This document contains a chapter review with multiple choice, true/false, matching, short answer, and completion questions about network address translation (NAT) and related topics. Some key points covered include:
- NAT allows private IP networks to connect to the public Internet by mapping private IP addresses to public IP addresses. It provides advantages like conserving public IP addresses and enhancing network security.
- The three main types of NAT are static NAT, dynamic NAT, and port address translation (PAT). Static NAT uses a one-to-one mapping, dynamic NAT maps private addresses to a pool of public addresses, and PAT maps multiple private addresses to a single public IP address using port numbers.
- Other topics covered include
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Best Answers.LESSON 10 1. What is the primary reason IPv6 h.docxCruzIbarra161
Best Answers.
LESSON 10 :
1. What is the primary reason IPv6 has not completely replaced IPv4?
a. Administrators are hesitant and reluctant to change.
b. Stopgap technologies such as Network Address Translation (NAT) and Classless
Inter-Domain Routing (CIDR) alleviate the lack of registered IPv4 addresses.
c. IPv4 addresses have only been depleted since early 2011.
d. IPv6 has already replaced IPv4 on the Internet.
2. What is the primary difference between a NAT server and a proxy server?
a. There is no difference; they are functionally the same.
b. There is little difference because NAT servers and proxy servers; both act as an intermediary
between networks.
c. Proxy servers offer additional functions such as they can scan, cache, and filter certain
types of data.
d. NAT servers translate at the Network layer of the protocol stack, whereas proxy servers
function at the Application layer.
3. Your company environment includes Windows Server versions 2003, 2008, and 2012.
Desktops range from Windows XP and Vista. To transition to IPv6, what versions have
IPv6 support running by default?
a. Windows Server 2008, Windows Server 2012, and Vista have IPv6 running by
default.
b. All versions have IPv6 running by default, except the Windows 2003 servers.
c. Windows Server 2003 and Windows XP both include support for IPv6, but they do
not install it by default.
d. Only Windows Server 2012 has IPv6 running by default.
4. What Windows Server 2012 services and applications offer IPv6 support?
a. Nearly all server roles provide IPv6 support.
b. Few offer IPv6 support, but they are expected soon.
c. All offer IPv6 support in Windows Server 2012.
d. Remote Access supports IPv6 routing and advertising, and the DHCP Server role can
allocate IPv6 addresses.
5. What is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)?
a. ISATAP converts IPv4 address for an IPv6 network just as 6to4 offers.
b. ISATAP emulates an IPv6 link for use on an IPv4 network.
c. ISATAP is a method of multicasting for IPv6 networks.
d. ISATAP translates between IPv4 and IPv6 networks without client configuration.
LESSON 11 :
1. One method a Dynamic Host Configuration Protocol (DHCP) server allocates IP
addresses is called manual allocation. This process involves manually assigning an IP
address to a particular server. What is the key benefit of DHCP manual allocation over
manually configuring the address directly on the server?
a. The DHCP server then contains a centralized list of permanently assigned addresses.
b. The DHCP server might pass on more information than just an IP address.
c. This process prevents accidental duplication of permanently assigned IP addresses.
d. This manually assigned address is officially known as a reservation.
2. Your DHCP servers are burdened with heavy traffic, most related to IP address renewals.
Unfortunately, virtually all the IP addresses in each of your subnets are allocated. Which
of the following options is the best way to lower the.
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
Assigning an IP address dynamically is the most basic piece but there is a lot more to DHCP. This includes the netmask, host name, domain name, gateway and name servers. In addition, DHCP can supply other information such as a time server.
Many people are anti-DHCP, because they see it as a way that an ISP offers you an IP address that changes. This, of course, makes it difficult to advertise a server. On the other hand, DHCP can save you a lot of ongoing configuration work within your company or organization.
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. https://www.pass4sureexam.com/70-413.html
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
Protection Center lets you manage Symantec Endpoint Protection together with other Symantec products in a single environment. Symantec Endpoint Protection is integrated with Protection Center by means of a series of Web services.
These Web services provide communication between the Symantec Endpoint Protection Manager server and the Protection Center server.
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
You can centrally manage all types of servers from the Admin page in the Symantec Endpoint Protection Manager Console.
The Admin page, under View Servers, lists the following groupings:
■ Local Site
The console on the local site, databases, replication partners, such as other consoles whose databases replicate, and optional Enforcers
■ Remote Sites
The console on any remote site, databases, replication partners, such as other management servers whose databases replicate, and optional Enforcers
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
A site consists of one database, one or more management servers, and clients. By
default, you deploy Symantec Endpoint Protection with a single site. Organizations
with more than one datacenter or physical location generally use multiple sites.
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
Symantec Endpoint Protection collects information about the security events in your network. You can use log and reports to view these events, and you can use notifications to stay informed about the events as they occur.
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
After completing this unit, you should be able to:
List the major elements common to the IBM BladeCenter
Describe the key aspects of compatibility between BladeCenter models
Identify the components providing redundancy in the BladeCenter chassis
Match the power components necessary to support varying BladeCenter resource configurations
List the power input requirements for the BladeCenter models
Describe the common cooling components used in the BladeCenter chassis
Describe the supported disk configurations for the BladeCenter S
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, Windows and Mac computers, and servers in your network against malware.
Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your computers against known and unknown threats.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
1. Chapter 9
True/False
Indicate whether the statement is true or false.
____ 1. Cisco developed NAT, and today the technology is used by routers, firewalls, and even individual computers
with multiple network connections.
____ 2. Static NAT must be used if you want clients outside your network to access services on your servers.
____ 3. The overlapping problem cannot be solved using NAT because NAT hides the internal IP scheme.
____ 4. Most people prefer to use names, not IP addresses, when communicating with network devices.
____ 5. Windows Internet Name Service (WINS) servers are not supported by Cisco routers.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 6. NAT is defined in RFC ____, which describes methods for connecting private (internal) IP addresses to the
Internet.
a. 1022 c. 2145
b. 1133 d. 3022
____ 7. ____ uses a one-to-one mapping or one-to-many mapping method to allow one or more private IP clients to
gain access to the Internet by mapping the private IP addresses to public IP addresses.
a. DHCP c. WINS
b. NAT d. NetBEUI
____ 8. NAT is available in three forms: Static NAT, Dynamic NAT, and ____.
a. WINS c. PAT
b. DHCP d. IP-AT
____ 9. ____ must be used if you want clients outside your network to access services on your servers.
a. Static NAT c. PAT
b. Dynamic NAT d. Dynamic PAT
____ 10. To differentiate between the connections, ____ uses multiple public TCP and UDP ports to create unique
sockets that map to internal IP addresses.
a. PAT c. dynamic NAT
b. static NAT d. virtual NAT
____ 11. You could turn off the lookup feature on a Cisco router by using the ____ command.
a. no domain-lookup c. no ip domain
b. no ip domain-lookup d. no ip lookup
____ 12. NAT servers use ____ to send connections from external clients to the Web server on the internal network.
a. nat relay c. port relay
b. port forwarding d. dhcp relay
____ 13. ____ is a popular and important naming service.
2. a. PAT c. DHCP
b. DNS d. NAT
____ 14. The command to configure a DNS lookup on a Cisco router is ____.
a. ip domain-lookup c. ip name-server
b. ip dns d. ip dns-server
____ 15. The ____ command enables DNS if it has previously been disabled.
a. ip domain-lookup c. ip name-server
b. domain-lookup on d. ip dns enable
____ 16. The ____ command is optional, but provides a domain suffix for the names.
a. ip domain-name c. ip domain-suffix
b. ip suffix-name d. ip suffix
____ 17. RARP and ____ servers issue IP configuration information based on a host’s MAC address and require manu-
al preconfiguration for each host.
a. WINS c. BOOTP
b. DNS d. NetBEUI
____ 18. ____ manages addressing by leasing the IP information to the hosts.
a. DNS c. WINS
b. DHCP d. DNCP
____ 19. DHCP is enabled by default in the Cisco IOS. If you want to make sure it is enabled, use the ____ command
at the global configuration mode prompt.
a. dhcp on c. enable service dhcp
b. enable dhcp d. service dhcp
____ 20. Cisco’s DHCP server implementation prefers to save the IP configuration parameters it has sent to a particular
host. These are called ____.
a. tokens c. bindings
b. overlapping d. enablings
____ 21. When monitoring DHCP, the best way to check the bindings is to execute the ____ command on the router.
a. show binding c. show ip domain-server
b. show ip dhcp d. show ip dhcp binding
____ 22. For information on the specific DHCP address pool, use the ____ command.
a. show ip pool c. show domain pool
b. show ip dhcp pool d. show address pool
____ 23. When you launch the SDM program, you see the Home tab. To see all of the parameters that can be config-
ured, click the ____ button.
a. Configure c. Tools
b. Options d. Preferences
____ 24. The only difference between using SDM to configure dynamic NAT versus PAT is that in the ____ dialog
box, you choose to translate to a single outside interface rather than a pool of addresses.
a. Select Translation Rule c. Address Pool Rule
b. Add Address Pool d. Add Address Translation Rule
____ 25. You can point your router to a DNS server for name resolution simply by configuring the ____ command.
a. ip name-server c. ip dns-server
3. b. ip domain dns d. ip domain-server
____ 26. Regarding SDM, you access the DHCP configuration area using the ____ button.
a. DHCP Preferences c. Additional Options
b. Additional Tasks d. Services Tasks
Completion
Complete each statement.
27. ___________________________________ allows many home users, corporations, and organizations around
the world to connect far more computers to the Internet than they would otherwise be able to connect.
28. ____________________ is the simplest form of NAT, in which a single private IP address is mapped to a sin-
gle public IP address.
29. ____________________ means that the NAT router automatically maps a group of valid local IP addresses to
a group of Internet IP addresses, as needed.
30. ____________________ occurs when the internal network has been incorrectly configured for an IP range
that actually exists on the Internet (registered to another entity) or when two companies merge and each com-
pany was using the same private IP address range.
31. By default, a Cisco router will try several times to find an IP address for a name if you enter one. This auto-
matic translation is called a(n) ____________________.
Matching
Match each item with a statement below:
a. Port address translation f. DHCP
b. Socket g. DHCP relay
c. Static NAT h. Security Device Manager (SDM)
d. DNS i. DHCP DISCOVER
e. ip host command
____ 32. translates names into IP addresses
____ 33. forwarding of a DHCP request
____ 34. a combination of the IP address and port
____ 35. message broadcasted on the network when hosts are configured to use DHCP
____ 36. a one-to-one mapping of private IP addresses to public IP addresses
____ 37. provides IP configuration information to hosts on bootup
____ 38. a special form of dynamic NAT; also known as overloading
____ 39. provides name resolution on a Cisco router
____ 40. a Web-based tool for advanced configuration on Cisco routers
4. Short Answer
41. What are the advantages of using private addressing with NAT?
42. What are some of the disadvantages of NAT?
43. Describe static NAT.
44. Describe dynamic NAT.
45. Briefly describe overlapping.
46. What are the steps for configuring dynamic NAT?
47. What are the steps for configuring port address translation?
48. Compare DHCP with RARP and BOOTP.
49. Describe the DHCP process.
5. 50. What are the steps for configuring DHCP?
Chapter 9
Answer Section
TRUE/FALSE
1. ANS: T PTS: 1 REF: 238
2. ANS: T PTS: 1 REF: 239
3. ANS: F PTS: 1 REF: 241
4. ANS: T PTS: 1 REF: 244
5. ANS: F PTS: 1 REF: 245
MULTIPLE CHOICE
6. ANS: D PTS: 1 REF: 238
7. ANS: B PTS: 1 REF: 238
8. ANS: C PTS: 1 REF: 238
9. ANS: A PTS: 1 REF: 239
10. ANS: A PTS: 1 REF: 240
11. ANS: B PTS: 1 REF: 245
12. ANS: B PTS: 1 REF: 241
13. ANS: B PTS: 1 REF: 244
14. ANS: C PTS: 1 REF: 245
15. ANS: A PTS: 1 REF: 245
16. ANS: A PTS: 1 REF: 245
17. ANS: C PTS: 1 REF: 246
18. ANS: B PTS: 1 REF: 246
19. ANS: D PTS: 1 REF: 246
20. ANS: C PTS: 1 REF: 246-247
21. ANS: D PTS: 1 REF: 248
22. ANS: B PTS: 1 REF: 248
23. ANS: A PTS: 1 REF: 249
24. ANS: D PTS: 1 REF: 251
25. ANS: A PTS: 1 REF: 251
26. ANS: B PTS: 1 REF: 252
COMPLETION
27. ANS:
Network address translation (NAT)
Network address translation
NAT
PTS: 1 REF: 238
28. ANS: Static NAT
6. PTS: 1 REF: 239
29. ANS: Dynamic NAT
PTS: 1 REF: 240
30. ANS: Overlapping
PTS: 1 REF: 241
31. ANS: lookup
PTS: 1 REF: 245
MATCHING
32. ANS: D PTS: 1 REF: 244
33. ANS: G PTS: 1 REF: 246
34. ANS: B PTS: 1 REF: 240
35. ANS: I PTS: 1 REF: 246
36. ANS: C PTS: 1 REF: 241
37. ANS: F PTS: 1 REF: 246
38. ANS: A PTS: 1 REF: 240
39. ANS: E PTS: 1 REF: 244
40. ANS: H PTS: 1 REF: 248
SHORT ANSWER
41. ANS:
Using private addressing with NAT has several advantages over public IP addressing. First, it conserves pub-
lic IP addresses. Networks can make use of the private IP address ranges and NAT to either a single external
public IP or a smaller pool of public IP addresses. It also hides your internal IP addressing scheme from the
outside world, greatly enhancing network security. Finally, it allows for easy renumbering of your IP address-
es. For example, if you use all public IP addresses and suddenly decide to change ISPs, you must change all
of your internal IP addressing. Using NAT, the internal network uses private IP addresses, which need not
change. You would only need to change your outside NAT addresses if you decided to change ISPs.
PTS: 1 REF: 238
42. ANS:
NAT presents some disadvantages. NAT introduces a small amount of delay into your network because the
NAT router has to create and maintain the NAT table, which is a table of inside addresses and the associated
outside addresses. In addition, due to the translation of the source IP address, end-to-end IP traceability is lost.
While it is still possible to track a packet back to the NAT device, finding the actual original host is difficult.
Finally, some applications fail due to NAT, although this was more of a problem when NAT was first imple-
mented. Today, most modern applications expect NAT to be present on a network.
PTS: 1 REF: 238
43. ANS:
7. Static NAT is the simplest form of NAT, in which a single private IP address is mapped to a single public IP
address. For example, a router could be configured to translate all communications from the internal
192.168.0.1 address to the address 209.86.192.197. In this way, when the host 192.168.0.1 accesses the Inter-
net, the router will translate its IP address to 209.86.192.197. The router will then translate communications
between that host and any system on the Internet. Therefore, all Internet devices will communicate with host
209.86.192.197, but the actual packets will be forwarded by the NAT router to host 192.168.0.1 on the local
network. In order for the NAT router to translate communications between the internal and external network,
it must maintain a table in memory that maps internal IP addresses to addresses presented to the Internet (ex-
ternal addresses). With static NAT, the mapping is one-to-one. For example, internal address 192.168.0.1
maps to 209.86.192.197, address 192.168.0.2 maps to 209.86.192.198, and so on.
PTS: 1 REF: 239
44. ANS:
Dynamic NAT means that the NAT router automatically maps a group of valid local IP addresses to a group
of Internet IP addresses, as needed. This means that the network administrator is not concerned about which
IP address the internal clients use, just that they can get an address. The network administrator also does not
have to spend any time defining specific one-to-one mappings between the private and public IP addresses.
Any private IP address will automatically be translated to one of the available Internet IP addresses by the
NAT router. Addresses for dynamic NAT are pulled out of a predefined pool of public addresses. The admin-
istrator must define the pool and then state which internal private addresses can use the pool.
PTS: 1 REF: 240
45. ANS:
Overlapping occurs when the internal network has been incorrectly configured for an IP range that actually
exists on the Internet (registered to another entity) or when two companies merge and each company was us-
ing the same private IP address range. This problem usually occurs only when uninformed network engineers
configure a network using arbitrary addresses. Sometimes the thought is that a connection to the Internet will
never be required. In this case, the organization cannot connect directly to the Internet because it has an IP
range registered to someone else. This overlapping problem can be solved using NAT because NAT hides the
incorrectly configured internal IP scheme. The NAT router must be configured to translate the internal IP ad-
dresses to a valid external address or address range. This is really no different than previous forms of NAT
except that the organization’s internal IP address range actually belongs to someone else. The “someone else”
just does not know about it because those addresses are never exposed to the Internet, thanks to NAT. Most
companies do not run into this problem because their network engineers and designers know to use one of the
private IP address ranges (10.x.x.x, 172.16.x.x–172.31.x.x, and 192.168.x.x.) when configuring a private in-
ternal TCP/IP network.
PTS: 1 REF: 241
46. ANS:
Configuring dynamic NAT is a more involved process than setting up static NAT. Still, it can be broken down
into four easy-to-remember steps:
• Configure a standard access control list to define what internal traffic will be translated.
• Define a pool of addresses to be used for dynamic NAT allocation.
• Link the access list to the NAT pool.
• Define interfaces as either inside or outside.
PTS: 1 REF: 242
47. ANS:
8. On smaller networks, the ISP may be unwilling to provide multiple IP addresses to be used for NAT, or the
company may not want to pay for additional IP addresses. When these situations occur, you can configure
port address translation to allow the IP address of a single outside interface to be used for translation.
Configuring PAT is a three-step process:
• Configure a standard access list to define what internal traffic will be translated.
• Link the access list to the interface to be used for PAT.
• Define interfaces as either inside or outside.
PTS: 1 REF: 243
48. ANS:
The Dynamic Host Configuration Protocol (DHCP) provides IP configuration information to hosts on bootup.
This functionality is much like that provided by older protocols RARP and BOOTP. But unlike DHCP
servers, RARP and BOOTP servers issue IP configuration information based on a host’s MAC address and
require manual preconfiguration for each host. In addition, RARP servers can provide only limited informa-
tion and can serve only a single LAN. Unlike its predecessors, DHCP is a truly dynamic way to configure IP
hosts. In addition to the IP address itself, DHCP servers can provide other parameters, such as the WINS and
DNS server addresses, and the default gateway address.
PTS: 1 REF: 246
49. ANS:
DHCP manages addressing by leasing the IP information to the hosts. This leasing allows the information to
be recovered when not in use and reallocated when needed. When hosts are configured to use DHCP, they
broadcast a DHCP DISCOVER message on the network. DHCP servers that hear the broadcast will send a
unicast DHCP OFFER message back to the host. Because a network can have more than one DHCP server,
the host may receive more than one offer. In this case, the host broadcasts a DHCP REQUEST to inform the
other DHCP servers that the host has chosen a configuration from a particular server. Finally, the chosen
DHCP server sends a unicast acknowledgment (DHCP ACK) to the host.
PTS: 1 REF: 246
50. ANS:
This configuration involves the same parameters used when configuring DHCP on a server rather than on a
router. You will need to complete the following steps:
• Define the pool of addresses.
• Configure any optional IP configuration parameters.
• Exclude any statically configured addresses.
PTS: 1 REF: 247