Вы находитесь на странице: 1из 12

Chapter 13- IPv6 Review Review of attempt 2

Top of Form

Finish review
Bottom of Form

Started on

Tuesday, May 31, 2011, 03:43 AM

Completed on

Tuesday, May 31, 2011, 03:59 AM

Time taken

16 mins

Marks

24/35

Grade

69 out of a maximum of 100 (69%)

Question1
Marks: 1

As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____. Choose one answer.
a. foreign network

b. foreign agent c. home agent d. binding agent

Correct Marks for this submission: 1/1.

Question2
Marks: 1

____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes. Choose one answer.

a. Autoconfiguration

b. Router Advertisement c. Transformation d. Router Solicitation

Incorrect Marks for this submission: 0/1.

Question3
Marks: 1

In IPv4, the ____ field indicated the length of the payload, including the IP header and any fragmented data that followed. Choose one answer.
a. Next Header

b. Total Length c. Payload Length d. Hop Limit

Correct Marks for this submission: 1/1.

Question4
Marks: 1

In IPv4, an entire Class A network, 127.x.x.x, was dedicated to the loopback function, removing millions of addresses from the available pool. Answer: True False

Correct Marks for this submission: 1/1.

Question5
Marks: 1

The ____ process is used to provide source stations with the maximum fragment size supported by a path. Choose one answer.
a. Router Solicitation

b. PMTU Discovery c. scope identification d. transformation

Incorrect Marks for this submission: 0/1.

Question6
Marks: 1

A ____ is a set of packets for which a source requires special handling by the intervening routers. Choose one answer.
a. flow

b. home agent c. dual stack d. foreign agent

Correct Marks for this submission: 1/1.

Question7
Marks: 1

The IPv6 header is not variable length - it is always 40 bytes long. Answer: True False

Correct Marks for this submission: 1/1.

Question8

Marks: 1

Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid. Choose one answer.
a. dual stack

b. interface identifier c. encryption d. scope identifier

Correct Marks for this submission: 1/1.

Question9
Marks: 1

A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS). Choose one answer.
a. solicited node

b. binding c. domain d. link

Correct Marks for this submission: 1/1.

Question10
Marks: 1

____ requires all subnets to support the subnet router anycast address. Choose one answer.
a. RFC 2180

b. RFC 2526 c. RFC 3200 d. RFC 3513

Incorrect Marks for this submission: 0/1.

Question11
Marks: 1

The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links. Choose one answer.
a. per-domain behavior

b. link-local address c. solicited node address d. jumbogram

Incorrect Marks for this submission: 0/1.

Question12
Marks: 1

____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack. Choose one answer.
a. Site-local

b. Loopback c. Link-local d. Jumbograms

Correct Marks for this submission: 1/1.

Question13
Marks: 1

____ must announce that they wish to receive multicast traffic bound for a particular multicast address. Choose one answer.
a. transformations

b. Nodes c. Home agents d. Dual stacks

Incorrect Marks for this submission: 0/1.

Question14
Marks: 1

____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF. Choose one answer.
a. Quality of Service

b. Router Solicitation c. Encryption d. Micro-mobility

Correct Marks for this submission: 1/1.

Question15
Marks: 9

Match each item with a statement below.


The number of hosts that could actually be connected to the Internet.

QoS

May be viewed as a string that uniquely identifies one single network interface on the global Internet.
IPv6 address

Can be represented as two colon characters (::) in normal notation.


Unspecified address

Extremely expensive in terms of bandwidth and routing resources.


Multicast addresses in IPv6

Used to send an identical message to multiple hosts.


Broadcasts

Sent to one network interface.


Unicast address

No longer allows packets to be fragmented en route.


Usable address space

A common autoconfiguration tool deployed across many parts of the Internet today.
DHCP

Implemented in one form or another in IPv4 for many years;however, it was never widely used.
IPv6

Partially correct Marks for this submission: 4/9.

Question16
Marks: 1

The purpose of ____ is to keep communications secret or private.

Choose one answer.


a. decryption

b. binding c. transformations d. encryption

Correct Marks for this submission: 1/1.

Question17
Marks: 1

When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender. Choose one answer.
a. ciphertext

b. flow c. Redirect d. jumbogram

Correct Marks for this submission: 1/1.

Question18
Marks: 1

A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node. Choose one answer.
a. Neighbor Discovery

b. DHCP

c. Neighbor Advertisement d. Neighbor Solicitation

Correct Marks for this submission: 1/1.

Question19
Marks: 1

____ describes a method to express IPv6 addresses in a form compatible with HTTP URLs Choose one answer.
a. RFC 1192

b. RFC 2700 c. RFC 2732 d. RFC 2800

Correct Marks for this submission: 1/1.

Question20
Marks: 1

Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called____. Choose one answer.
a. decryption

b. binding c. transformations d. encryption

Correct Marks for this submission: 1/1.

Question21

Marks: 1

RFC 2711 defines the router alert option in the Hop-by-Hop Options extension header. Answer: True False

Correct Marks for this submission: 1/1.

Question22
Marks: 1

Stateless autoconfiguration must be used alone or in conjunction with a stateful autoconfiguration method, such as DHCPv6. Answer: True False

Correct Marks for this submission: 1/1.

Question23
Marks: 1

Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____. Choose one answer.
a. stack nodes

b. h-nodes c. p-nodes d. m-nodes

Correct Marks for this submission: 1/1.

Question24
Marks: 1

The authentication process defined by the Authentication extension header encrypts and protects data from sniffing attacks. Answer:

True

False

Correct Marks for this submission: 1/1.

Question25
Marks: 1

In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol. Choose one answer.
a. Next Header

b. Total Length c. Payload Length d. Hop Limit

Incorrect Marks for this submission: 0/1.

Question26
Marks: 1

IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the links working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a link layer address (such as an Ethernet MAC address) with an IPv6 address. Choose one answer.
a. Neighbor Discovery

b. DHCP c. Neighbor Advertisement d. Neighbor Solicitation

Correct Marks for this submission: 1/1.

Question27

Marks: 1

The ____ extension header supports strict or loose source routing for IPv6. Choose one answer.
a. Authentication

b. Fragment c. Destination Options d. Routing

Correct Marks for this submission: 1/1.

Вам также может понравиться