A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255
您可能感興趣的試卷
你可能感興趣的試題
A. nat
B. nonat-control
C. access-list
D. none of the above
A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.
A. show asp drop
B. show counters drop
C. show security-policy
D. show policy-map
A. http-map, tcp-map, class-map
B. class-map, tcp-map, policy-map
C. class-map, policy-map, service-map
D. class-map, service-policy, policy-map
A. audit
B. secure
C. inspect
D.The fixup protocol commands did not change in
最新試題
What Cisco Switch feature best protects against CAM table overflow attacks?()
TACACS+ authentication uses whichthree packet types? ()
Which one of the following is NOT a supported IKE attribute?()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
With PGP, which of the following entity signs a users’s public key?()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()
Which ones are the two type of ciphers?()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()