What type of address is 10.19.6.7?
What type of address is 10.19.6.7? private public For more question and answers: Click Here CCNA3 v7 – ENSA – Modules 6 - 8: WAN Concepts Exam Answers Full 100%
What type of address is 10.19.6.7? private public For more question and answers: Click Here CCNA3 v7 – ENSA – Modules 6 - 8: WAN Concepts Exam Answers Full 100%
What type of address is 10.131.48.7? private public For more question and answers: Click Here CCNA3 v7 – ENSA – Modules 6 - 8: WAN Concepts Exam Answers Full 100%
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is causing PC-A to be unable to communicate with the Internet? The…
How is "tunneling" accomplished in a VPN? New headers from one or more VPN protocols encapsulate the original packets. All packets between two hosts are assigned to a single physical…
Which two WAN infrastructure services are examples of private connections? (Choose two.) T1/E1 wireless DSL cable Frame Relay Answers Explanation & Hints: Private WANs can use T1/E1, T3/E3, PSTN, ISDN,…
Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations . Which statement correctly describes the NAT translation that is occurring on…
Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1? 192.168.0.10 192.168.0.1 209.165.200.225 209.165.201.1 Answers Explanation & Hints: In static…
Refer to the exhibit. The PC is sending a packet to the Server on the remote network. Router R1 is performing NAT overload. From the perspective of the PC, match…
What does NAT overloading use to track multiple internal hosts that use one inside global address? MAC addresses port numbers IP addresses autonomous system numbers Answers Explanation & Hints: NAT…
Which is a requirement of a site-to-site VPN? It requires a client/server architecture. It requires the placement of a VPN server at the edge of the company network. It requires…
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.) IPsec VPN clientless SSL VPN GRE over IPsec VPN client-based IPsec VPN IPsec Virtual Tunnel Interface…
Which two technologies provide enterprise-managed VPN solutions? (Choose two.) Frame Relay site-to-site VPN Layer 2 MPLS VPN Layer 3 MPLS VPN remote access VPN Answers Explanation & Hints: VPNs can…
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit? confidentiality integrity authentication secure key exchange Answers Explanation & Hints: Integrity…
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA? clientless SSL client-based SSL site-to-site using a preshared key site-to-site…
Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.) DSL switch router another ASA multilayer switch Frame Relay switch Answers Explanation &…
What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.) MD5 SHA AES DH RSA Answers Explanation & Hints: The IPsec framework uses various protocols and…
What algorithm is used with IPsec to provide data confidentiality? MD5 Diffie-Hellman RSA AES SHA Answers Explanation & Hints: The IPsec framework uses various protocols and algorithms to provide data…
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? guarantees message integrity authenticates the IPsec peers protects IPsec keys during session…
Match the scenario to the WAN solution. (Not all options are used.) For more question and answers: Click Here CCNA3 v7 – ENSA – Modules 6 - 8: WAN Concepts…
Which two technologies are categorized as private WAN infrastructures? (Choose two.) cable DSL Frame Relay MetroE VPN Answers Explanation & Hints: Private WAN technologies include leased lines, dialup, ISDN, Frame…