Searching for "at"

Q:

When creating a pool of global address, which of the following can be used instead of the netmask command?

A) / (slash notation) B) prefix - length
C) no mask D) block - size
 
Answer & Explanation Answer: B) prefix - length

Explanation:

Instead of the netmask command, you can use the prefix-length length statement.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?

A) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240 B) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
C) ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224 D) ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0
 
Answer & Explanation Answer: B) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224

Explanation:

The command ip nat pool name creates the pool that hosts can use to get onto the global internet. What makes option B correct is that the range 171.16.10.65 through 171.16.10.94 includes 30 hosts, but the mask has to match 30 hosts as well, and that mask is 255.255.255.224 . Option C is wrong because there is a lowercase t in the pool name. Pool name are case sensitive.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

Which command will allow you to see real - time translations on your router?

A) show ip nat translations B) show ip nat statistics
C) debug ip nat D) clear ip nat translations
 
Answer & Explanation Answer: C) debug ip nat

Explanation:

The command debug ip nat will show you in real time the translations occurring on your router.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

What command would you use to set an access list on a VTY line?

Answer

line vty 0 4


access - class 110 in 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

Q:

What command would you use to create an extended access list that stops host 172.16.10.1 fro telnetting to host 172.16.30.5?

Answer

access - list 110 deny tcp host


172.16.10.1  host  172.16.30.5  eq  23


access - list 110 permit ip any any

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

What is the most common attack on a network today?

A) Lock picking B) Naggle
C) DoS D) auto secure
 
Answer & Explanation Answer: C) DoS

Explanation:

The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

Q:

What command will permit SMTP mail to only host 1.1.1.1?

A) access-list 10 permit smtp host 1.1.1.1 B) access-list 110 permit ip smtp host 1.1.1.1
C) access-list 10 permit tcp any host 1.1.1.1 eq smtp D) access-list 110 permit tcp any host 1.1.1.1 eq smtp
 
Answer & Explanation Answer: D) access-list 110 permit tcp any host 1.1.1.1 eq smtp

Explanation:

when trying to find the best answer to an access - list question, always check the access - list bnumber and then the protocol. When filtering to an upper - layer protocol, you must use an extended list, numbers 100 - 199 and 2000 - 2699. Also, when you filter to the port of an upper - layer protocol, you must use either tcp or udp in the ACL protocol field. If it says ip in the protocol field, you cannot filoter on the port number of an upper - layer protocol. SMTP uses TCP

Report Error

View Answer Report Error Discuss

Filed Under: CCNA