CCNPv8 ENCOR (Version 8.0) – Chapters 15 – 16: IP Services and VPNs Exam Answers Full 100%
-
Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?
- R1 should be configured with the command ip nat inside source static 209.165.200.1 192.168.11.11 .
- R1 should be configured with the command ip nat inside source static 209.165.200.200 192.168.11.11 .
- Interface S0/0/0 should be configured with the command ip nat outside .
- Interface Fa0/0 should be configured with the command no ip nat inside .
Answers Explanation & Hints: In order for NAT translations to work properly, both an inside and outside interface must be configured for NAT translation on the router.
-
Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?
- dynamic NAT with a pool of two public IP addresses
- PAT using an external interface
- static NAT with one entry
- static NAT with a NAT pool
Answers Explanation & Hints: The output shows that there are two inside global addresses that are the same but that have different port numbers. The only time port numbers are displayed is when PAT is being used. The same output would be indicative of PAT that uses an address pool. PAT with an address pool is appropriate when more than 4,000 simultaneous translations are needed by the company.
-
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)
Answers Explanation & Hints: The translation of the IP addresses from 209.65.200.254 to 192.168.10.10 will take place when the reply comes back from the server.
-
Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?
- 1
- 10
- 244
- 255
Answers Explanation & Hints: The NAT configuration on R1 is static NAT which translates a single inside IP address, 192.168.0.10 into a single public IP address, 209.165.200.255. If more hosts need translation, then a NAT pool of inside global address or overloading should be configured.
-
What is a potential disadvantage when implementing HSRP as compared to GLBP?
- HSRP does not function in a multivendor environment.
- HSRP does not provide load balancing with multiple active routers.
- HSRP does not have the capability to support IPv6 addresses.
- HSRP provides default gateway failover only when the active router fails.
Answers Explanation & Hints: HSRP is a first-hop redundancy protocol that can utilize a group of routers, where a single router is acting as the default gateway and all other HSRP routers will maintain a backup status. GLBP supports load balancing, where multiple active routers can share the traffic load at a single time. Both HSRP and GLBP are Cisco proprietary. HSRP provides default gateway failover when pre-set conditions are met or when the active router fails, and HSRP can support IPv6 addressing.
-
What are three advantages of using private IP addresses and NAT? (Choose three.)
- conserves registered public IP addresses
- reduces CPU usage on customer routers
- creates multiple public IP addresses
- hides private LAN addressing from outside devices that are connected to the Internet
- permits LAN expansion without additional public IP addresses
- improves the performance of the router that is connected to the Internet
Answers Explanation & Hints: Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.
-
A network engineer wants to synchronize the time of a router with an NTP server at the IPv4 address 209.165.200.225. The exit interface of the router is configured with an IPv4 address of 192.168.212.11. Which global configuration command should be used to configure the NTP server as the time source for this router?
- ntp server 209.165.200.225
- ntp peer 209.165.200.225
- ntp server 192.168.212.11
- ntp peer 192.168.212.11
Answers Explanation & Hints: The global configuration command ntp server server ip-address will set the server at that address as the time source for the router. The ntp peer command which enables a router to both update the time of another similarly configured router, and also synchronize with that router if necessary, is not appropriate in this case.
-
Which router command is required to configure VRRP to support IPv6?
- fhrp version vrrp v3
- standby 6 ipv6 autoconfig
- standby 1 ipv6 FE80::1:1
- vrrp 22 address-family ipv6
Answers Explanation & Hints: VRRPv3 supports IPv4 and IPv6 and is configured globally using the fhrp version vrrp v3 command before the vrrp instance-id address-family ipv6 interface configuration command is applied. standby 6 ipv6 autoconfig and standby 1 ipv6 FE80::1:1 are HSRP commands.
-
A networking engineer is configuring an NTP client to have access to multiple NTP servers but wants one server to have priority over the others. Which command will achieve this?
- ntp server 203.0.113.1 prefer
- ntp server 2001:DB8:0:0:800:200C:417A version 4h
- ntp max-associations 1
- ntp master 1
Answers Explanation & Hints: The ntp server 2001:DB8:0:0:800:200C:417A version 4 command configures the NTP client to synchronize with the NTP server at the specified IPv6 address but does not give it priority over other available servers. The command ntp max-associations number sets the maximum number of NTP peer-and-client associations that the router will serve. The command ntp master 1 sets the router to be a stratum level 1 NTP server.
-
What is a feature or purpose of NTP peers?
- NTP peers query each other to synchronize their clocks.
- NTP peers are NTP clients that share a common NTP server.
- An NTP client that loses connection with an NTP server can synchronize the time with an NTP peer.
- An NTP peer that loses connection with another NTP peer loses all NTP synchronization.
Answers Explanation & Hints: An NTP peer that is configured with an authoritative time source treats its peer as an equal and adjusts its clock to synchronize with that peer.
-
Which two NTP details are displayed by issuing the show ntp associations command on a switch configured to use NTP? (Choose two.)
- NTP server IP address
- reference clock IP address
- NTP uptime
- “Clock is synchronized” statement
- reference time
Answers Explanation & Hints: NTP uptime, “Clock is synchronized” statement, and the reference time are displayed by the show ntp status command.
-
Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect?
- The static NAT entry is missing.
- NAT-POOL2 is bound to the wrong ACL.
- The ACL does not define the list of addresses to be translated.
- The overload keyword should not have been applied.
Answers Explanation & Hints: In the exhibit, NAT-POOL 2 is bound to ACL 100, but it should be bound to the configured ACL 1. This will cause PAT to fail. 100, but it should be bound to the configured ACL 1. This will cause PAT to fail.
-
Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?
- 192.0.2.2
- 172.16.1.10
- 203.0.113.10
- 172.16.1.254
- 192.168.1.5
- 209.165.200.245
Answers Explanation & Hints: Because the packet is between RT2 and the web server, the source IP address is the inside global address of PC, 209.165.200.245.
-
A network administrator would like to ensure that router R1 is always elected the active router for an HSRP group. Which set of commands would ensure the required results?
- R1(config-if)# ip address 192.168.1.100 255.255.255.0
R1(config-if)# standby 1 ip 192.168.1.1
R1(config-if)# standby 1 priority 1
R1(config-if)# no shutdown - R1(config-if)# ip address 192.168.1.250 255.255.255.0
R1(config-if)# standby 1 ip 192.168.1.1
R1(config-if)# no shutdown - R1(config-if)# ip address 192.168.1.100 255.255.255.0
R1(config-if)# standby 1 ip 192.168.1.1
R1(config-if)# standby 1 priority 255
R1(config-if)# standby 1 preempt
R1(config-if)# no shutdown - R1(config-if)# ip address 192.168.1.100 255.255.255.0
R1(config-if)# standby 1 ip 192.168.1.1
R1(config-if)# standby 1 priority 150
R1(config-if)# no shutdownAnswers Explanation & Hints: In order to configure HSRP, the standby command is used. The IP address given with the standby command is the virtual IP address used by hosts as a default gateway. A priority number of 255 is the highest that can be assigned and should be configured on the router that is to be the active router.
- R1(config-if)# ip address 192.168.1.100 255.255.255.0
-
Refer to the exhibit. What two statements describe the NTP status of the router? (Choose two.)
- The router is serving as an authoritative time source.
- The router is serving as a time source for the device at 192.168.1.1.
- The router is attached to a stratum 2 device.
- The IP address of the time source for the router is 192.168.1.1.
- The software clock for the router must be configured with the set clock command so that NTP will function properly.
Answers Explanation & Hints: The show ntp status command displays information about how NTP is operating on the device. The output shows that the router clock is synchronized with the NTP server with the address of 192.168.1.1. NTP is hierarchical. The router is a stratum 3 device, therefore it’s time source is a stratum 2 device. Authoritative time sources in the NTP system are located at stratum 0.
-
Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)
- Address translation is working.
- Three addresses from the NAT pool are being used by hosts.
- The name of the NAT pool is refCount.
- A standard access list numbered 1 was used as part of the configuration process.
- Two types of NAT are enabled.
- One port on the router is not participating in the address translation.
Answers Explanation & Hints: The show ip nat statistics , show ip nat translations , and debug ip nat commands are useful in determining if NAT is working and and also useful in troubleshooting problems that are associated with NAT. NAT is working, as shown by the hits and misses count. Because there are four misses, a problem might be evident. The standard access list numbered 1 is being used and the translation pool is named NAT as evidenced by the last line of the output. Both static NAT and NAT overload are used as seen in the Total translations line.
-
Refer to the exhibit. What statement is true about the output of the show standby command?
- The current priority of this router is 120.
- The router is currently forwarding packets.
- This router is tracking two properly operating interfaces.
- This router is in the HSRP down state because its tracked interfaces are down.
Answers Explanation & Hints: The output shows that the active router is local and indicates that this router is the active router and is currently forwarding packets.
-
Match the step number to the sequence of stages that occur during the HSRP failover process. (Not all options are used.)
Answers Explanation & Hints: Hot Standby Router Protocol (HSRP) is a Cisco-proprietary protocol that is designed to allow for transparent failover of a first-hop IPv4 device.
-
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
- OSPF
- IPsec
- IKE
- GRE
Answers Explanation & Hints: Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.
-
Refer to the exhibit. An organization has two remote sites which are connected by a GRE tunnel through an ISP cloud network. The organization has two routers (CPE1 and CPE2) at each of the remote sites which connect to the ISP routers, SP1 and SP2. Which two nodes are the GRE tunnel endpoints to connect the two remote sites? (Choose two.)
- Host A
- CPE1
- SP1
- SP2
- CPE2
- Host B
Answers Explanation & Hints: The GRE tunnel is a private tunnel set up by the organization to connect the two remote sites across the ISP network. The organization would need to configure the two routers at the remote sites, CPE1 and CPE2, to the tunnel endpoints of the tunnel.
-
How many bytes of overhead are added to each IP packet while it is transported through a GRE tunnel?
- 8
- 16
- 24
- 32
Answers Explanation & Hints: A packet that is sent over a GRE tunnel is encapsulated with a GRE header and the tunneling IP header, which combined add an additional 24 bytes to the original packet.
-
Refer to the exhibit. Which IP address is configured on the physical interface of the CORP router?
- 10.1.1.1
- 10.1.1.2
- 209.165.202.133
- 209.165.202.134
Answers Explanation & Hints: The tunnel source and tunnel destination addresses reference the IP addresses of the physical interfaces on the local and remote routers respectively.
-
What is an IPsec protocol that provides data confidentiality and authentication for IP packets?
- AH
- ESP
- RSA
- IKE
Answers Explanation & Hints: AH (Authentication Header) does not provide confidentiality for IP packets but rather provides data authentication and integrity.ESP ( Encapsulating Security Payload) does provide confidentiality and authentication by encrypting the IP packet. RSA is a cryptosystem used in IKE (Internet Key Exchange) .
-
What two encryption algorithms are used in IPsec VPNs? (Choose two.)
- DH
- PSK
- IKE
- AES
- 3DES
Answers Explanation & Hints: Advanced Encryption Algorithm (AES) and Triple DES (3DES) are encryption algorithms used for IPsec. DIffie-Hellman (DH), Pre-shared Keys (PSK), and Internet Key Exchange (IKE) are all encryption key mechanisms.
-
What is the first step in establishing an IPsec VPN?
- detection of interesting traffic
- negotiation of ISAKMP policies
- creation of a secure tunnel to negotiate a security association policy
- creation of an IPsec tunnel between two IPsec peer
Answers Explanation & Hints: Before an IPsec tunnel can be configured, interesting traffic must be detected. Interesting traffic is defined by an access list permit statement. Once interesting traffic is detected, by matching the access list, IKE phase 1 negotiations can begin that will establish the tunnel.
-
Which two identification methods are used by LISP instead of traditional IP addresses? (Choose two.)
- EIDs
- MRs
- PxTRs
- RLOCs
- xTR
Answers Explanation & Hints: As part of the routing architecture, LISP separates IP addresses into endpoint identifiers (EIDs) and routing locators (RLOCs) so that endpoints can roam from site to site and only the RLOC changes. The EID stays the same.
-
Which LISP header is used to provide a secure boundary between multiple organizations?
- RLOC
- Instance ID
- outer LISP IP header
- outer LISP UDP header
Answers Explanation & Hints: The 24-bit Instance ID field is a value used to provide device- and path-level network virtualization to prevent IP address duplication within a LISP site or provide a secure boundary between multiple organizations.
-
How is routing handled within a LISP site?
- through the use of RLOCs
- through the use of virtual tunnels
- through the use of virtual controllers
- through the use of an interior routing protocol
Answers Explanation & Hints: With any one particular LISP site, the process of routing packets between devices at that site is handled by any interior routing protocol such as RIP, OSPF, or EIGRP.
-
What is the purpose of a VNI when a company is using VXLANs?
- to map Layer 2 to Layer 3 packets
- to uniquely identify overlay networks
- to create a database of EID-to-RLOC mappings
- to facilitate the discovery of underlay Layer 3 networks
Answers Explanation & Hints: A 24-bit VXLAN network identifier (VNI) allows up to 16 million VXLAN segments, also known as overlay networks, to coexist within the same infrastructure.
-
What is the purpose of VTEPs when using VXLANs?
- originate or terminate tunnels
- propagate map replies to end devices
- identify virtual segments within an organization
- provide replies to internal devices when an external device is cloud-based
Answers Explanation & Hints: Virtual tunnel endpoints (VTEPs) originate or terminate VXLAN tunnels and map Layer 2 and Layer 3 packets to the VNI to be used in the overlay network.
-
What are three characteristics of the generic routing encapsulation (GRE) protocol? (Choose three.)
- GRE tunnels support multicast traffic.
- By default, GRE does not include any flow control mechanisms.
- Developed by the IETF, GRE is a secure tunneling protocol that was designed for Cisco routers.
- GRE uses AES for encryption unless otherwise specified.
- GRE creates additional overhead for packets that are traveling through the VPN.
- GRE provides encapsulation for a single protocol type that is traveling through the VPN.
Answers Explanation & Hints: GRE was developed by Cisco and encapsulates a wide variety of protocol packet types inside IP tunnels. GRE is stateless and does not include any flow control mechanisms by default. GRE is defined in an IETF standard. GRE does not include any strong security mechanisms to protect the traffic that crosses the site-to-site VPN. GRE supports routing protocols by using multicast traffic as a carrier protocol. GRE headers and the tunneling IP header create additional overhead for tunneled packets. GRE provides encapsulation for multiple protocol types inside an IP tunnel.
-
By the use of sequence numbers, which function of the IPsec security services prevents spoofing by verifying that each packet is non-duplicated and unique?
- anti-replay protection
- authentication
- confidentiality
- data integrity
Answers Explanation & Hints: Anti-replay protection is the ability to detect and reject replayed packets. By comparing sequence numbers, it helps prevent spoofing by verifying that each packet is unique and not duplicated. Authentication verifies the identity of the source of the data that is sent. Confidentiality is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Data integrity is achieved by IPsec because the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way.
-
Match the LISP term to the definition. (Not all options are used.)
-
What is the purpose of a proxy ETR used with LISP?
- to communicate with a non-LISP site
- to send map request packets to the MR on behalf of an ETR
- to perform a DNS lookup for any EID within an LISP site
- to register any EID addresses that are not within the mapping database
Answers Explanation & Hints: A proxy egress tunnel router (PETR) is a router that connects to a non-LISP site such as to the Internet or a data center when a LISP site needs to communicate to a non-LISP site.
-
Which algorithm is considered insecure for use in IPsec encryption?
- 3DES
- AES
- RSA
- SHA-1
Answers Explanation & Hints: Both DES and 3DES are considered to be too insecure to be used in IPsec encryption. AES is the recommended encryption algorithm. SHA-1 is a hashing algorithm and RSA is used during the initial key exchange.
-
Refer to the exhibit. What algorithm is being used to provide public key exchange?
- Diffie-Hellman
- SHA
- AES
- RSA
Answers Explanation & Hints: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method and allows two IPsec peers to establish a shared secret key over an insecure channel.