A network administrator has configured source NAT, translati

题目
单选题
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
A

The host needs to open the telnet port.

B

The host needs a route for the translated address.

C

The administrator must use a proxy-arp policy for the translated address.

D

The administrator must use a security policy, which will allow communication between the zones.

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three methods of source NAT does the Junos OS support?() (Choose three.)

A. interface-based source NAT

B. source NAT with address shifting

C. source NAT using static source pool

D. interface-based source NAT without PAT

E. source NAT with address shifting and PAT


参考答案:A, B, C

第2题:

Click the Exhibit button.Which type of source NAT is configured in the exhibit?()

A. static source pool

B. interface source pool

C. source pool with PAT

D. souce pool without PAT


参考答案:A

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

A Cisco router has been configured with the following command:IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0his is an example of what type of NAT?()

  • A、Static NAT
  • B、Dynamic NAT
  • C、Dynamic NAT with overload
  • D、Port Address Translation
  • E、None of the above

正确答案:B

第5题:

TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()

A. Static NAT

B. Global NAT

C. Dynamic NAT

D. Static NAT with ACLs

E. Dynamic NAT with overload


参考答案:E

第6题:

A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()

A. The host needs to open the telnet port.

B. The host needs a route for the translated address.

C. The administrator must use a proxy-arp policy for the translated address.

D. The administrator must use a security policy, which will allow communication between the zones.


参考答案:C

第7题:

Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()

A. 1

B. 2

C. 3

D. 4

E. 5


参考答案:C

第8题:

Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation.Which type of NAT must you configure?()

A. source NAT with address shifting

B. pool-based source NAT

C. static destination NAT

D. pool-based destination NAT


参考答案:D

第9题:

Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()

A.IP routing is not enabled

B.A static route is configured incorrectly

C.The network has not fully converged

D.The FastEthernet interface on Coffee is disabled

E.The routing table on Coffee has not updated

F.The neighbor relationship table is not correctly updated


参考答案:D

第10题:

An administrator has added an additional network adapter to each cluster node. The adapters  have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP.  What would be required to correct this problem?()  

  • A、 Rerun autodiscovery.
  • B、 Synchronize the cluster.
  • C、 Restart cluster services.
  • D、 Delete and recreate the adapters.

正确答案:A

更多相关问题