單項(xiàng)選擇題What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5?()

A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()

A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service

2.多項(xiàng)選擇題Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK

3.單項(xiàng)選擇題How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()

A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C.Configure many sub-interfaces on the same subnet.
D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.

4.單項(xiàng)選擇題What should be part of a comprehensive network security plan?()

A.Allow users to develop their own approach to network security.
B.Physically secure network equipment from potential access by unauthorized individuals.
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E.Minimize network overhead by deactivating automatic antivirus client updates.

5.多項(xiàng)選擇題Which three statements are correct about RIP version 2? (Choose three.)()

A.It has the same maximum hop count as version 1.
B.It uses broadcasts for its routing updates.
C.It is a classless routing protocol.
D.It has a lower default administrative distance than RIP version 1.
E.It supports authentication.
F.It does not send the subnet mask in updates.

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項(xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:單項(xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項(xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項(xiàng)選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項(xiàng)選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項(xiàng)選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項(xiàng)選擇題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:單項(xiàng)選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項(xiàng)選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項(xiàng)選擇題