Module 6-8 WAN Concepts Flashcards
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
NAT improves packet handling.
NAT adds authentication capability to IPv4.
NAT will impact negatively on switch performance.
NAT causes routing tables to include more information.
NAT provides a solution to slow down the IPv4 address depletion.
NAT introduces problems for some applications that require end-to-end connectivity.
NAT provides a solution to slow down the IPv4 address depletion.
NAT introduces problems for some applications that require end-to-end connectivity
A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?
Router# show ip nat translations
Router# show ip nat statistics
Router# clear ip nat translations
Router# debug ip nat translations
Router# show ip nat translations
What are two tasks to perform when configuring static NAT? (Choose two.)
Configure a NAT pool.
Create a mapping between the inside local and outside local addresses.
Identify the participating interfaces as inside or outside interfaces.
Define the inside global address on the server
Define the outside global address.
Create a mapping between the inside local and outside local addresses.
Identify the participating interfaces as inside or outside interfaces.
What is a disadvantage of NAT?
There is no end-to-end addressing.
The router does not need to alter the checksum of the IPv4 packets.
The internal hosts have to use a single public IPv4 address for external communication.
The costs of readdressing hosts can be significant for a publicly addressed network.
There is no end-to-end addressing.
Refer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address?
https://itexamanswers.net/wp-content/uploads/2019/12/i215652v4n1_215652.gif
- 168.0.10
- 168.0.1
- 165.200.225
- 165.200.254
209.165.200.225
Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?
https://itexamanswers.net/wp-content/uploads/2019/12/i215654v5n1_215654.gif
244
10
1
255
1
Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)
https://itexamanswers.net/wp-content/uploads/2019/12/i215839v1n1_NAT.png
A standard access list numbered 1 was used as part of the configuration process.
Three addresses from the NAT pool are being used by hosts.
Address translation is working.
One port on the router is not participating in the address translation.
The name of the NAT pool is refCount.
Two types of NAT are enabled.
A standard access list numbered 1 was used as part of the configuration process.
Address translation is working.
Two types of NAT are enabled.
Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?
https://itexamanswers.net/wp-content/uploads/2019/12/i246206v1n1_215826.png
- 168.1.5
- 0.113.10
- 16.1.254
- 16.1.10
- 165.200.245
- 0.2.2
209.165.200.245
Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?
https://itexamanswers.net/wp-content/uploads/2019/12/i278362v1n2_212297v2.png
dynamic NAT with a pool of two public IP addresses
PAT using an external interface
static NAT with a NAT pool
static NAT with one entry
PAT using an external interface
Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?
https://itexamanswers.net/wp-content/uploads/2019/12/i282189v1n2_282189.gif
inside global
outside global
outside local
inside local
inside global
Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)
https://itexamanswers.net/wp-content/uploads/2019/12/i282898v1n2_282898.gif
A = 209.165.201.2 A = 10.1.0.13 B = 209.165.201.7 B = 10.0.254.5 B = 209.165.201.1
A = 10.1.0.13
B = 209.165.201.1
What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?
It allows many inside hosts to share one or a few inside global addresses.
It allows a list of internal hosts to communicate with a specific group of external hosts.
It allows external hosts to initiate sessions with internal hosts.
It allows a pool of inside global addresses to be used by internal hosts.
It allows many inside hosts to share one or a few inside global addresses.
Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?
https://itexamanswers.net/wp-content/uploads/2019/12/i282910v1n1_282910.gif
- 6.15.2
- 165.202.141
- 51.100.3
- 165.200.225
209.165.200.225
Explanation: The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.
Refer to the exhibit. The NAT configuration applied to the router is as follows:
ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)# ip nat inside source list 1 pool corp overload
ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside
Based on the configuration and the output shown, what can be determined about the NAT status within the organization?
https://itexamanswers.net/wp-content/uploads/2019/12/i212298v1n2_212298.png
Static NAT is working, but dynamic NAT is not.
Dynamic NAT is working, but static NAT is not.
Not enough information is given to determine if both static and dynamic NAT are working.
NAT is working.
Not enough information is given to determine if both static and dynamic NAT are working.
Which situation describes data transmissions over a WAN connection?
A network administrator in the office remotely accesses a web server that is located in the data center at the edge of the campus.
A manager sends an email to all employees in the department with offices that are located in several buildings.
An employee prints a file through a networked printer that is located in another building.
An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.
An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.
Which two technologies are categorized as private WAN infrastructures? (Choose two.)
Frame Relay VPN MetroE DSL cable
Frame Relay
MetroE
Which network scenario will require the use of a WAN?
Employees need to connect to the corporate email server through a VPN while traveling.
Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building.
Employee workstations need to obtain dynamically assigned IP addresses.
Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network.
Employees need to connect to the corporate email server through a VPN while traveling.
What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)
SHA RSA DH MD5 AES
SHA
MD5
What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)
SHA RSA AES DH PSK
SHA
AES
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
client-based SSL
site-to-site using an ACL
clientless SSL
site-to-site using a preshared key
clientless SSL
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
integrity
authentication
confidentiality
secure key exchange
integrity
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)
clientless SSL VPN client-based IPsec VPN IPsec VPN IPsec Virtual Tunnel Interface VPN GRE over IPsec VPN
clientless SSL VPN
client-based IPsec VPN
Which is a requirement of a site-to-site VPN?
It requires hosts to use VPN client software to encapsulate traffic.
It requires the placement of a VPN server at the edge of the company network.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
It requires a client/server architecture.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
Explanation: Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.
What is the function of the Diffie-Hellman algorithm within the IPsec framework?
guarantees message integrity
allows peers to exchange shared keys
provides authentication
provides strong data encryption
allows peers to exchange shared keys
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.
What does NAT overloading use to track multiple internal hosts that use one inside global address?
port numbers
IP addresses
autonomous system numbers
MAC addresses
port numbers
Explanation: NAT overloading, also known as Port Address Translation (PAT), uses port numbers to differentiate between multiple internal hosts.
Question as presented:
https://itexamanswers.net/wp-content/uploads/2019/12/i249830v1n1_212288.png
Explanation: The inside local address is the private IP address of the source or the PC in this instance. The inside global address is the translated address of the source or the address as seen by the outside device. Since the PC is using the outside address of the R1 router, the inside global address is 192.0.2.1. The outside addressing is simply the address of the server or 203.0.113.5.
Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?
https://itexamanswers.net/wp-content/uploads/2019/12/i216440v5n1_216440.png
- 168.0.1
- 168.0.10
- 165.201.1
- 165.200.225
209.165.200.225
Explanation: In static NAT a single inside local address, in this case 192.168.0.10, will be mapped to a single inside global address, in this case 209.165.200.225. Internet hosts will send packets to PC1 and use as a destination address the inside global address 209.165.200.225.
Which type of VPN uses the public key infrastructure and digital certificates?
SSL VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
SSL VPN
Which two WAN infrastructure services are examples of private connections? (Choose two.)
cable DSL Frame Relay T1/E1 wireless
Frame Relay
T1/E1
Explanation: Private WANs can use T1/E1, T3/E3, PSTN, ISDN, Metro Ethernet, MPLS, Frame Relay, ATM, or VSAT technology.