Correct Answer: A
QUESTION 40
Which is a fact related to FTP?
-
It uses block numbers to identify and mitigate data-transfer errors
-
It always operates without user authentication
-
It relies on the well-known UDP port 69.
-
It uses two separate connections for control and data traffic
Correct Answer: D
QUESTION 41
Which two protocols are used by an administrator for authentication and configuration on access points? (Choose two)
A. Kerberos
B. 802.1Q
C. 802.1x
D. TACACS+
E. RADIUS
Correct Answer: CE
QUESTION 42
Refer to the exhibit.
CPE1# show protocols e0/1 Ethernet0/1 is up, line protocol is up Internet address is 10.0.12.2/24
CPE1#show ip access-list LAN Standard IF access list LAN
10 permit 10.0.12.0, wildcard bits 0.0.0.255 CPE1# show ip nat translations
CPE1# show ip net statistics
Total active translations: 0 (0 static, 0 dynamic, 0 extended)
Peak translations: 0 Outside interfaces:
Inside interfaces:
Ethernet0/1 Hits: 0 Misses: 0
CEF Translated packets: 0, CEF Funted packets: 0 Expired translations: 0
Dynamic mappings:
-- Inside Source
[Id: 1] access-list LAN pool NATPOOL refcount 0 pool NATPOOL: netmask 255.255.255.0
start 198.51.100.11 end 198.51.100.20
type generic, total addresses 10, allocated 0 (0%), misses 0
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
What is the next step to complete the implementation for the partial NAT configuration shown?
-
Reconfigure the static NAT entries that overlap the NAT pool
-
Configure the NAT outside interface
-
Modify the access list for the internal network on e0/1
-
Apply the ACL to the pool configuration
Dostları ilə paylaş: |