多項(xiàng)選擇題What are two benefits of using NAT?()

A. NAT protects network security because private networks are not advertised.
B. NAT accelerates the routing process because no modifications are made on the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require extemal access.
F. NAT conserves addresses through host MAC-level multiplexing.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

A. SW1#show swithport port-security interface FastEthernet 0/12
B. SW1# show swithport port-secure interface FastEthernet 0/12
C. SW1# show port-secure interface FastEthernet 0/12
D. SW1#show running-config
E. SW1#show port-security interface FastEthernet 0/12

2.多項(xiàng)選擇題In an Ethernet network, under what two scenarios can devices transmit?()

A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

3.多項(xiàng)選擇題By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()

A. Create an additional ACL to block the access to VLAN 1.
B. Move the management VLAN to something other than default.
C. Move all ports to another VLAN and deactivate the default VLAN.
D. Limit the access in the switch using port security configuration.
E. Use static VLAN in trunks and access ports to restrict connections.
F. Shutdown all unused ports in the Catalyst switch.

4.多項(xiàng)選擇題Which of the following correctly describe steps in the OSI data encapsulation process?()

A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

5.多項(xiàng)選擇題Which three of these statements regarding 802.1Q trunking are correct?()

A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends.

最新試題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:?jiǎn)雾?xiàng)選擇題

What is the default administrative distance of OSPF?()

題型:?jiǎn)雾?xiàng)選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model dose PPP perform?()

題型:?jiǎn)雾?xiàng)選擇題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:?jiǎn)雾?xiàng)選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:?jiǎn)雾?xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:?jiǎn)雾?xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:?jiǎn)雾?xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:?jiǎn)雾?xiàng)選擇題