Chapter 13- IPv6 Review Review of attempt 2
Top of Form
Finish review
Bottom of Form
Started on
Tuesday, May 31, 2011, 03:43 AM
Completed on
Tuesday, May 31, 2011, 03:59 AM
Time taken
16 mins
Marks
24/35
Grade
69 out of a maximum of 100 (69%)
Question1
Marks: 1
As in IPv4, mobile users in IPv6 require the help of a router located on their home networks, called a ____. Choose one answer.
a. foreign network
b. foreign agent c. home agent d. binding agent
Correct Marks for this submission: 1/1.
Question2
Marks: 1
____ allows a host to find the information it needs to set up its own IP networking parameters by querying other nodes. Choose one answer.
a. Autoconfiguration
b. Router Advertisement c. Transformation d. Router Solicitation
Incorrect Marks for this submission: 0/1.
Question3
Marks: 1
In IPv4, the ____ field indicated the length of the payload, including the IP header and any fragmented data that followed. Choose one answer.
a. Next Header
b. Total Length c. Payload Length d. Hop Limit
Correct Marks for this submission: 1/1.
Question4
Marks: 1
In IPv4, an entire Class A network, 127.x.x.x, was dedicated to the loopback function, removing millions of addresses from the available pool. Answer: True False
Correct Marks for this submission: 1/1.
Question5
Marks: 1
The ____ process is used to provide source stations with the maximum fragment size supported by a path. Choose one answer.
a. Router Solicitation
b. PMTU Discovery c. scope identification d. transformation
Incorrect Marks for this submission: 0/1.
Question6
Marks: 1
A ____ is a set of packets for which a source requires special handling by the intervening routers. Choose one answer.
a. flow
b. home agent c. dual stack d. foreign agent
Correct Marks for this submission: 1/1.
Question7
Marks: 1
The IPv6 header is not variable length - it is always 40 bytes long. Answer: True False
Correct Marks for this submission: 1/1.
Question8
Marks: 1
Multicast addresses in IPv6 use a four-bit ____, which is a four-bit field that limits the valid range for a multicast address to define the portion of the Internet over which the multicast group is valid. Choose one answer.
a. dual stack
b. interface identifier c. encryption d. scope identifier
Correct Marks for this submission: 1/1.
Question9
Marks: 1
A special type of multicast address called the ____ address is used to support Neighbor Solicitation (NS). Choose one answer.
a. solicited node
b. binding c. domain d. link
Correct Marks for this submission: 1/1.
Question10
Marks: 1
____ requires all subnets to support the subnet router anycast address. Choose one answer.
a. RFC 2180
b. RFC 2526 c. RFC 3200 d. RFC 3513
Incorrect Marks for this submission: 0/1.
Question11
Marks: 1
The ____ is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links. Choose one answer.
a. per-domain behavior
b. link-local address c. solicited node address d. jumbogram
Incorrect Marks for this submission: 0/1.
Question12
Marks: 1
____ is the name of a special IP address that allows a host on a network to check the operation of its own local TCP/IP protocol stack. Choose one answer.
a. Site-local
b. Loopback c. Link-local d. Jumbograms
Correct Marks for this submission: 1/1.
Question13
Marks: 1
____ must announce that they wish to receive multicast traffic bound for a particular multicast address. Choose one answer.
a. transformations
b. Nodes c. Home agents d. Dual stacks
Incorrect Marks for this submission: 0/1.
Question14
Marks: 1
____ is the ability of a network to provide better service to specific types of network traffic and is handled by the diffserv working group at the IETF. Choose one answer.
a. Quality of Service
b. Router Solicitation c. Encryption d. Micro-mobility
Correct Marks for this submission: 1/1.
Question15
Marks: 9
Match each item with a statement below.
The number of hosts that could actually be connected to the Internet.
QoS
May be viewed as a string that uniquely identifies one single network interface on the global Internet.
IPv6 address
Can be represented as two colon characters (::) in normal notation.
Unspecified address
Extremely expensive in terms of bandwidth and routing resources.
Multicast addresses in IPv6
Used to send an identical message to multiple hosts.
Broadcasts
Sent to one network interface.
Unicast address
No longer allows packets to be fragmented en route.
Usable address space
A common autoconfiguration tool deployed across many parts of the Internet today.
DHCP
Implemented in one form or another in IPv4 for many years;however, it was never widely used.
IPv6
Partially correct Marks for this submission: 4/9.
Question16
Marks: 1
The purpose of ____ is to keep communications secret or private.
Choose one answer.
a. decryption
b. binding c. transformations d. encryption
Correct Marks for this submission: 1/1.
Question17
Marks: 1
When a router knows a better first hop for a particular address (better than itself), it sends a ____ message to the sender. Choose one answer.
a. ciphertext
b. flow c. Redirect d. jumbogram
Correct Marks for this submission: 1/1.
Question18
Marks: 1
A node can send a ____ to find (or verify) the link layer address of a local node, see if that node is still available, or check that its own address is not in use by another node. Choose one answer.
a. Neighbor Discovery
b. DHCP
c. Neighbor Advertisement d. Neighbor Solicitation
Correct Marks for this submission: 1/1.
Question19
Marks: 1
____ describes a method to express IPv6 addresses in a form compatible with HTTP URLs Choose one answer.
a. RFC 1192
b. RFC 2700 c. RFC 2732 d. RFC 2800
Correct Marks for this submission: 1/1.
Question20
Marks: 1
Computer security takes advantage of the fact that computer information is basically just numbers. It is based on sets of mathematical manipulations called____. Choose one answer.
a. decryption
b. binding c. transformations d. encryption
Correct Marks for this submission: 1/1.
Question21
Marks: 1
RFC 2711 defines the router alert option in the Hop-by-Hop Options extension header. Answer: True False
Correct Marks for this submission: 1/1.
Question22
Marks: 1
Stateless autoconfiguration must be used alone or in conjunction with a stateful autoconfiguration method, such as DHCPv6. Answer: True False
Correct Marks for this submission: 1/1.
Question23
Marks: 1
Nodes that need to tunnel IPv6 packets through IPv4 routers use the IPv4-compatible addresses. These are called dual ____. Choose one answer.
a. stack nodes
b. h-nodes c. p-nodes d. m-nodes
Correct Marks for this submission: 1/1.
Question24
Marks: 1
The authentication process defined by the Authentication extension header encrypts and protects data from sniffing attacks. Answer:
True
False
Correct Marks for this submission: 1/1.
Question25
Marks: 1
In IPv6, the ____ field (one byte) indicates the upcoming extension header, transport protocol, or other protocol. Choose one answer.
a. Next Header
b. Total Length c. Payload Length d. Hop Limit
Incorrect Marks for this submission: 0/1.
Question26
Marks: 1
IPv6 ____ protocol, specified in RFC 2461, defines mechanisms whereby nodes can find out on what link they are located, learn their subnet prefix, where the links working routers reside, who their neighbors are, which of them is active, and in all cases, to associate a link layer address (such as an Ethernet MAC address) with an IPv6 address. Choose one answer.
a. Neighbor Discovery
b. DHCP c. Neighbor Advertisement d. Neighbor Solicitation
Correct Marks for this submission: 1/1.
Question27
Marks: 1
The ____ extension header supports strict or loose source routing for IPv6. Choose one answer.
a. Authentication
b. Fragment c. Destination Options d. Routing
Correct Marks for this submission: 1/1.