0% found this document useful (0 votes)
163 views38 pages

CCNA 3 v7 Modules 6 - 8: WAN Concepts Exam Answers

The document provides answers to multiple choice questions about WAN concepts and NAT. It includes explanations for each answer. NAT allows sharing of public IP addresses and improves IPv4 address utilization by mapping private to public addresses, but it introduces problems for some applications that require end-to-end connectivity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views38 pages

CCNA 3 v7 Modules 6 - 8: WAN Concepts Exam Answers

The document provides answers to multiple choice questions about WAN concepts and NAT. It includes explanations for each answer. NAT allows sharing of public IP addresses and improves IPv4 address utilization by mapping private to public addresses, but it introduces problems for some applications that require end-to-end connectivity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

CCNA 3 v7 Modules 6 – 8: WAN Concepts Exam

Answers
 Dec 22, 2019  Last updated on: Apr 14, 2020  CCNA v7 Course #3  15
Comments
Share TweetSharePin itReddit

How to find: Press “Ctrl + F” in the browser and fill in


whatever wording is in the question to find that
question/answer.
NOTE: If you have the new question on this test, please
comment Question and Multiple-Choice list in form below
this article. We will update answers for you in the shortest
time. Thank you! We truly value your contribution to the
website.

1. Which two statements accurately describe an advantage


or a disadvantage when deploying NAT for IPv4 in a
network? (Choose two.)
 NAT improves packet handling.
 NAT adds authentication capability to IPv4.
 NAT will impact negatively on switch performance.
 NAT causes routing tables to include more information.
 NAT provides a solution to slow down the IPv4 address
depletion.
 NAT introduces problems for some applications that
require end-to-end connectivity.
2. A network administrator wants to examine the active
NAT translations on a border router. Which command would
perform the task?
 Router# show ip nat translations
 Router# show ip nat statistics
 Router# clear ip nat translations
 Router# debug ip nat translations
3. What are two tasks to perform when configuring static
NAT? (Choose two.)
 Configure a NAT pool.
 Create a mapping between the inside local and outside
local addresses.
 Identify the participating interfaces as inside or
outside interfaces.
 Define the inside global address on the server
 Define the outside global address.
4. What is a disadvantage of NAT?
 There is no end-to-end addressing.
 The router does not need to alter the checksum of the
IPv4 packets.
 The internal hosts have to use a single public IPv4
address for external communication.
 The costs of readdressing hosts can be significant for a
publicly addressed network.
5. Refer to the exhibit. From the perspective of R1, the NAT
router, which address is the inside global address?

 192.168.0.10
 192.168.0.1
 209.165.200.225
 209.165.200.254
Explanation: There are four types of addresses in NAT
terminology.
Inside local address
Inside global address
Outside local address
Outside global address
The inside global address of PC1 is the address that the ISP
sees as the source address of packets, which in this example
is the IP address on the serial interface of R1,
209.165.200.224.
6. Refer to the exhibit. Given the commands as shown, how
many hosts on the internal LAN off R1 can have
simultaneous NAT translations on R1?

 244
 10
 1
 255
Explanation: The NAT configuration on R1 is static NAT
which translates a single inside IP address, 192.168.0.10 into
a single public IP address, 209.165.200.255. If more hosts
need translation, then a NAT pool of inside global address or
overloading should be configured.
7. Refer to the exhibit. A network administrator has just
configured address translation and is verifying the
configuration. What three things can the administrator
verify? (Choose three.)
 A standard access list numbered 1 was used as part of
the configuration process.
 Three addresses from the NAT pool are being used by
hosts.
 Address translation is working.
 One port on the router is not participating in the address
translation.
 The name of the NAT pool is refCount.
 Two types of NAT are enabled.
Explanation: The show ip nat statistics, show ip nat
translations, and debug ip nat commands are useful in
determining if NAT is working and and also useful in
troubleshooting problems that are associated with NAT. NAT
is working, as shown by the hits and misses count. Because
there are four misses, a problem might be evident. The
standard access list numbered 1 is being used and the
translation pool is named NAT as evidenced by the last line of
the output. Both static NAT and NAT overload are used as
seen in the Total translations line.
8. Refer to the exhibit. NAT is configured on RT1 and RT2.
The PC is sending a request to the web server. What IPv4
address is the source IP address in the packet between RT2
and the web server?
 192.168.1.5
 203.0.113.10
 172.16.1.254
 172.16.1.10
 209.165.200.245
 192.0.2.2
Explanation: Because the packet is between RT2 and the
web server, the source IP address is the inside global
address of PC, 209.165.200.245.
9. Refer to the exhibit. Based on the output that is shown,
what type of NAT has been implemented?

 dynamic NAT with a pool of two public IP addresses


 PAT using an external interface
 static NAT with a NAT pool
 static NAT with one entry
Explanation: The output shows that there are two inside
global addresses that are the same but that have different
port numbers. The only time port numbers are displayed is
when PAT is being used. The same output would be indicative
of PAT that uses an address pool. PAT with an address pool is
appropriate when more than 4,000 simultaneous translations
are needed by the company.
10. Refer to the exhibit. From the perspective of users
behind the NAT router, what type of NAT address is
209.165.201.1?

 inside global
 outside global
 outside local
 inside local
Explanation: From the perspective of users behind NAT,
inside global addresses are used by external users to reach
internal hosts. Inside local addresses are the addresses
assigned to internal hosts. Outside global addresses are the
addresses of destinations on the external network. Outside
local addresses are the actual private addresses of
destination hosts behind other NAT devices.
11. Refer to the exhibit. Static NAT is being configured to
allow PC 1 access to the web server on the internal
network. What two addresses are needed in place of A and
B to complete the static NAT configuration? (Choose two.)
 A = 209.165.201.2
 A = 10.1.0.13
 B = 209.165.201.7
 B = 10.0.254.5
 B = 209.165.201.1
Explanation: Static NAT is a one-to-one mapping between an
inside local address and an inside global address. By using
static NAT, external devices can initiate connections to
internal devices by using the inside global addresses. The
NAT devices will translate the inside global address to the
inside local address of the target host.
12. What is the purpose of the overload keyword in the ip
nat inside source list 1 pool NAT_POOL overload command?
 It allows many inside hosts to share one or a few
inside global addresses.
 It allows a list of internal hosts to communicate with a
specific group of external hosts.
 It allows external hosts to initiate sessions with internal
hosts.
 It allows a pool of inside global addresses to be used by
internal hosts.
Explanation: Dynamic NAT uses a pool of inside global
addresses that are assigned to outgoing sessions. If there are
more internal hosts than public addresses in the pool, then an
administrator can enable port address translation with the
addition of the overload keyword. With port address
translation, many internal hosts can share a single inside
global address because the NAT device will track the
individual sessions by Layer 4 port number.
13. Refer to the exhibit. Which source address is being
used by router R1 for packets being forwarded to the
Internet?

 10.6.15.2
 209.165.202.141
 198.51.100.3
 209.165.200.225
Explanation: The source address for packets forwarded by
the router to the Internet will be the inside global address of
209.165.200.225. This is the address that the internal
addresses from the 10.6.15.0 network will be translated to by
NAT.
14. Refer to the exhibit. The NAT configuration applied to
the router is as follows:

ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255

ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask


255.255.255.224

ERtr(config)# ip nat inside source list 1 pool corp overload

ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4


ERtr(config)# interface gigabitethernet 0/0

ERtr(config-if)# ip nat inside

ERtr(config-if)# interface serial 0/0/0

ERtr(config-if)# ip nat outside

Based on the configuration and the output shown, what can


be determined about the NAT status within the
organization?

 Static NAT is working, but dynamic NAT is not.


 Dynamic NAT is working, but static NAT is not.
 Not enough information is given to determine if both
static and dynamic NAT are working.
 NAT is working.
Explanation: There is not enough information given because
the router might not be attached to the network yet, the
interfaces might not have IP addresses assigned yet, or the
command could have been issued in the middle of the night.
The output does match the given configuration, so no
typographical errors were made when the NAT commands
were entered.
15. Which situation describes data transmissions over a
WAN connection?
 A network administrator in the office remotely accesses
a web server that is located in the data center at the edge
of the campus.
 A manager sends an email to all employees in the
department with offices that are located in several
buildings.
 An employee prints a file through a networked printer
that is located in another building.
 An employee shares a database file with a co-worker
who is located in a branch office on the other side of the
city.
Explanation: When two offices across a city are
communicating , it is most likely that the data transmissions
are over some type of WAN connection. Data communications
within a campus are typically over LAN connections.
16. Which two technologies are categorized as private WAN
infrastructures? (Choose two.)
 Frame Relay
 VPN
 MetroE
 DSL
 cable
Explanation: Private WAN technologies include leased lines,
dialup, ISDN, Frame Relay, ATM, Ethernet WAN (an example
is MetroE), MPLS, and VSAT.
17. Which network scenario will require the use of a WAN?
 Employees need to connect to the corporate email
server through a VPN while traveling.
 Employees need to access web pages that are hosted
on the corporate web servers in the DMZ within their
building.
 Employee workstations need to obtain dynamically
assigned IP addresses.
 Employees in the branch office need to share files with
the headquarters office that is located in a separate
building on the same campus network.
Explanation: When traveling employees need to connect to a
corporate email server through a WAN connection, the VPN
will create a secure tunnel between an employee laptop and
the corporate network over the WAN connection. Obtaining
dynamic IP addresses through DHCP is a function of LAN
communication. Sharing files among separate buildings on a
corporate campus is accomplished through the LAN
infrastructure. A DMZ is a protected network inside the
corporate LAN infrastructure.
18. What are two hashing algorithms used with IPsec AH to
guarantee authenticity? (Choose two.)
 SHA
 RSA
 DH
 MD5
 AES
Explanation: The IPsec framework uses various protocols
and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. Two popular
algorithms used to ensure that data is not intercepted and
modified (data integrity and authenticity) are MD5 and SHA.
19. What two algorithms can be part of an IPsec policy to
provide encryption and hashing to protect interesting
traffic? (Choose two.)
 SHA
 RSA
 AES
 DH
 PSK
Explanation: The IPsec framework uses various protocols
and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. Two algorithms
that can be used within an IPsec policy to protect interesting
traffic are AES, which is an encryption protocol, and SHA,
which is a hashing algorithm.
20. Which VPN solution allows the use of a web browser to
establish a secure, remote-access VPN tunnel to the ASA?
 client-based SSL
 site-to-site using an ACL
 clientless SSL
 site-to-site using a preshared key
Explanation: When a web browser is used to securely
access the corporate network, the browser must use a
secure version of HTTP to provide SSL encryption. A VPN
client is not required to be installed on the remote host, so a
clientless SSL connection is used.
21. Which IPsec security function provides assurance that
the data received via a VPN has not been modified in
transit?
 integrity
 authentication
 confidentiality
 secure key exchange
Explanation: Integrity is a function of IPsec and ensures
data arrives unchanged at the destination through the use of
a hash algorithm. Confidentiality is a function of IPsec and
utilizes encryption to protect data transfers with a key.
Authentication is a function of IPsec and provides specific
access to users and devices with valid authentication
factors. Secure key exchange is a function of IPsec and
allows two peers to maintain their private key confidentiality
while sharing their public key.
22. Which two types of VPNs are examples of enterprise-
managed remote access VPNs? (Choose two.)
 clientless SSL VPN
 client-based IPsec VPN
 IPsec VPN
 IPsec Virtual Tunnel Interface VPN
 GRE over IPsec VPN
Explanation: Enterprise managed VPNs can be deployed in
two configurations:
 Remote Access VPN – This VPN is created dynamically
when required to establish a secure connection between a
client and a VPN server. Remote access VPNs include
client-based IPsec VPNs and clientless SSL VPNs.
 Site-to-site VPN – This VPN is created when
interconnecting devices are preconfigured with information
to establish a secure tunnel. VPN traffic is encrypted only
between the interconnecting devices, and internal hosts
have no knowledge that a VPN is used. Site-to-site VPNs
include IPsec, GRE over IPsec, Cisco Dynamic Multipoint
(DMVPN), and IPsec Virtual Tunnel Interface (VTI) VPNs.
23. Which is a requirement of a site-to-site VPN?
 It requires hosts to use VPN client software to
encapsulate traffic.
 It requires the placement of a VPN server at the edge of
the company network.
 It requires a VPN gateway at each end of the tunnel to
encrypt and decrypt traffic.
 It requires a client/server architecture.
Explanation: Site-to-site VPNs are static and are used to
connect entire networks. Hosts have no knowledge of the
VPN and send TCP/IP traffic to VPN gateways. The VPN
gateway is responsible for encapsulating the traffic and
forwarding it through the VPN tunnel to a peer gateway at the
other end which decapsulates the traffic.
24. What is the function of the Diffie-Hellman algorithm
within the IPsec framework?
 guarantees message integrity
 allows peers to exchange shared keys
 provides authentication
 provides strong data encryption
Explanation: The IPsec framework uses various protocols
and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. DH (Diffie-Hellman)
is an algorithm used for key exchange. DH is a public key
exchange method that allows two IPsec peers to establish a
shared secret key over an insecure channel.
25. What does NAT overloading use to track multiple
internal hosts that use one inside global address?
 port numbers
 IP addresses
 autonomous system numbers
 MAC addresses
Explanation: NAT overloading, also known as Port Address
Translation (PAT), uses port numbers to differentiate
between multiple internal hosts.
26. Question as presented:

Explanation: The inside local address is the private IP


address of the source or the PC in this instance. The inside
global address is the translated address of the source or the
address as seen by the outside device. Since the PC is using
the outside address of the R1 router, the inside global
address is 192.0.2.1. The outside addressing is simply the
address of the server or 203.0.113.5.
27. Refer to the exhibit. R1 is configured for static NAT.
What IP address will Internet hosts use to reach PC1?
 192.168.0.1
 192.168.0.10
 209.165.201.1
 209.165.200.225
Explanation: In static NAT a single inside local address, in
this case 192.168.0.10, will be mapped to a single inside
global address, in this case 209.165.200.225. Internet hosts
will send packets to PC1 and use as a destination address
the inside global address 209.165.200.225.
28. Refer to the exhibit. A network administrator is viewing
the output from the command show ip nat translations.
Which statement correctly describes the NAT translation
that is occurring on router RT2?
 The traffic from a source IPv4 address of
192.168.254.253 is being translated to 192.0.2.88 by
means of static NAT.
 The traffic from a source IPv4 address of 192.0.2.88 is
being translated by router RT2 to reach a destination IPv4
address of 192.168.254.253.
 The traffic from a source IPv4 public address that
originates traffic on the internet would be able to reach
private internal IPv4 addresses.
 The traffic from a source IPv4 address of 192.168.2.20 is
being translated by router RT2 to reach a destination IPv4
address of 192.0.2.254.
Explanation: Because no outside local or outside global
address is referenced, the traffic from a source IPv4 address
of 192.168.254.253 is being translated to 192.0.2.88 by using
static NAT. In the output from the command show ip nat
translations, the inside local IP address of 192.168.2.20 is
being translated into an outside IP address of 192.0.2.254 so
that the traffic can cross the public network. A public IPv4
device can connect to the private IPv4 device
192.168.254.253 by targeting the destination IPv4 address of
192.0.2.88.
29. Which two WAN infrastructure services are examples of
private connections? (Choose two.)
 cable
 DSL
 Frame Relay
 T1/E1
 wireless
Explanation: Private WANs can use T1/E1, T3/E3, PSTN,
ISDN, Metro Ethernet, MPLS, Frame Relay, ATM, or VSAT
technology.
30. Which two statements about the relationship between
LANs and WANs are true? (Choose two.)
 Both LANs and WANs connect end devices.
 WANs are typically operated through multiple ISPs,
but LANs are typically operated by single organizations or
individuals.
 WANs must be publicly-owned, but LANs can be owned
by either public or private entities.
 WANs connect LANs at slower speed bandwidth than
LANs connect their internal end devices.
 LANs connect multiple WANs together.
Explanation: Although LANs and WANs can employ the same
network media and intermediary devices, they serve very
different areas and purposes. The administrative and
geographical scope of a WAN is larger than that of a LAN.
Bandwidth speeds are slower on WANs because of their
increased complexity. The Internet is a network of networks,
which can function under either public or private
management.
31. Which statement describes an important characteristic
of a site-to-site VPN?
 It must be statically set up.
 It is ideally suited for use by mobile workers.
 It requires using a VPN client on the host PC.
 After the initial connection is established, it can
dynamically change connection information.
 It is commonly implemented over dialup and cable
modem networks.
Explanation: A site-to-site VPN is created between the
network devices of two separate networks. The VPN is static
and stays established. The internal hosts of the two networks
have no knowledge of the VPN.
32. How is “tunneling” accomplished in a VPN?
 New headers from one or more VPN protocols
encapsulate the original packets.
 All packets between two hosts are assigned to a single
physical medium to ensure that the packets are kept
private.
 Packets are disguised to look like other types of traffic
so that they will be ignored by potential attackers.
 A dedicated circuit is established between the source
and destination devices for the duration of the connection.
Explanation: Packets in a VPN are encapsulated with the
headers from one or more VPN protocols before being sent
across the third party network. This is referred to as
“tunneling”. These outer headers can be used to route the
packets, authenticate the source, and prevent unauthorized
users from reading the contents of the packets.
33. Which statement describes a VPN?
 VPNs use open source virtualization software to create
the tunnel through the Internet.
 VPNs use logical connections to create public networks
through the Internet.
 VPNs use dedicated physical connections to transfer
data between remote users.
 VPNs use virtual connections to create a private
network through a public network.
Explanation: A VPN is a private network that is created over
a public network. Instead of using dedicated physical
connections, a VPN uses virtual connections routed through a
public network between two network devices.
34. Open the PT Activity. Perform the tasks in the activity
instructions and then answer the question.
CCNA 3 v7 Modules 6 – 8: WAN Concepts Exam Answers
What problem is causing PC-A to be unable to communicate
with the Internet?
 The ip nat inside source command refers to the wrong
interface.
 The NAT interfaces are not correctly assigned.
 The static route should not reference the interface, but
the outside address instead.
 The access list used in the NAT process is referencing
the wrong subnet.
 This router should be configured to use static NAT
instead of PAT.
Explanation: The output of show ip nat statistics shows
that the inside interface is FastEthernet0/0 but that no
interface has been designated as the outside interface. This
can be fixed by adding the command ip nat outside to
interface Serial0/0/0.
35. What type of address is 64.100.190.189?
 public
 private
36. Which type of VPN routes packets through virtual
tunnel interfaces for encryption and forwarding?
 MPLS VPN
 IPsec virtual tunnel interface
 dynamic multipoint VPN
 GRE over IPsec
37. Match the scenario to the WAN solution. (Not all
options are used.)
38. Question as presented:

Refer to the exhibit. The PC is sending a packet to the


Server on the remote network. Router R1 is performing
NAT overload. From the perspective of the PC, match the
NAT address type with the correct IP address. (Not all
options are used.)

39. Refer to the exhibit. What has to be done in order to


complete the static NAT configuration on R1?
 Interface Fa0/0 should be configured with the command
no ip nat inside.
 Interface S0/0/0 should be configured with the
command ip nat outside.
 R1 should be configured with the command ip nat inside
source static 209.165.200.200 192.168.11.11.
 R1 should be configured with the command ip nat inside
source static 209.165.200.1 192.168.11.11.
Explanation: In order for NAT translations to work properly,
both an inside and outside interface must be configured for
NAT translation on the router.
40. In NAT terms, what address type refers to the globally
routable IPv4 address of a destination host on the Internet?
 outside global
 inside global
 outside local
 inside local
Explanation: From the perspective of a NAT device, inside
global addresses are used by external users to reach internal
hosts. Inside local addresses are the addresses assigned to
internal hosts. Outside global addresses are the addresses of
destinations on the external network. Outside local
addresses are the actual private addresses of destination
hosts behind other NAT devices.
41. Refer to the exhibit. Which two statements are correct
based on the output as shown in the exhibit? (Choose two.)

 The output is the result of the show ip nat translations


command.
 The host with the address 209.165.200.235 will
respond to requests by using a source address of
192.168.10.10.
 The output is the result of the show ip nat statistics
command.
 Traffic with the destination address of a public web
server will be sourced from the IP of 192.168.1.10.
 The host with the address 209.165.200.235 will respond
to requests by using a source address of 209.165.200.235.
Explanation: The output displayed in the exhibit is the result
of the show ip nat translations command. Static NAT
entries are always present in the NAT table, while dynamic
entries will eventually time out.
42. Which circumstance would result in an enterprise
deciding to implement a corporate WAN?
 when the enterprise decides to secure its corporate LAN
 when its employees become distributed across many
branch locations
 when the number of employees exceeds the capacity of
the LAN
 when the network will span multiple buildings
Explanation: WANs cover a greater geographic area than
LANs do, so having employees distributed across many
locations would require the implementation of WAN
technologies to connect those locations. Customers will
access corporate web services via a public WAN that is
implemented by a service provider, not by the enterprise
itself. When employee numbers grow, the LAN has to expand
as well. A WAN is not required unless the employees are in
remote locations. LAN security is not related to the decision
to implement a WAN.
43. What is the function of the Hashed Message
Authentication Code (HMAC) algorithm in setting up an
IPsec VPN?
 protects IPsec keys during session negotiation
 authenticates the IPsec peers
 creates a secure channel for key negotiation
 guarantees message integrity
Explanation: The IPsec framework uses various protocols
and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. The Hashed
Message Authentication Code (HMAC) is a data integrity
algorithm that uses a hash value to guarantee the integrity of
a message.
44. What algorithm is used with IPsec to provide data
confidentiality?
 Diffie-Hellman
 SHA
 MD5
 RSA
 AES
Explanation: The IPsec framework uses various protocols
and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. Two popular
algorithms that are used to ensure that data is not
intercepted and modified (data integrity) are MD5 and SHA.
AES is an encryption protocol and provides data
confidentiality. DH (Diffie-Hellman) is an algorithm that is
used for key exchange. RSA is an algorithm that is used for
authentication.
45. Which two technologies provide enterprise-managed
VPN solutions? (Choose two.)
 remote access VPN
 Frame Relay
 Layer 2 MPLS VPN
 site-to-site VPN
 Layer 3 MPLS VPN
Explanation: VPNs can be managed and deployed as either
of two types:
 Enterprise VPNs – Enterprise-managed VPNs are a
common solution for securing enterprise traffic across the
internet. Site-to-site and remote access VPNs are examples
of enterprise managed VPNs.
 Service Provider VPNs – Service provider managed
VPNs are created and managed over the provider network.
Layer 2 and Layer 3 MPLS are examples of service provider
managed VPNs. Other legacy WAN solutions include Frame
Relay and ATM VPNs.
46. Question as presented:

Explanation: The inside local address is the private IP


address of the source or the PC in this instance. The inside
global address is the translated address of the source or the
address as seen by the outside device. Since the PC is using
the outside address of the R1 router, the inside global
address is 192.0.2.1. The outside addressing is simply the
address of the server or 203.0.113.5.
47. Refer to the exhibit. A network administrator is viewing
the output from the command show ip nat translations.
Which statement correctly describes the NAT translation
that is occurring on router RT2?
 The traffic from a source IPv4 address of
192.168.254.253 is being translated to 192.0.2.88 by
means of static NAT.
 The traffic from a source IPv4 address of 192.0.2.88 is
being translated by router RT2 to reach a destination IPv4
address of 192.168.254.253.
 The traffic from a source IPv4 public address that
originates traffic on the internet would be able to reach
private internal IPv4 addresses.
 The traffic from a source IPv4 address of 192.168.2.20 is
being translated by router RT2 to reach a destination IPv4
address of 192.0.2.254.
Explanation: Because no outside local or outside global
address is referenced, the traffic from a source IPv4 address
of 192.168.254.253 is being translated to 192.0.2.88 by using
static NAT. In the output from the command show ip nat
translations, the inside local IP address of 192.168.2.20 is
being translated into an outside IP address of 192.0.2.254 so
that the traffic can cross the public network. A public IPv4
device can connect to the private IPv4 device
192.168.254.253 by targeting the destination IPv4 address of
192.0.2.88.
48. What type of address is 10.100.126.126?
 private
 public
49. Which type of VPN connects using the Transport Layer
Security (TLS) feature?
 SSL VPN
 MPLS VPN
 IPsec virtual tunnel interface
 dynamic multipoint VPN
50. Which two end points can be on the other side of an
ASA site-to-site VPN configured using ASDM? (Choose two.)
 DSL switch
 ISR router
 another ASA
 multilayer switch
 Frame Relay switch
51. Which protocol creates a virtual point-to-point
connection to tunnel unencrypted traffic between Cisco
routers from a variety of protocols?
 IKE
 IPsec
 OSPF
 GRE
52. What is a disadvantage when both sides of a
communication use PAT?
 End-to-end IPv4 traceability is lost.
 The flexibility of connections to the Internet is reduced.
 The security of the communication is negatively
impacted.
 Host IPv4 addressing is complicated.
53. What two addresses are specified in a static NAT
configuration?
 the outside global and the outside local
 the inside local and the outside global
 the inside global and the outside local
 the inside local and the inside global
54. A company is considering updating the campus WAN
connection. Which two WAN options are examples of the
private WAN architecture? (Choose two.)
 municipal Wi-Fi
 digital subscriber line
 leased line
 Ethernet WAN
 cable
55. What type of address is 128.107.240.239?
 Public
 Private
56. Which type of VPN has both Layer 2 and Layer 3
implementations?
 IPsec virtual tunnel interface
 dynamic multipoint VPN
 GRE over IPsec
 MPLS VPN
57. Refer to the exhibit. A network administrator has
configured R2 for PAT. Why is the configuration incorrect?

 NAT-POOL2 is bound to the wrong ACL


 The ACL does not define the list of addresses to be
translated.
 The overload keyword should not have been applied.
 The static NAT entry is missing
Explain:
In the exhibit, NAT-POOL 2 is bound to ACL 100, but it should
be bound to the configured ACL 1. This will cause PAT to fail.
100, but it should be bound to the configured ACL 1. This will
cause PAT to fail.
58. Match each component of a WAN connection to its
description. (Not all options are used.)
devices and inside wiring located on the enterprise edge and
which connect to a carrier link. –> customer premises
equipment
a point that is established in a building or complex to
separate customer equipment from service provider
equipment. –> demarcation point
customer devices that pass the data from customer network
or host computer for transmission over the WAN. –> data
terminal equipment
devices that put data on the local loop. –> data
communications equipment

59. Which type of VPN allows multicast and broadcast
traffic over a secure site-to-site VPN?
 dynamic multipoint VPN
 SSL VPN
 IPsec virtual tunnel interface
 GRE over IPsec
60. Match the steps with the actions that are involved
when an internal host with IP address 192.168.10.10
attempts to send a packet to and external server at the IP
address 209.165.200.254 across a router R1 that running
dynamic NAT. (Not all options are used.)
Place the options in the following order:
 step 5 => R1 replaces the address 192.168.10.10 with a
translated inside global address.
 step 2 => R1 checks the NAT configuration to determine
if this packet should be translated.
 step 4 => R1 selects an available global address from
the dynamic address pool.
 step 1 => The host sends packets that request a
connection to the server at the address 209.165.200.254
 step 3 => If there is no translation entry for this IP
address, R1 determines that the source address
192.168.10.10 must be translated
61. Which type of VPN involves passenger, carrier, and
transport protocols?
 GRE over IPsec
 dynamic multipoint VPN
 MPLS VPN
 IPsec virtual tunnel interface
15
 Leave a Reply

11
 

4
 

0
  
 
 9
 
newestoldestmost voted

Guest

New questions
Hello. Sending some missing questions: Match the steps with the actions
that are involved when an internal host with IP address 192.168.10.10
attempts to send a packet to and external server at the IP address
209.165.200.254 across a router R1 that running dynamic NAT. (Not all
options are used.) Screenshot. Please crop it before uploading: Refer to the
exhibit. The PC is sending a packet to the Server on the remote network.
Router R1 is performing NAT overload. From the perspective of the PC,
match the NAT address type with the correct IP address. (Not all options are
used.) Screenshot:… Read more »
0  Reply
1 day ago

Author

CCNA Questions Answers


Thanks you so much!

0 Reply
51 minutes ago

Guest

Ashes
Which type of VPN involves passenger, carrier, and transport protocols?
GRE over IPsec
dynamic multipoint VPN
MPLS VPN
IPsec virtual tunnel interface
Navigation
0  Reply
2 days ago

Guest

Guest
Match the steps with the actions that are involved when an internal host
with IP address 192.168.10.10 attempts to send a packet to and external
server at the IP address 209.165.200.254 across a router R1 that running
dynamic NAT. (Not all options are used.) Place the options in the following
order: step 5 => R1 replaces the address 192.168.10.10 with a translated
inside global address. step 2 => R1 checks the NAT configuration to
determine if this packet should be translated. step 4 => R1 selects an
available global address from the dynamic address pool. step 1 => The
host… Read more »
0  Reply
3 days ago

Guest

Guest
Which type of VPN allows multicast and broadcast traffic over a secure site-
to-site VPN?
() dynamic multipoint VPN
() SSL VPN
() IPsec virtual tunnel interface
(*) GRE over IPsec
0  Reply
3 days ago

Guest

Abdul Razzaq
What type of address is 128.107.240.239?
(1). Public
(2). Private
The answer is Public.
0  Reply
6 days ago

Guest

Guest
Which type of VPN has both Layer 2 and Layer 3 implementations?
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
MPLS VPN
0  Reply
1 month ago

Guest

jpw
MPLS VPN

0 Reply
2 hours ago

Guest

Bogdan
Which two end points can be on the other side of an ASA site-to-site VPN
configured using ASDM? (Choose two.)
DSL switch
(X) ISR router
(X) another ASA
multilayer switch
Frame Relay switch
1  Reply
1 month ago

Guest

Bogdan
Which protocol creates a virtual point-to-point connection to tunnel
unencrypted traffic between Cisco routers from a variety of protocols?
IKE
IPsec
OSPF
(X) GRE
0  Reply
1 month ago

Guest

Bogdan
What is a disadvantage when both sides of a communication use PAT?
End-to-end IPv4 traceability is lost.
The flexibility of connections to the Internet is reduced.
The security of the communication is negatively impacted.
Host IPv4 addressing is complicated.
0  Reply
1 month ago

Guest

Bogdan
Correct answer is: End-to-end IPv4 traceability is lost.

0 Reply
1 month ago

Guest

TAHIR JAVAID
End-to-end IPv4 traceability is lost.

0 Reply
7 days ago

Guest

Bogdan
What two addresses are specified in a static NAT configuration?
the outside global and the outside local
the inside local and the outside global
the inside global and the outside local
(X) the inside local and the inside global
0  Reply
1 month ago

Guest

Bogdan
A company is considering updating the campus WAN connection. Which two
WAN options are examples of the private WAN architecture? (Choose two.)
municipal Wi-Fi
digital subscriber line
(x) leased line
(x) Ethernet WAN
cable

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy