Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Network+ Guide to Networks, Seventh Edition Chapter 2 [C HD]Applying Concepts: Configure Address Translation Using NAT At the end of this chapter, youll create your

Network+ Guide to Networks, Seventh Edition Chapter 2 [C HD]Applying Concepts: Configure Address Translation Using NAT At the end of this chapter, youll create your own NAT translation table entry using this example as a template. To help you better understand where the IP address in a translation table entry comes from, answer the following questions about the information in Figures 2-16 and 2-17:
  1. What is the routers outside interface IP address?
  2. What is the routers inside interface IP address?
  3. What is the Web sites public IP address?
  4. What is the private IP address of the active Web server?
[A HD]Review Questions
  1. Which part of a MAC address is unique to each manufacturer?
  1. The network identifier
  2. The OUI
  3. The device identifier
  4. The physical address
  1. What decimal number corresponds to the binary number 11111111?
  1. 255
  2. 256
  3. 127
  4. 11111111
  1. What type of device does a computer turn to first when attempting to make contact with a host on another network?
  1. Default gateway
  2. DNS server
  3. Root server
  4. DHCP server
  1. Which statement actually describes SMTP?
  1. SMTP is a connectionless protocol that uses UDP
  2. SMTP is a connection-based protocol that uses UDP
  3. SMTP is a connectionless protocol that uses TCP
  4. SMTP is a connection-based protocol that uses TCP
  1. When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself?
  1. FE80::/10
  2. FF00::/8
  3. 2001::/64
  4. 2001::/3
  1. You have just brought online a new secondary DNS server and notice your monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
  1. The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server
  2. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
  3. The root and primary DNS servers, because the primary server is requesting zone transfers from the root server.
  4. The Web server and primary DNS server, because the Web server is requesting zone transfers from the primary DNS server.
  1. Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
  1. All devices on the Internet
  2. All devices on your local network
  3. The one device with this given IP address
  4. Because no device can have this given IP address, no devices receive the transmission
  1. If you are connected to a network that uses DHCP, and you need to terminate your Windows workstations DHCP lease, which command would you use?
  1. ipconfig /release
  2. ipconfig /renew
  3. ifconfig /release
  4. ifconfig /new
  1. What computers are the highest authorities in the Domain Name System hierarchy?
  1. Authoritative name servers
  2. Root servers
  3. Top-level domain servers
  4. Primary DNS server
  1. What version of SMB can be used across Windows, UNIX, and other operating systems?
  1. SIP (Session Initiation Protocol)
  2. RDP (Remote Desktop Protocol)
  3. CIFS (Common Internet File System)
  4. MGCP (Media Gateway Control Protocol)
  1. Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?
  2. Which type of DNS record identifies a mail server?
  3. How many bits does an IPv6 address contain?
  4. On what port is an IPv6 client listening for DHCP messages?
  5. The second 64 bits of an autoconfigured IPv6 address may either be random or generated from the computers MAC address, which contains 48 bits. What standard defines the conversion of the MAC address to the IPv6 64-bit device ID?
  6. You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using?
  7. What protocol does a network gateway use to keep track of which internal client is talking to which external Web server?
  8. You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your networks DHCP server to issue IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have left for the day?
  9. What is the range of IP addresses that might be assigned by APIPA?
  10. While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
  11. FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port is the FTP server listening on?
  12. While troubleshooting a network connection problem for a coworker, you discover that the computer has a static IP address and is giving a duplicate IP address error. What command-line utility can you use to find out what other device may already be using that IP address?
  13. What is the IPv4 loopback address? What is the IPv6 loopback address?
  14. You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
  15. You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
  16. If you know that your colleagues TCP/IP host name is JSMITH, and you need to find out his IP address, what command should you type at your shell prompt or command prompt?
  17. When determining whether a local network has any NetBIOS traffic, do you use the nslookup utility in interactive mode or a packet analyzer such as Wireshark?
  18. List three signaling protocols discussed in the chapter that are used for communicating multimedia data.
  19. What version of the ping command do you use in Windows with IPv6 addresses? What version do you use on a Linux system?
  20. When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which protocol is in use for this session? What command-line utility might you use to find out who the host is?
[B HD]Project 2-1: Create a NAT Translation Table Entry [B HD]Your corporation hosts a Web site at the static public IP address 92.110.30.123. A router directs this traffic to a Web server at the private IP address 192.168.11.100. However, the Web server needs a hardware upgrade and will be down for two days. Your network administrator has asked you to configure the router so that requests to the IP address 92.110.30.123 are redirected to the backup server for the Web site, which has the private IP address 192.168.11.110. The routers inside Ethernet interface uses IP address 192.168.11.254 and its outside interface uses the IP address 92.110.30.65. Answer the following questions about the new static route youll be creating:
  1. What is the routers outside interface IP address?
  2. What is the routers inside interface IP address?
  3. What is the Web sites public IP address?
  4. What is the private IP address of the backup Web server?
[B HD]Use the example given earlier in the chapter as a template to create the NAT translation table entries for the address translation. For the subnet masks, use the default subnet mask for a Class C IP address license. Include appropriate comment lines in your table.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Recommended Textbook for

Intermediate Accounting

Authors: James D. Stice, Earl K. Stice, Fred Skousen

17th Edition

978-0324592375

Students also viewed these General Management questions

Question

QQ Understand how the Web works.

Answered: 1 week ago

Question

QQ Explain the current structure of the Internet.

Answered: 1 week ago

Question

QQ Understand the impact of mobile applications.

Answered: 1 week ago