Check answers here:
Modules 6 – 8: WAN Concepts Exam Answers
Quiz-summary
0 of 72 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
Information
CCNA 3 v7 Modules 6 – 8: WAN Concepts Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 72 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- Answered
- Review
-
Question 1 of 72
1. Question
1 pointsWhich two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)Correct
Incorrect
-
Question 2 of 72
2. Question
1 pointsA network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?Correct
Incorrect
-
Question 3 of 72
3. Question
1 pointsWhat are two tasks to perform when configuring static NAT? (Choose two.)Correct
Incorrect
-
Question 4 of 72
4. Question
1 pointsWhat is a disadvantage of NAT?Correct
Incorrect
-
Question 5 of 72
5. Question
1 pointsRefer to the exhibit. From the perspective of R1, the NAT router, which address is the inside global address?Correct
Incorrect
Hint
There are four types of addresses in NAT terminology. Inside local address Inside global address Outside local address Outside global address The inside global address of PC1 is the address that the ISP sees as the source address of packets, which in this example is the IP address on the serial interface of R1, 209.165.200.224. -
Question 6 of 72
6. Question
1 pointsRefer to the exhibit. Given the commands as shown, how many hosts on the internal LAN off R1 can have simultaneous NAT translations on R1?Correct
Incorrect
Hint
The NAT configuration on R1 is static NAT which translates a single inside IP address, 192.168.0.10 into a single public IP address, 209.165.200.255. If more hosts need translation, then a NAT pool of inside global address or overloading should be configured. -
Question 7 of 72
7. Question
1 pointsRefer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)Correct
Incorrect
Hint
The show ip nat statistics, show ip nat translations, and debug ip nat commands are useful in determining if NAT is working and and also useful in troubleshooting problems that are associated with NAT. NAT is working, as shown by the hits and misses count. Because there are four misses, a problem might be evident. The standard access list numbered 1 is being used and the translation pool is named NAT as evidenced by the last line of the output. Both static NAT and NAT overload are used as seen in the Total translations line. -
Question 8 of 72
8. Question
1 pointsRefer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?Correct
Incorrect
Hint
Because the packet is between RT2 and the web server, the source IP address is the inside global address of PC, 209.165.200.245. -
Question 9 of 72
9. Question
1 pointsRefer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?Correct
Incorrect
Hint
The output shows that there are two inside global addresses that are the same but that have different port numbers. The only time port numbers are displayed is when PAT is being used. The same output would be indicative of PAT that uses an address pool. PAT with an address pool is appropriate when more than 4,000 simultaneous translations are needed by the company. -
Question 10 of 72
10. Question
1 pointsRefer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?Correct
Incorrect
Hint
From the perspective of users behind NAT, inside global addresses are used by external users to reach internal hosts. Inside local addresses are the addresses assigned to internal hosts. Outside global addresses are the addresses of destinations on the external network. Outside local addresses are the actual private addresses of destination hosts behind other NAT devices. -
Question 11 of 72
11. Question
1 pointsRefer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)Correct
Incorrect
Hint
Static NAT is a one-to-one mapping between an inside local address and an inside global address. By using static NAT, external devices can initiate connections to internal devices by using the inside global addresses. The NAT devices will translate the inside global address to the inside local address of the target host. -
Question 12 of 72
12. Question
1 pointsWhat is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?Correct
Incorrect
Hint
Dynamic NAT uses a pool of inside global addresses that are assigned to outgoing sessions. If there are more internal hosts than public addresses in the pool, then an administrator can enable port address translation with the addition of the overload keyword. With port address translation, many internal hosts can share a single inside global address because the NAT device will track the individual sessions by Layer 4 port number. -
Question 13 of 72
13. Question
1 pointsRefer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?Correct
Incorrect
Hint
The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT. -
Question 14 of 72
14. Question
1 pointsRefer to the exhibit. The NAT configuration applied to the router is as follows:ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255 ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224 ERtr(config)# ip nat inside source list 1 pool corp overload ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4 ERtr(config)# interface gigabitethernet 0/0 ERtr(config-if)# ip nat inside ERtr(config-if)# interface serial 0/0/0 ERtr(config-if)# ip nat outside
Based on the configuration and the output shown, what can be determined about the NAT status within the organization?Correct
Incorrect
Hint
There is not enough information given because the router might not be attached to the network yet, the interfaces might not have IP addresses assigned yet, or the command could have been issued in the middle of the night. The output does match the given configuration, so no typographical errors were made when the NAT commands were entered. -
Question 15 of 72
15. Question
1 pointsWhich situation describes data transmissions over a WAN connection?Correct
Incorrect
Hint
When two offices across a city are communicating , it is most likely that the data transmissions are over some type of WAN connection. Data communications within a campus are typically over LAN connections. -
Question 16 of 72
16. Question
1 pointsWhich two technologies are categorized as private WAN infrastructures? (Choose two.)Correct
Incorrect
Hint
Private WAN technologies include leased lines, dialup, ISDN, Frame Relay, ATM, Ethernet WAN (an example is MetroE), MPLS, and VSAT. -
Question 17 of 72
17. Question
1 pointsWhich network scenario will require the use of a WAN?Correct
Incorrect
Hint
When traveling employees need to connect to a corporate email server through a WAN connection, the VPN will create a secure tunnel between an employee laptop and the corporate network over the WAN connection. Obtaining dynamic IP addresses through DHCP is a function of LAN communication. Sharing files among separate buildings on a corporate campus is accomplished through the LAN infrastructure. A DMZ is a protected network inside the corporate LAN infrastructure. -
Question 18 of 72
18. Question
1 pointsWhat are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authenticity) are MD5 and SHA. -
Question 19 of 72
19. Question
1 pointsWhat two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two algorithms that can be used within an IPsec policy to protect interesting traffic are AES, which is an encryption protocol, and SHA, which is a hashing algorithm. -
Question 20 of 72
20. Question
1 pointsWhich VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?Correct
Incorrect
Hint
When a web browser is used to securely access the corporate network, the browser must use a secure version of HTTP to provide SSL encryption. A VPN client is not required to be installed on the remote host, so a clientless SSL connection is used. -
Question 21 of 72
21. Question
1 pointsWhich IPsec security function provides assurance that the data received via a VPN has not been modified in transit?Correct
Incorrect
Hint
Integrity is a function of IPsec and ensures data arrives unchanged at the destination through the use of a hash algorithm. Confidentiality is a function of IPsec and utilizes encryption to protect data transfers with a key. Authentication is a function of IPsec and provides specific access to users and devices with valid authentication factors. Secure key exchange is a function of IPsec and allows two peers to maintain their private key confidentiality while sharing their public key. -
Question 22 of 72
22. Question
1 pointsWhich two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)Correct
Incorrect
Hint
Enterprise managed VPNs can be deployed in two configurations:- Remote Access VPN – This VPN is created dynamically when required to establish a secure connection between a client and a VPN server. Remote access VPNs include client-based IPsec VPNs and clientless SSL VPNs.
- Site-to-site VPN – This VPN is created when interconnecting devices are preconfigured with information to establish a secure tunnel. VPN traffic is encrypted only between the interconnecting devices, and internal hosts have no knowledge that a VPN is used. Site-to-site VPNs include IPsec, GRE over IPsec, Cisco Dynamic Multipoint (DMVPN), and IPsec Virtual Tunnel Interface (VTI) VPNs.
-
Question 23 of 72
23. Question
1 pointsWhich is a requirement of a site-to-site VPN?Correct
Incorrect
Hint
Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic. -
Question 24 of 72
24. Question
1 pointsWhat is the function of the Diffie-Hellman algorithm within the IPsec framework?Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel. -
Question 25 of 72
25. Question
1 pointsWhat does NAT overloading use to track multiple internal hosts that use one inside global address?Correct
Incorrect
Hint
NAT overloading, also known as Port Address Translation (PAT), uses port numbers to differentiate between multiple internal hosts. -
Question 26 of 72
26. Question
1 pointsRefer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?Correct
Incorrect
Hint
In static NAT a single inside local address, in this case 192.168.0.10, will be mapped to a single inside global address, in this case 209.165.200.225. Internet hosts will send packets to PC1 and use as a destination address the inside global address 209.165.200.225. -
Question 27 of 72
27. Question
1 pointsRefer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?Correct
Incorrect
Hint
Because no outside local or outside global address is referenced, the traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by using static NAT. In the output from the command show ip nat translations, the inside local IP address of 192.168.2.20 is being translated into an outside IP address of 192.0.2.254 so that the traffic can cross the public network. A public IPv4 device can connect to the private IPv4 device 192.168.254.253 by targeting the destination IPv4 address of 192.0.2.88. -
Question 28 of 72
28. Question
1 pointsWhich two WAN infrastructure services are examples of private connections? (Choose two.)Correct
Incorrect
Hint
Private WANs can use T1/E1, T3/E3, PSTN, ISDN, Metro Ethernet, MPLS, Frame Relay, ATM, or VSAT technology. -
Question 29 of 72
29. Question
1 pointsWhich two statements about the relationship between LANs and WANs are true? (Choose two.)Correct
Incorrect
Hint
Although LANs and WANs can employ the same network media and intermediary devices, they serve very different areas and purposes. The administrative and geographical scope of a WAN is larger than that of a LAN. Bandwidth speeds are slower on WANs because of their increased complexity. The Internet is a network of networks, which can function under either public or private management. -
Question 30 of 72
30. Question
1 pointsWhich statement describes an important characteristic of a site-to-site VPN?Correct
Incorrect
Hint
A site-to-site VPN is created between the network devices of two separate networks. The VPN is static and stays established. The internal hosts of the two networks have no knowledge of the VPN. -
Question 31 of 72
31. Question
1 pointsHow is “tunneling” accomplished in a VPN?Correct
Incorrect
Hint
Packets in a VPN are encapsulated with the headers from one or more VPN protocols before being sent across the third party network. This is referred to as “tunneling”. These outer headers can be used to route the packets, authenticate the source, and prevent unauthorized users from reading the contents of the packets. -
Question 32 of 72
32. Question
1 pointsWhich statement describes a VPN?Correct
Incorrect
Hint
A VPN is a private network that is created over a public network. Instead of using dedicated physical connections, a VPN uses virtual connections routed through a public network between two network devices. -
Question 33 of 72
33. Question
1 pointsOpen the PT Activity. Perform the tasks in the activity instructions and then answer the question.Correct
Incorrect
Hint
The output of show ip nat statistics shows that the inside interface is FastEthernet0/0 but that no interface has been designated as the outside interface. This can be fixed by adding the command ip nat outside to interface Serial0/0/0. -
Question 34 of 72
34. Question
1 pointsWhat type of address is 64.100.190.189?Correct
Incorrect
-
Question 35 of 72
35. Question
1 pointsWhich type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?Correct
Incorrect
-
Question 36 of 72
36. Question
1 pointsMatch the scenario to the WAN solution. (Not all options are used.)Sort elements
- Frame Relay
- DSL
- T1
- cable
- MetroE
- VSAT
-
A company has a headquarters and four remote locations. The headquarters site will require more bandwidth than the four remote sites.
-
A company requires higher download speeds than upload speeds and wants to use existing phone lines.
-
A company would like guaranteed bandwidth using a point-to-point link that requires minimal expertise to install and maintain.
-
A teleworker would like to bundle the Internet connection with other phone and TV services.
-
A multisite college wants to connect using Ethernet technology between the sites.
Correct
Incorrect
-
Question 37 of 72
37. Question
1 pointsQuestion as presented: Refer to the exhibit. The PC is sending a packet to the Server on the remote network. Router R1 is performing NAT overload. From the perspective of the PC, match the NAT address type with the correct IP address. (Not all options are used.)Sort elements
- 192.0.2.1
- 203.0.113.5
- 10.130.5.76
- 203.0.113.14
- 192.0.2.2
- 10.130.5.1
-
Inside global
-
Outside global
-
Inside local
Correct
Incorrect
-
Question 38 of 72
38. Question
1 pointsRefer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?Correct
Incorrect
Hint
In order for NAT translations to work properly, both an inside and outside interface must be configured for NAT translation on the router. -
Question 39 of 72
39. Question
1 pointsIn NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?Correct
Incorrect
Hint
From the perspective of a NAT device, inside global addresses are used by external users to reach internal hosts. Inside local addresses are the addresses assigned to internal hosts. Outside global addresses are the addresses of destinations on the external network. Outside local addresses are the actual private addresses of destination hosts behind other NAT devices. -
Question 40 of 72
40. Question
1 pointsRefer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.)Correct
Incorrect
Hint
The output displayed in the exhibit is the result of the show ip nat translations command. Static NAT entries are always present in the NAT table, while dynamic entries will eventually time out. -
Question 41 of 72
41. Question
1 pointsWhich circumstance would result in an enterprise deciding to implement a corporate WAN?Correct
Incorrect
Hint
WANs cover a greater geographic area than LANs do, so having employees distributed across many locations would require the implementation of WAN technologies to connect those locations. Customers will access corporate web services via a public WAN that is implemented by a service provider, not by the enterprise itself. When employee numbers grow, the LAN has to expand as well. A WAN is not required unless the employees are in remote locations. LAN security is not related to the decision to implement a WAN. -
Question 42 of 72
42. Question
1 pointsWhat is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The Hashed Message Authentication Code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message. -
Question 43 of 72
43. Question
1 pointsWhat algorithm is used with IPsec to provide data confidentiality?Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm that is used for authentication. -
Question 44 of 72
44. Question
1 pointsWhich two technologies provide enterprise-managed VPN solutions? (Choose two.)Correct
Incorrect
Hint
VPNs can be managed and deployed as either of two types:- Enterprise VPNs – Enterprise-managed VPNs are a common solution for securing enterprise traffic across the internet. Site-to-site and remote access VPNs are examples of enterprise managed VPNs.
- Service Provider VPNs – Service provider managed VPNs are created and managed over the provider network. Layer 2 and Layer 3 MPLS are examples of service provider managed VPNs. Other legacy WAN solutions include Frame Relay and ATM VPNs.
-
Question 45 of 72
45. Question
1 pointsRefer to the exhibit. A network administrator is viewing the output from the command show ip nat translations. Which statement correctly describes the NAT translation that is occurring on router RT2?Correct
Incorrect
Hint
Because no outside local or outside global address is referenced, the traffic from a source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88 by using static NAT. In the output from the command show ip nat translations, the inside local IP address of 192.168.2.20 is being translated into an outside IP address of 192.0.2.254 so that the traffic can cross the public network. A public IPv4 device can connect to the private IPv4 device 192.168.254.253 by targeting the destination IPv4 address of 192.0.2.88. -
Question 46 of 72
46. Question
1 pointsWhat type of address is 10.100.126.126?Correct
Incorrect
-
Question 47 of 72
47. Question
1 pointsWhich type of VPN connects using the Transport Layer Security (TLS) feature?Correct
Incorrect
-
Question 48 of 72
48. Question
1 pointsWhich two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)Correct
Incorrect
-
Question 49 of 72
49. Question
1 pointsWhich protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?Correct
Incorrect
-
Question 50 of 72
50. Question
1 pointsWhat is a disadvantage when both sides of a communication use PAT?Correct
Incorrect
-
Question 51 of 72
51. Question
1 pointsWhat two addresses are specified in a static NAT configuration?Correct
Incorrect
-
Question 52 of 72
52. Question
1 pointsA company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)Correct
Incorrect
-
Question 53 of 72
53. Question
1 pointsWhat type of address is 128.107.240.239?Correct
Incorrect
-
Question 54 of 72
54. Question
1 pointsWhich type of VPN has both Layer 2 and Layer 3 implementations?Correct
Incorrect
-
Question 55 of 72
55. Question
1 pointsRefer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect?Correct
Incorrect
-
Question 56 of 72
56. Question
1 pointsMatch each component of a WAN connection to its description. (Not all options are used.)Correct
Incorrect
-
Question 57 of 72
57. Question
1 pointsWhich type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?Correct
Incorrect
-
Question 58 of 72
58. Question
1 pointsMatch the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to and external server at the IP address 209.165.200.254 across a router R1 that running dynamic NAT. (Not all options are used.)Correct
Incorrect
-
Question 59 of 72
59. Question
1 pointsWhich type of VPN involves passenger, carrier, and transport protocols?Correct
Incorrect
-
Question 60 of 72
60. Question
1 pointsMatch the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)Correct
Incorrect
-
Question 61 of 72
61. Question
1 pointsRefer to the exhibit. A network administrator is viewing the output from the command show ip nat translations . Which statement correctly describes the NAT translation that is occurring on router RT2?Correct
Incorrect
-
Question 62 of 72
62. Question
1 pointsWhat type of address is 10.131.48.7?Correct
Incorrect
-
Question 63 of 72
63. Question
1 pointsWhich type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?Correct
Incorrect
-
Question 64 of 72
64. Question
1 pointsWhich type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?Correct
Incorrect
-
Question 65 of 72
65. Question
1 pointsWhat type of address is 10.19.6.7?Correct
Incorrect
-
Question 66 of 72
66. Question
1 pointsWhat type of address is 64.101.198.197?Correct
Incorrect
-
Question 67 of 72
67. Question
1 pointsWhat type of address is 64.101.198.107Correct
Incorrect
-
Question 68 of 72
68. Question
1 pointsWhat type of address is 10.100.34.34?Correct
Incorrect
-
Question 69 of 72
69. Question
1 pointsWhat type of address is 192.168.7.126?Correct
Incorrect
-
Question 70 of 72
70. Question
1 pointsWhat type of address is 198.133.219.148?Correct
Incorrect
-
Question 71 of 72
71. Question
1 pointsWhich two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)Correct
Incorrect
-
Question 72 of 72
72. Question
1 pointsWhat type of address is 192.168.7.98?Correct
Incorrect
37. Question
10.130.5.76 is the inside local
Very helpful hints to questions. Please remove the repetitive questions
Thank you so much. Very helpful job.
thank you so much this is very helpful
Thanks guys, this is useful for practice. 👍
ok cool
Hi, Here is another question and its answer:
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address
Thanks you!