單項(xiàng)選擇題Which of the following types of NAT allows multiple private internal IP addresses to use a singlepublic external IP address?()

A.NAT mapping
B.NAT overloading
C.NAT caching
D.Static NAT
E.Dynamic NAT
F.Overlapping NAT


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following characteristics are true assuming you are troubleshooting a networkcurrently enabled for VRRP?(Choose all that apply.)()

A.The network is load balancing among different members of the VRRP group
B.The default hello timers are 1 second
C.The interface IP address is being used as the virtual IP address
D.There are several routers in the group simultaneously forwarding traffic for the group
E.It is a Cisco Proprietary protocol
F.The default hello timers are 3 seconds

2.多項(xiàng)選擇題Which of the following statements are true regarding Layer 3 switches?(Choose all that apply.)()

A.A routed port does not run STP or DTP
B.A routed port is considered to be in a down state if it is not operational at both Layer 1 andLayer 2
C.An SVI is considered to be in a down state if it is not operational at both Layer 1 and Layer 2
D.An SVI is considered to be in a down state only when none of the ports in the correspondingVLAN are active
E.An SVI port does not run 5TP or DTP
F.To create a trunk, an SVI can be logically divided into subinterfaces

3.多項(xiàng)選擇題You are using AutoQoS Enterprise and realize that the results are not what you expected. Whichof the following are possible reasons for AutoQoS not functioning correctly?(Choose all thatapply.)()

A.The interface you configured for AutoQoS is set to half-duplex
B.AutoQoS was configured on only one end of the link
C.The interface you configured for AutoQoS has no IP address
D.The interface’s bandwidth is not correctly configured
E.CEF is not enabled on the interface
F.You enabled AutoQoS on the interface but forgot to enable globally first

4.多項(xiàng)選擇題Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()

A.Spanning Tree Protocol
B.Cabling
C.Frame forwarding
D.Packet forwarding
E.EtherChannel
F.Routing protocols

5.多項(xiàng)選擇題Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()

A.Building schematic
B.IGP community elements
C.Listing of interconnections
D.Physical topology diagram
E.Logical topology diagram
F.Inventory of network equipment

最新試題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:?jiǎn)柎痤}

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:?jiǎn)柎痤}

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項(xiàng)選擇題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:?jiǎn)柎痤}

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:?jiǎn)雾?xiàng)選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項(xiàng)選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:?jiǎn)雾?xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}