A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255
您可能感興趣的試卷
你可能感興趣的試題
A. nat
B. nonat-control
C. access-list
D. none of the above
A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.
A. show asp drop
B. show counters drop
C. show security-policy
D. show policy-map
A. http-map, tcp-map, class-map
B. class-map, tcp-map, policy-map
C. class-map, policy-map, service-map
D. class-map, service-policy, policy-map
A. audit
B. secure
C. inspect
D.The fixup protocol commands did not change in
最新試題
Which one of the following is NOT a valid RADIUS packet type?()
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()
Which of these is the best way to provide sender non-repudiation?()
TACACS+ authentication uses whichthree packet types? ()
CSA protects your host by: ()
Which ones are the two type of ciphers?()
What technologies are included inAnti-X? ()
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
Select the two correctstatements from the list below that describe DES and 3DES: ()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()