Welcome to your CCNA 3 V7 Modules 6 – 8: WAN Concepts
1.
Which two technologies are categorized as private WAN infrastructures? (Choose two.)
2.
What type of address is 64.101.198.197?
3.
What does NAT overloading use to track multiple internal hosts that use one inside global address?
4.
Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?
5.
What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)
6.
Which type of VPN involves passenger, carrier, and transport protocols?
7.
Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?
8.
Refer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address?
9.
What is a disadvantage of NAT?
10.
What algorithm is used with IPsec to provide data confidentiality?
11.
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
12.
Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?
13.
Which circumstance would result in an enterprise deciding to implement a corporate WAN?
14.
Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)
15.
What type of address is 10.100.126.126?
16.
What type of address is 128.107.240.239?
17.
Which two technologies provide enterprise-managed VPN solutions? (Choose two.)
18.
Which statement describes a VPN?
19.
Based on the configuration and the output shown, what can be determined about the NAT status within the organization?
Refer to the exhibit. The NAT configuration applied to the router is as follows:
ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)# ip nat inside source list 1 pool corp overload
ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside
20.
Which two WAN infrastructure services are examples of private connections? (Choose two.)
21.
Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect?
22.
What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?
23.
Which statement describes an important characteristic of a site-to-site VPN?
24.
Which type of VPN connects using the Transport Layer Security (TLS) feature?
25.
How is “tunneling” accomplished in a VPN?
26.
What type of address is 10.19.6.7?
27.
Which two statements about the relationship between LANs and WANs are true? (Choose two.)
28.
Which type of VPN uses the public key infrastructure and digital certificates?
29.
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
30.
In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?
31.
Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?
32.
What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)
33.
Which is a requirement of a site-to-site VPN?
34.
A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?
35.
What two addresses are specified in a static NAT configuration?
36.
Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?
37.
What type of address is 64.100.190.189?
38.
What type of address is 10.100.34.34?
39.
What is a disadvantage when both sides of a communication use PAT?
40.
Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.)
41.
What are two tasks to perform when configuring static NAT? (Choose two.)
42.
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?
43.
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)
44.
What type of address is 10.131.48.7?
45.
Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?
46.
What is the function of the Diffie-Hellman algorithm within the IPsec framework?
47.
Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?
48.
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
49.
Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?
50.
Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)
51.
Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?
52.
Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?
53.
Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)
54.
A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)
55.
What type of address is 192.168.7.126?
56.
Which type of VPN has both Layer 2 and Layer 3 implementations?
57.
Refer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?
58.
What type of address is 198.133.219.148?
59.
Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)
60.
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
61.
Which situation describes data transmissions over a WAN connection?
62.
Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?
63.
Refer to the exhibit. A network administrator is viewing the output from the command show ip nat translations . Which statement correctly describes the NAT translation that is occurring on router RT2?
64.
Which network scenario will require the use of a WAN?