Module 6-8 WAN Concepts Flashcards

1
Q

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

NAT improves packet handling.

NAT adds authentication capability to IPv4.

NAT will impact negatively on switch performance.

NAT causes routing tables to include more information.

NAT provides a solution to slow down the IPv4 address depletion.

NAT introduces problems for some applications that require end-to-end connectivity.

A

NAT provides a solution to slow down the IPv4 address depletion.
NAT introduces problems for some applications that require end-to-end connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

Router# show ip nat translations
Router# show ip nat statistics
Router# clear ip nat translations
Router# debug ip nat translations

A

Router# show ip nat translations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two tasks to perform when configuring static NAT? (Choose two.)

Configure a NAT pool.

Create a mapping between the inside local and outside local addresses.

Identify the participating interfaces as inside or outside interfaces.

Define the inside global address on the server

Define the outside global address.

A

Create a mapping between the inside local and outside local addresses.

Identify the participating interfaces as inside or outside interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a disadvantage of NAT?

There is no end-to-end addressing.
The router does not need to alter the checksum of the IPv4 packets.​
The internal hosts have to use a single public IPv4 address for external communication.
The costs of readdressing hosts can be significant for a publicly addressed network.​

A

There is no end-to-end addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address?

https://itexamanswers.net/wp-content/uploads/2019/12/i215652v4n1_215652.gif

  1. 168.0.10
  2. 168.0.1
  3. 165.200.225
  4. 165.200.254
A

209.165.200.225

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?

https://itexamanswers.net/wp-content/uploads/2019/12/i215654v5n1_215654.gif

244
10
1
255

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)

https://itexamanswers.net/wp-content/uploads/2019/12/i215839v1n1_NAT.png

A standard access list numbered 1 was used as part of the configuration process.
Three addresses from the NAT pool are being used by hosts.
Address translation is working.
One port on the router is not participating in the address translation.
The name of the NAT pool is refCount.
Two types of NAT are enabled.

A

A standard access list numbered 1 was used as part of the configuration process.

Address translation is working.

Two types of NAT are enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?

https://itexamanswers.net/wp-content/uploads/2019/12/i246206v1n1_215826.png

  1. 168.1.5
  2. 0.113.10
  3. 16.1.254
  4. 16.1.10
  5. 165.200.245
  6. 0.2.2
A

209.165.200.245

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?

https://itexamanswers.net/wp-content/uploads/2019/12/i278362v1n2_212297v2.png

dynamic NAT with a pool of two public IP addresses
PAT using an external interface
static NAT with a NAT pool
static NAT with one entry

A

PAT using an external interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?

https://itexamanswers.net/wp-content/uploads/2019/12/i282189v1n2_282189.gif

inside global
outside global
outside local
inside local

A

inside global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)

https://itexamanswers.net/wp-content/uploads/2019/12/i282898v1n2_282898.gif

A = 209.165.201.2
A = 10.1.0.13
B = 209.165.201.7
B = 10.0.254.5
B = 209.165.201.1
A

A = 10.1.0.13

B = 209.165.201.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses.
It allows a list of internal hosts to communicate with a specific group of external hosts.
It allows external hosts to initiate sessions with internal hosts.
It allows a pool of inside global addresses to be used by internal hosts.

A

It allows many inside hosts to share one or a few inside global addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?

https://itexamanswers.net/wp-content/uploads/2019/12/i282910v1n1_282910.gif

  1. 6.15.2
  2. 165.202.141
  3. 51.100.3
  4. 165.200.225
A

209.165.200.225

Explanation: The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refer to the exhibit. The NAT configuration applied to the router is as follows:

ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)# ip nat inside source list 1 pool corp overload
ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside

Based on the configuration and the output shown, what can be determined about the NAT status within the organization?

https://itexamanswers.net/wp-content/uploads/2019/12/i212298v1n2_212298.png

Static NAT is working, but dynamic NAT is not.
Dynamic NAT is working, but static NAT is not.
Not enough information is given to determine if both static and dynamic NAT are working.
NAT is working.

A

Not enough information is given to determine if both static and dynamic NAT are working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which situation describes data transmissions over a WAN connection?

A network administrator in the office remotely accesses a web server that is located in the data center at the edge of the campus.
A manager sends an email to all employees in the department with offices that are located in several buildings.
An employee prints a file through a networked printer that is located in another building.
An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.

A

An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two technologies are categorized as private WAN infrastructures? (Choose two.)

Frame Relay
VPN
MetroE
DSL
cable
A

Frame Relay

MetroE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which network scenario will require the use of a WAN?

Employees need to connect to the corporate email server through a VPN while traveling.
Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building.
Employee workstations need to obtain dynamically assigned IP addresses.
Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network.

A

Employees need to connect to the corporate email server through a VPN while traveling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

SHA
RSA
DH
MD5
AES
A

SHA

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)

SHA
RSA
AES
DH
PSK
A

SHA

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

client-based SSL
site-to-site using an ACL
clientless SSL
site-to-site using a preshared key

A

clientless SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

integrity
authentication
confidentiality
secure key exchange

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN
client-based IPsec VPN
IPsec VPN
IPsec Virtual Tunnel Interface VPN
GRE over IPsec VPN
A

clientless SSL VPN

client-based IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which is a requirement of a site-to-site VPN?

It requires hosts to use VPN client software to encapsulate traffic.
It requires the placement of a VPN server at the edge of the company network.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
It requires a client/server architecture.

A

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Explanation: Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the function of the Diffie-Hellman algorithm within the IPsec framework?

guarantees message integrity
allows peers to exchange shared keys
provides authentication
provides strong data encryption

A

allows peers to exchange shared keys

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does NAT overloading use to track multiple internal hosts that use one inside global address?

port numbers
IP addresses
autonomous system numbers
MAC addresses

A

port numbers

Explanation: NAT overloading, also known as Port Address Translation (PAT), uses port numbers to differentiate between multiple internal hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Question as presented:

https://itexamanswers.net/wp-content/uploads/2019/12/i249830v1n1_212288.png

A

Explanation: The inside local address is the private IP address of the source or the PC in this instance. The inside global address is the translated address of the source or the address as seen by the outside device. Since the PC is using the outside address of the R1 router, the inside global address is 192.0.2.1. The outside addressing is simply the address of the server or 203.0.113.5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?

https://itexamanswers.net/wp-content/uploads/2019/12/i216440v5n1_216440.png

  1. 168.0.1
  2. 168.0.10
  3. 165.201.1
  4. 165.200.225
A

209.165.200.225

Explanation: In static NAT a single inside local address, in this case 192.168.0.10, will be mapped to a single inside global address, in this case 209.165.200.225. Internet hosts will send packets to PC1 and use as a destination address the inside global address 209.165.200.225.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which type of VPN uses the public key infrastructure and digital certificates?​

SSL VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which two WAN infrastructure services are examples of private connections? (Choose two.)

cable
DSL
Frame Relay
T1/E1
wireless
A

Frame Relay
T1/E1

Explanation: Private WANs can use T1/E1, T3/E3, PSTN, ISDN, Metro Ethernet, MPLS, Frame Relay, ATM, or VSAT technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which two statements about the relationship between LANs and WANs are true? (Choose two.)

Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.
WANs must be publicly-owned, but LANs can be owned by either public or private entities.
WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​
LANs connect multiple WANs together.

A

WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.

WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​

Explanation: Although LANs and WANs can employ the same network media and intermediary devices, they serve very different areas and purposes. The administrative and geographical scope of a WAN is larger than that of a LAN. Bandwidth speeds are slower on WANs because of their increased complexity. The Internet is a network of networks, which can function under either public or private management.

31
Q

Which statement describes an important characteristic of a site-to-site VPN?

It must be statically set up.
It is ideally suited for use by mobile workers.
It requires using a VPN client on the host PC.
After the initial connection is established, it can dynamically change connection information.
It is commonly implemented over dialup and cable modem networks.

A

It must be statically set up.

Explanation: A site-to-site VPN is created between the network devices of two separate networks. The VPN is static and stays established. The internal hosts of the two networks have no knowledge of the VPN.

32
Q

How is “tunneling” accomplished in a VPN?

New headers from one or more VPN protocols encapsulate the original packets.
All packets between two hosts are assigned to a single physical medium to ensure that the packets are kept private.
Packets are disguised to look like other types of traffic so that they will be ignored by potential attackers.
A dedicated circuit is established between the source and destination devices for the duration of the connection.

A

New headers from one or more VPN protocols encapsulate the original packets.

Explanation: Packets in a VPN are encapsulated with the headers from one or more VPN protocols before being sent across the third party network. This is referred to as “tunneling”. These outer headers can be used to route the packets, authenticate the source, and prevent unauthorized users from reading the contents of the packets.

33
Q

Which statement describes a VPN?

VPNs use open source virtualization software to create the tunnel through the Internet.
VPNs use logical connections to create public networks through the Internet.
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use virtual connections to create a private network through a public network.

A

VPNs use virtual connections to create a private network through a public network.

Explanation: A VPN is a private network that is created over a public network. Instead of using dedicated physical connections, a VPN uses virtual connections routed through a public network between two network devices.

34
Q

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What problem is causing PC-A to be unable to communicate with the Internet?

https://itexamanswers.net/wp-content/uploads/2019/12/2020-05-20_080357.jpg

The ip nat inside source command refers to the wrong interface.
The NAT interfaces are not correctly assigned.
The static route should not reference the interface, but the outside address instead.
The access list used in the NAT process is referencing the wrong subnet.
This router should be configured to use static NAT instead of PAT.

A

The NAT interfaces are not correctly assigned.

Explanation: The output of show ip nat statistics shows that the inside interface is FastEthernet0/0 but that no interface has been designated as the outside interface. This can be fixed by adding the command ip nat outside to interface Serial0/0/0.

35
Q

What type of address is 64.100.190.189?

public
private

A

Public

36
Q

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec

A

IPsec virtual tunnel interface

37
Q

Match the scenario to the WAN solution. (Not all options are used.)

A

https://itexamanswers.net/wp-content/uploads/2019/12/2020-01-21_004658.jpg

38
Q

Question as presented:

https://itexamanswers.net/wp-content/uploads/2019/12/i249830v1n1_212288-1.png

Refer to the exhibit. The PC is sending a packet to the Server on the remote network. Router R1 is performing NAT overload. From the perspective of the PC, match the NAT address type with the correct IP address. (Not all options are used.)

A

https://itexamanswers.net/wp-content/uploads/2019/12/2020-01-21_005238.jpg

39
Q

Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?

https://itexamanswers.net/wp-content/uploads/2019/12/2020-01-25_222653.png

Interface Fa0/0 should be configured with the command no ip nat inside.
Interface S0/0/0 should be configured with the command ip nat outside.
R1 should be configured with the command ip nat inside source static 209.165.200.200 192.168.11.11.
R1 should be configured with the command ip nat inside source static 209.165.200.1 192.168.11.11.

A

Interface S0/0/0 should be configured with the command ip nat outside.

Explanation: In order for NAT translations to work properly, both an inside and outside interface must be configured for NAT translation on the router.

40
Q

In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?

outside global
inside global
outside local
inside local

A

outside global

Explanation: From the perspective of a NAT device, inside global addresses are used by external users to reach internal hosts. Inside local addresses are the addresses assigned to internal hosts. Outside global addresses are the addresses of destinations on the external network. Outside local addresses are the actual private addresses of destination hosts behind other NAT devices.

41
Q

Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.)

https://itexamanswers.net/wp-content/uploads/2019/12/i215692v1n3_Q2.png

The output is the result of the show ip nat translations command.

The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.

The output is the result of the show ip nat statistics command.

Traffic with the destination address of a public web server will be sourced from the IP of 192.168.1.10.

The host with the address 209.165.200.235 will respond to requests by using a source address of 209.165.200.235.

A

The output is the result of the show ip nat translations command.

The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.

Explanation: The output displayed in the exhibit is the result of the show ip nat translations command. Static NAT entries are always present in the NAT table, while dynamic entries will eventually time out.

42
Q

Which circumstance would result in an enterprise deciding to implement a corporate WAN?

when the enterprise decides to secure its corporate LAN
when its employees become distributed across many branch locations
when the number of employees exceeds the capacity of the LAN
when the network will span multiple buildings

A

when its employees become distributed across many branch locations

Explanation: WANs cover a greater geographic area than LANs do, so having employees distributed across many locations would require the implementation of WAN technologies to connect those locations. Customers will access corporate web services via a public WAN that is implemented by a service provider, not by the enterprise itself. When employee numbers grow, the LAN has to expand as well. A WAN is not required unless the employees are in remote locations. LAN security is not related to the decision to implement a WAN.

43
Q

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

protects IPsec keys during session negotiation
authenticates the IPsec peers
creates a secure channel for key negotiation
guarantees message integrity

A

guarantees message integrity

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The Hashed Message Authentication Code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.

44
Q

What algorithm is used with IPsec to provide data confidentiality?

Diffie-Hellman
SHA
MD5
RSA
AES
A

AES

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm that is used for authentication.

45
Q

Which two technologies provide enterprise-managed VPN solutions? (Choose two.)

remote access VPN
Frame Relay
Layer 2 MPLS VPN
site-to-site VPN
Layer 3 MPLS VPN
A

remote access VPN

site-to-site VPN

Explanation: VPNs can be managed and deployed as either of two types:

Enterprise VPNs – Enterprise-managed VPNs are a common solution for securing enterprise traffic across the internet. Site-to-site and remote access VPNs are examples of enterprise managed VPNs.
Service Provider VPNs – Service provider managed VPNs are created and managed over the provider network. Layer 2 and Layer 3 MPLS are examples of service provider managed VPNs. Other legacy WAN solutions include Frame Relay and ATM VPNs.

46
Q

Question as presented:

https://itexamanswers.net/wp-content/uploads/2019/12/i249830v1n1_212288-2.png

A

Explanation: The inside local address is the private IP address of the source or the PC in this instance. The inside global address is the translated address of the source or the address as seen by the outside device. Since the PC is using the outside address of the R1 router, the inside global address is 192.0.2.1. The outside addressing is simply the address of the server or 203.0.113.5.

47
Q

Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?​

https://itexamanswers.net/wp-content/uploads/2019/12/i215827v4n1_215827-1.png

The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.
The traffic from a source IPv4 address of 192.0.2.88 is being translated by router RT2 to reach a destination IPv4 address of 192.168.254.253.
The traffic from a source IPv4 public address that originates traffic on the internet would be able to reach private internal IPv4 addresses​.
The traffic from a source IPv4 address of 192.168.2.20 is being translated by router RT2 to reach a destination IPv4 address of 192.0.2.254.

A

The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.

Explanation: Because no outside local or outside global address is referenced, the traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by using static NAT. In the output from the command show ip nat translations, the inside local IP address of 192.168.2.20 is being translated into an outside IP address of 192.0.2.254 so that the traffic can cross the public network. A public IPv4 device can connect to the private IPv4 device 192.168.254.253 by targeting the destination IPv4 address of 192.0.2.88.

48
Q

What type of address is 10.100.126.126?

private
public

A

Private

49
Q

Which type of VPN connects using the Transport Layer Security (TLS) feature?

SSL VPN
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN

A

SSL VPN

50
Q

Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)

DSL switch
ISR router
another ASA
multilayer switch
Frame Relay switch
A

ISR router

another ASA

51
Q

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

IKE
IPsec
OSPF
GRE

A

GRE

52
Q

What is a disadvantage when both sides of a communication use PAT?

End-to-end IPv4 traceability is lost.
The flexibility of connections to the Internet is reduced.
The security of the communication is negatively impacted.
Host IPv4 addressing is complicated.

A

End-to-end IPv4 traceability is lost.

53
Q

What two addresses are specified in a static NAT configuration?

the outside global and the outside local
the inside local and the outside global
the inside global and the outside local
the inside local and the inside global

A

the inside local and the inside global

54
Q

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

municipal Wi-Fi
digital subscriber line
leased line
Ethernet WAN
cable
A

leased line

Ethernet WAN

55
Q

What type of address is 128.107.240.239?

Public
Private

A

Public

56
Q

Which type of VPN has both Layer 2 and Layer 3 implementations?

IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
MPLS VPN

A

MPLS VPN

57
Q

Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect?

https://itexamanswers.net/wp-content/uploads/2016/02/2017-06-04_082118.png

NAT-POOL2 is bound to the wrong ACL
The ACL does not define the list of addresses to be translated.
The overload keyword should not have been applied.
The static NAT entry is missing

A

NAT-POOL2 is bound to the wrong ACL

Explain:
In the exhibit, NAT-POOL 2 is bound to ACL 100, but it should be bound to the configured ACL 1. This will cause PAT to fail. 100, but it should be bound to the configured ACL 1. This will cause PAT to fail.

58
Q

Match each component of a WAN connection to its description. (Not all options are used.)

A

https://itexamanswers.net/wp-content/uploads/2019/12/2020-05-20_085043.jpg

59
Q

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec

A

GRE over IPsec

60
Q

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to and external server at the IP address 209.165.200.254 across a router R1 that running dynamic NAT. (Not all options are used.)

https://itexamanswers.net/wp-content/uploads/2019/12/Modules-6_8-WAN-Concepts-Exam-Answers.png

A

Place the options in the following order:

step 5 => R1 replaces the address 192.168.10.10 with a translated inside global address.
step 2 => R1 checks the NAT configuration to determine if this packet should be translated.
step 4 => R1 selects an available global address from the dynamic address pool.
step 1 => The host sends packets that request a connection to the server at the address 209.165.200.254
step 3 => If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated

61
Q

Which type of VPN involves passenger, carrier, and transport protocols?

GRE over IPsec
dynamic multipoint VPN
MPLS VPN
IPsec virtual tunnel interface

A

GRE over IPsec

62
Q

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)

https://itexamanswers.net/wp-content/uploads/2019/12/2020-05-20_084314.jpg

A

https://itexamanswers.net/wp-content/uploads/2019/12/2020-05-20_084314.jpg

63
Q

Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations . Which statement correctly describes the NAT translation that is occurring on router RT2?​

https://itexamanswers.net/wp-content/uploads/2019/12/i215827v4n1_215827-2.png

The traffic from a source IPv4 public address that originates traffic on the internet would be able to reach private internal IPv4 addresses​.

The traffic from a source IPv4 address of 192.168.2.20 is being translated by router RT2 to reach a destination IPv4 address of 192.0.2.254.

The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.

The traffic from a source IPv4 address of 192.0.2.88 is being translated by router RT2 to reach a destination IPv4 address of 192.168.254.253.

A

The traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by means of static NAT.

Explain: Because no outside local or outside global address is referenced, the traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by using static NAT. In the output from the command show ip nat translations , the inside local IP address of 192.168.2.20 is being translated into an outside IP address of 192.0.2.254 so that the traffic can cross the public network. A public IPv4 device can connect to the private IPv4 device 192.168.254.253 by targeting the destination IPv4 address of 192.0.2.88.

64
Q

What type of address is 10.131.48.7?

Private
Public

A

Private

65
Q

Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?

dynamic multipoint VPN
IPsec virtual tunnel interface
MPLS VPN
GRE over IPsec

A

IPsec virtual tunnel interface

66
Q

Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?

dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec

A

GRE over IPsec

67
Q

What type of address is 10.19.6.7?

private
public

A

Private

68
Q

What type of address is 64.101.198.197?

public
private

A

public

69
Q

What type of address is 64.101.198.107

public
private

A

Public

70
Q

What type of address is 10.100.34.34?

private
public

A

Private

71
Q

What type of address is 192.168.7.126?

Private.
Public

A

Private

72
Q

What type of address is 198.133.219.148?

Private.
Public

A

Public

73
Q

Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)

DSL switch
router
another ASA
multilayer switch
Frame Relay switch
A

router

another ASA