Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?
Options
A. ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240
B. ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
C. ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224
D. ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0
Correct Answer
ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
Explanation
The command
ip nat pool <name> creates the pool that hosts can use to get onto the global Internet. What makes option B correct is that the range 171.16.10.65 through 171.16.10.94 includes 30 hosts, but the mask has to match 30 hosts as well, and that mask is 255.255.255.224. Option C is wrong because the pool name has a lower case "T" in the pool name. Pool name's are case sensitive.
More questions
1. What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.
4. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the Transport layer (layer 4).
5. How many non-overlapping channels are available with 802.11g?
Correct Answer: Issue the show cdp neighbors detail command on the router connected to the switch.
Explanation:
Although option A is certainly the "best" answer, unfortunately option D will work just fine and your boss would probably prefer you to use the
show cdp neighbors detail command.
7. What is the frequency range of the IEEE 802.11a standard?
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.
10. What are two purposes for segmentation with a bridge?