Академический Документы
Профессиональный Документы
Культура Документы
Top of Form
Finish review
Bottom of Form
Started on
Completed on
Time taken
16 mins
Marks
24/35
Grade
Question1
Marks: 1
As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____. Choose one answer.
a. foreign network
Question2
Marks: 1
____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes. Choose one answer.
a. Autoconfiguration
Question3
Marks: 1
In IPv4, the ____ field indicated the length of the payload, including the IP header and any fragmented data that followed. Choose one answer.
a. Next Header
Question4
Marks: 1
In IPv4, an entire Class A network, 127.x.x.x, was dedicated to the loopback function, removing millions of addresses from the available pool. Answer: True False
Question5
Marks: 1
The ____ process is used to provide source stations with the maximum fragment size supported by a path. Choose one answer.
a. Router Solicitation
Question6
Marks: 1
A ____ is a set of packets for which a source requires special handling by the intervening routers. Choose one answer.
a. flow
Question7
Marks: 1
The IPv6 header is not variable length - it is always 40 bytes long. Answer: True False
Question8
Marks: 1
Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid. Choose one answer.
a. dual stack
Question9
Marks: 1
A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS). Choose one answer.
a. solicited node
Question10
Marks: 1
____ requires all subnets to support the subnet router anycast address. Choose one answer.
a. RFC 2180
Question11
Marks: 1
The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links. Choose one answer.
a. per-domain behavior
Question12
Marks: 1
____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack. Choose one answer.
a. Site-local
Question13
Marks: 1
____ must announce that they wish to receive multicast traffic bound for a particular multicast address. Choose one answer.
a. transformations
Question14
Marks: 1
____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF. Choose one answer.
a. Quality of Service
Question15
Marks: 9
QoS
May be viewed as a string that uniquely identifies one single network interface on the global Internet.
IPv6 address
A common autoconfiguration tool deployed across many parts of the Internet today.
DHCP
Implemented in one form or another in IPv4 for many years;however, it was never widely used.
IPv6
Question16
Marks: 1
Question17
Marks: 1
When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender. Choose one answer.
a. ciphertext
Question18
Marks: 1
A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node. Choose one answer.
a. Neighbor Discovery
b. DHCP
Question19
Marks: 1
____ describes a method to express IPv6 addresses in a form compatible with HTTP URLs Choose one answer.
a. RFC 1192
Question20
Marks: 1
Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called____. Choose one answer.
a. decryption
Question21
Marks: 1
RFC 2711 defines the router alert option in the Hop-by-Hop Options extension header. Answer: True False
Question22
Marks: 1
Stateless autoconfiguration must be used alone or in conjunction with a stateful autoconfiguration method, such as DHCPv6. Answer: True False
Question23
Marks: 1
Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____. Choose one answer.
a. stack nodes
Question24
Marks: 1
The authentication process defined by the Authentication extension header encrypts and protects data from sniffing attacks. Answer:
True
False
Question25
Marks: 1
In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol. Choose one answer.
a. Next Header
Question26
Marks: 1
IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the links working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a link layer address (such as an Ethernet MAC address) with an IPv6 address. Choose one answer.
a. Neighbor Discovery
Question27
Marks: 1
The ____ extension header supports strict or loose source routing for IPv6. Choose one answer.
a. Authentication