A.destination address and wildcard mask
B.source address and wildcard mask
C.destination address and subnet mask
D.source address and subnet mask
您可能感興趣的試卷
你可能感興趣的試題
A.NAT protects network security because private networks are not advertised.
B.NAT accelerates the routing process because no modifications are made on the packets.
C.Dynamic NAT facilitates connections from the outside of the network.
D.NAT facilitates end-to-end communication when IPsec is enable.
E.NAT eliminates the need to re-address all host that require extemal access.
F.NAT conserves addresses through host MAC-level multiplexing.
A.Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
B.Addresses are permanently assigned so that the hosts uses the same address at all times.
C.Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.
D.Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
Refer to the exhibit. What statement is true of the configuration for this network?()
A.The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B.Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C.The number 1 referred to in the ip nat inside souce command recerences access-list number 1.
D.ExternalRouter must be configured with static routers to network 172.16.2.0/24
A.a primary route,stored in the routing table
B.a backup route,stored in the routing table
C.a backup route,stored in the topology table
D.a primary route,stored in the topology table
A.show session
B.show cdp neighbors
C.show users
D.show queue
最新試題
What are the Popular destinations for syslog messages to be saved? ()
What level will be trapped if the administrator executes the command ?()
What are three benefits of GLBP?()
In a GLBP network, who is responsible for the arp request?()
Which one of these is a valid HSRP Virtual Mac Address?()
What authentication type is used by SNMPv2?()
Which three statements about the features of SNMPv2 and SNMPv3 are true?()
What are three factors a network administrator must consider before implementing Netflow in the network?()
What parameter can be different on ports within an EtherChannel?()
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()