over a WAN connection? An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.
16. Which two technologies are categorized as private WAN infrastructures? (Choose two.) Frame Relay MetroE
17. Which network scenario will require the use of a WAN? Employees need to connect to the corporate email server through a VPN while traveling.
18. What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.) SHA MD5
19. What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.) SHA AES
20. Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA? clientless SSL
21. Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit? integrity
22. Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.) clientless SSL VPN client-based IPsec VPN
23. Which is a requirement of a site-to-site VPN? It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
24. What is the function of the Diffie-Hellman algorithm within the IPsec framework? allows peers to exchange shared keys
25. What does NAT overloading use to track multiple internal hosts that use one inside global address? port numbers
26. Question as presented:
27. Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1? 209.165.200.225
28. Which type of VPN uses the public key infrastructure and digital certificates?​ SSL VPN
29. Which two WAN infrastructure services are examples of private connections? (Choose two.) Frame Relay T1/E1
30. Which two statements about the relationship between LANs and WANs are true? (Choose two.) WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​
31. Which statement describes an important characteristic of a site-to-site VPN? It must be statically set up.
32. How is “tunneling” accomplished in a VPN? New headers from one or more VPN protocols encapsulate the original packets.
33. Which statement describes a VPN? VPNs use virtual connections to create a private network through a public network.
34. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is causing PC-A to be unable to communicate with the Internet? The NAT interfaces are not correctly assigned.
35. What type of address is 64.100.190.189? public
36. Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding? IPsec virtual tunnel interface
37. Match the scenario to the WAN solution. has a headquarters (1) require higher download (2) guaranteed bandwidth (3) teleworker (4) multisite college (5) - Frame Relay (1) - DSL (2) - T1 (3) - Cable (4) - MetroE (5)
38. Question as presented: Inside Global (A) Inside Local (B) Outside Global (C) 192.0.2.1 (A) 10.130.5.76 (B) 203.0.113.5 (C)
39. Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1? Interface S0/0/0 should be configured with the command ip nat outside.
40. In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet? outside global
41. Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.) The output is the result of the show ip nat translations command. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.
42. Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations
43. What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? guarantees message integrity
44. What algorithm is used with IPsec to provide data confidentiality? AES
45. Which two technologies provide enterprise-managed VPN solutions? (Choose two.) remote access VPN site-to-site VPN
46. Question as presented:
47. Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?​ The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.
48. What type of address is 10.100.126.126? private
49. Which type of VPN connects using the Transport Layer Security (TLS) feature? SSL VPN
50. Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.) ISR router another ASA
51. Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? GRE
52. What is a disadvantage when both sides of a communication use PAT? End-to-end IPv4 traceability is lost.
53. What two addresses are specified in a static NAT configuration? the inside local and the inside global
54. A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.) leased line Ethernet WAN
55. What type of address is 128.107.240.239? Public
56. Which type of VPN has both Layer 2 and Layer 3 implementations? MPLS VPN
57. Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect? NAT-POOL2 is bound to the wrong ACL
58. Match each component of WAN connection to its description. (Not all options used.) devices that put data on local loop (A) customer devices that pass the data (B) point that is established in a building (C) devices and inside wiring (D) data comm equipment (A) data terminal equipment (B) demarcation point (C) customer premises equipment (D)
59. Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN? GRE over IPsec
60. Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 host send packets (s1) R1 checks (s2) If there is no translation (s3) R1 selects (s4) R1 replaces (s5) host send packets (s1) R1 checks (s2) If there is no translation (s3) R1 selects (s4) R1 replaces (s5)
61. Which type of VPN involves passenger, carrier, and transport protocols? GRE over IPsec
62. Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. s1 - the host sends packets s2 - R1 check the NAT s3 - if there is no translations entry for this IP add s4 - R1 selects an available global address s5 - R1 replaces the address
63. Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?​ The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.
64. What type of address is 10.131.48.7? Private
65. Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces? IPsec virtual tunnel interface
66. Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec? GRE over IPsec
67. What type of address is 10.19.6.7? private
68. What type of address is 64.101.198.197? public
69. What type of address is 64.101.198.107 public
70. What type of address is 10.100.34.34? private
71. What type of address is 192.168.7.126? Private
72. What type of address is 198.133.219.148? public
73. Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.) router another ASA
74. What type of address is 192.168.7.98? private
Created by: user-1838864
Popular Engineering sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards