Elective 2: Prelim Flashcards
What does “LAN” stand for?
Local Area Network
What does “IP” in IP address stand for?
Internet Protocol
Which device connects a LAN to the internet?
Router
What is the primary function of a switch in a network?
Filter and forward data within a LAN
Which of the OSI model is responsible for data encryption?
Presentation
What device is used to amplify signals in a network?
Repeater
Which network device operates at the Data Link layer of the OSI model?
Switch
What is the primary purpose of a firewall?
Protect against unauthorized access
What device connects two different networks?
Router
Which protocol is used to send emails?
SMTP
What does HTTP stand for?
HyperText Transfer Protocol
Which protocol is used for secure data transfer over the web?
HTTPS
What is the main purpose of DNS in a network?
Translate domain names to IP addresses
Which protocol is used to transfer files over the internet?
FTP
What is a group of computers connected together called?
Network
What is the maximum length of a UTP cable in a LAN?
100 meters
What is the unique identifier assigned to a device on a network?
MAC address
What is the full form of DHCP?
Dynamic Host Configuration Protocol
How many layers are there in the OSI model?
7
What does “ping” test in a network?
Connectivity
Which layer of the OSI model handles error connection?
Data Link
Which OSI layer deals with end-to-end communication?
Transport
In the TCP/IP model, which layer corresponds to the OSI’s Physical and Data Link layers?
Network Access
What does TCP stand for?
Transmission Control Protocol
Which topology connects all devices to a single central device?
Star
In which topology are all devices connected in a circular manner?
Ring
What is a disadvantage of a bus topology?
Entire network stops if the main cable fails
Which topology provides the highest redundancy?
Mesh
What is the most commonly used topology in LANs?
Star
What is the range of Class A IP addresses?
0.0.0.0 to 127.255.255.255
How many octets are in an IPv4 address?
4
Which frequency band is NOT used in Wi-Fi?
7GHz
What is the primary role of an ISP?
Provide internet services
Which of these is a popular messaging protocol?
XMPP
What is the default port number for HTTP?
80
SMTP
Simple Mail Transfer Protocol
FTP
File Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HTTP
HyperText Transfer Protocol
XMPP
Extensible Messaging and Presence Protocol
IMAP
Internet message access protocol
TCP
Transmission Control Protoco
IP
Internet Protocol
DNS
Domain Name System
POP3
Post Office Protocol 3
OSI (OSI _ or OSI Model)
Open System Interconnection Reference Model
- Reference Model
abstract description for layered communications and computer network protocol design.
Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
It divides network architecture into seven layers which, from top to bottom,
Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
OSI Seven Layer Model.
Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers
- In _, the _ began to develop its OSI framework architecture.
1978
the International Standards Organization (ISO)
- OSI has two major components: an abstract model of networking,
called the ___
Basic Reference Model or seven-layer model, and a set of
specific protocols.
- Various aspects of OSI design evolved from experiences with the
Advanced Research Projects Agency Network (ARPANET) and the
fledgling Internet.
- The concept of a 7 layer model was provided by the __
work of Charles
Bachman, then of Honeywell
OSI Layers
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
7 Physical
Network process to ___
Application
Data representation, encryption and description
Presentation
Interhost communication
Session
End-to-end connections and reliability, Flow control
Transport
Path determination and logical addressing
(IP) add ko yan describe
Network
Physical addressing
(MAC and LLC)
Data Link
Media, signal and binary transmission
Physical
defines the electrical and physical specifications for devices.
Layer1: Physical Layer
In particular, it defines the relationship between a device and a physical medium.
Layer1: Physical Layer
- This includes the layout of pin, voltages, cable specification, hubs,
repeaters, network adapters, host bus adapters, and more.
Layer1: Physical Layer
*The major functions and services performed by the Physical Layer are:
- Establishment and termination of a connection to a communication medium.
- Participation in the process whereby the communication resources are effectively shared among multiple users. For example, flow control.
- Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.
- The same applies to local-area networks, such as Ethernet, token ring ,
FDDI(Fiber Distributed Data Interface),
ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I. - Personal area networks such as Bluetooth and IEEE 802.15.4.
local-area networks: such as…
Ethernet, token ring ,
FDDI(Fiber Distributed Data Interface),
ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I.
- Personal area networks such as
Bluetooth and IEEE 802.15.4
detect and possibly correct errors that may occur in the Physical Layer.
Layer 2: Data Link Layer
provides the functional and procedural means to transfer data between network entities
Layer 2: Data Link Layer
- Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system.
Layer 2: Data Link Layer
*The data link layer is divided into two sub-layers by __.
1.
2.
_ IEEE
- Media Access Control (MAC)
- Logical Link Control (LLC)
is lower sub-layer, and it defines the way about the media access transfer, such as CSMA/CD/CA(Carrier Sense Multiple Access/Collision Detection/Collision Avoidance)
Mac
provides data transmission method in different network
LLC
It will re-package date and add a new header.
LLC
provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality
of service requested by the Transport Layer.
Layer 3: Network Layer
- The _ performs:
_ Network Layer
- network routing functions,
- perform fragmentation and reassembly,
- report delivery errors.
- Routers operate at this layer—sending data throughout the extended network and making the Internet possible.
Layer 3: Network Layer
provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.
Layer 4: Transport Layer
controls the reliability of a given link through flow control, segmentation/desegmentation, and error control.
Layer 4: Transport Layer
controls the dialogues (connections) between computers.
Layer 5: Session Layer
- It establishes, manages and terminates the connections between the local and remote application.
Layer 5: Session Layer
- It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures.
Layer 5: Session Layer
- The OSI model made this layer __, which is a property of the __,
and also for ___, which is not usually
used in the Internet Protocol Suite.
Layer 5: Session Layer
__ responsible for graceful close of
sessions
__ (TCP) Transmission Control Protocol
___session check pointing and recovery
The ___ is commonly implemented explicitly in application environments that use remote procedure calls.
___ Session Layer
establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the presentation service understands both and the mapping between them.
Layer 6: Presentation Layer
- This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa.
Layer 6: Presentation Layer
- This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems.
Layer 6: Presentation Layer
Presentation Layer
*It is sometimes called the syntax layer.
is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application.
Layer 7: Application Layer
- Application layer functions typically include:
- identifying communication partners,
- determining resource availability,
- synchronizing communication.
- Determines the identity and availability of communication partners for an application with data to transmit.
*Identifying communication partners
- Decide whether sufficient network or the requested communication exist.
- determining resource availability
- All communication between applications requires cooperation that is managed by the application layer.
*Synchronizing communication
- Some examples of application layer implementations include:
- Hypertext Transfer Protocol (HTTP)
- File Transfer Protocol (FTP)
- Simple Mail Transfer Protocol (SMTP)
TCP/IP Layers ng OSI
Application, Presentation, Session = __
Transport = __
Network = ___
Data, Physical = __
A,P,S = TELNET, FTP, SMTP, POP3,SNMP, NNTP, DNS, NIS, NFS, HTTP
T = TCP, UDP…
N = IP, ICMP, ARP, RARP
D,P = FDDI, Ethernet, ISDN, X.25…
TCP/IP Layers 4 Layers
Application Layer
Transportation Layer
Internet Layer
Network Access Layer
- Open system standards over the world
- Rigorously defined structured, hierarchical network model
- Complete description of the function
- Provide standard test procedures
OSI Feature
(commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.
Internet Protocol Suite
is the set of communications protocols used for the Internet and other similar networks.
Internet Protocol Suite (commonly known as TCP/IP)
*It is named from two of the most important protocols in it:
Internet Protocol Suite (commonly known as TCP/IP)
*the Transmission Control Protocol (TCP) and
*the Internet Protocol (IP)
which were the first two networking protocols defined in this standard.
*the Transmission Control Protocol (TCP) and
*the Internet Protocol (IP)
Why Layering Considered Harmful?
- __ implies that the functions of each layer are carried out completely before the protocol data unit is passed to the next layer.
In the data networking context structured layering
Why Layering Considered Harmful?
This means that the optimization of each layer has to be done ___.
separately
Why Layering Considered Harmful?
Such ordering constraints are in conflict with efficient implementation of data manipulation functions.
true
___ logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the
network.
VLANs
All workstations and servers used by a particular workgroup ___, regardless of the physical connection or Location.
share the same VLAN
___ function by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN.
VLANs
___ provide broadcast filtering, security, and traffic flow management.
Routers in VLAN topologies
___ address scalability, security, and network management.
VLANs
___ may not bridge any traffic between VLANs, as this would violate the integrity of the VLAN broadcast domain.
Switches
__ should only be routed between VLANs.
Traffic
A __ is a broadcast domain created by one or more switches.
VLAN
__ allows the router to send packets to the three different broadcast domains.
Layer 3 routing
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
◼ If the __, the switch searches the bridging table for VLAN 1.
frame comes in on a port in VLAN 1
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
◼The ___ maintains a separate bridging table for each VLAN.
switch
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
◼When the ___, the switch adds the source address to the bridging table if it is currently unknown.
frame is received
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
◼The __ so a forwarding decision can be made.
destination is checked
Broadcast domains with VLANs and routers
Implementing VLANs on a switch causes the following to occur:
◼For __ is made against the address
table for that VLAN only.
learning and forwarding the search
VLAN operation
- __ could be assigned to a different ___.
Each switch port
VLAN
VLAN operation
- Ports assigned to the same VLAN ___
share broadcasts.
VLAN operation
- Ports that do not belong to that VLAN __
do not share these broadcasts.
VLAN operation
- Int fa0/1
- Switchport mode access
- Switchport access vlan 1
VLAN operation
___, share the bandwidth of that segment.
Users attached to the same shared segment
VLAN operation
___ means less bandwidth and deterioration of network performance.
Each additional user attached to the shared medium
VLAN operation
__ offer more bandwidth to users than a __.
VLANs
shared network.
VLAN operation
The __ for every port in the switch is the __.
default VLAN
management VLAN.
VLAN operation
The ___ is always VLAN 1 and may not be deleted. All ___ may be reassigned to alternate VLANs.
management VLAN
other ports on the switch
VLAN operation
___ allow for membership based on the MAC address of the device connected to the switch port.
Dynamic VLANs
VLAN operation
As a __, it queries a database within the switch for a VLAN membership
device enters the network
VLAN operation
In ___, the port is assigned to a specific VLAN membership independent of the user or system attached to the port.
port-based or port-centric VLAN membership
VLAN operation
All users of the same port must be in the __.
same VLAN
VLAN operation
_ are responsible for configuring VLANs both manually and statically.
Network administrators
VLAN operation
Configuring VLANs
1.
2.
Statically
Dynamically
___configure port-by-port.
Statically
Network administrators
Each port is associated with a specific VLAN
Statically
The__ is responsible for keying in the mappings between the ports and VLANs.
Statically
network administrator
The ports are able to dynamically work out their VLAN configuration
Dynamically
Uses a software database of MAC address to VLAN mappings (which the network administrator must set up first)
Dynamically
The key benefit of VLANs is that they permit the network administrator to ___
organize the LAN logically instead of physically.
VLAN types
There are three basic VLAN memberships for determining and controlling how a packet gets assigned:
◼Port-based VLANs
◼MAC address based
◼Protocol based VLANs
The ___ are encapsulated or modified to reflect a VLAN ID before the frame is sent over the link between switches.
frame headers
- Before forwarding to the destination device, the___is changed back to the original format.
frame header
The number of VLANs in a switch vary depending on several factors:
◼Traffic patterns
◼Types of applications
◼Network management needs
◼Group commonality
- An important consideration in defining the size of the switch and the number of VLANs is the ___.
IP addressing scheme.
- Because a ___ is strongly recommended, there can be no more than __ devices in any one VLAN.
one-to-one correspondence between VLANs and IP subnets
254
- It is further recommended that VLANs should not __ domain of the distribution switch.
extend outside of the Layer 2
world’s largest public data network, doubling in size every nine months
INTERNET
defines a 32-bit address
IPv4
2^32 (4,294,967,296) __ addresses available
IPv4
The __ is concerned with the eventual depletion of the IP address space.
first problem
- __ of classful addressing does not allow the address space to be used to its maximum potential.
Traditional model
- When IP was first standardized in __, each system attached to the IP based Internet had to be assigned a unique 32-bit address
Sep 1981
- The 32-bit IP addressing scheme involves a ___
two level addressing hierarchy
two level addressing hierarchy
- Network Number/Prefix
- Host Number
Classful Addressing
Divided into _ classes
5
- Class A __ bits __ and __ bits __ and so on B,C.
8 N/W id
24 host id
*__ by assigning blocks of addresses which fall along octet boundaries
*Wastage of IP addresses
Techniques to reduce address shortage in IPv4
- Subnetting
- Classless Inter Domain Routing (CIDR)
- Network Address Translation (NAT)
Three-level hierarchy:
Subnetting
Three-level hierarchy:
network, subnet, and host.
- The __ is composed of the classful network-prefix and the subnet-number
extended-network-prefix
has traditionally been identified by the subnet mask
extended-network-prefix
Network Address Translation
Each organization
- single IP address
Network Address Translation
- each host with IP unique to the orgn., from reserved set of IP addresses
Within organization
Features of IPv6
- Larger Address Space
- Aggregation-based address hierarchy
– Efficient backbone routing - Efficient and Extensible IP datagram
- Stateless Address Autoconfiguration
- Security (IPsec mandatory)
- Mobility
_-bit IPv6 Address
128
IPv6 is separated by?
: also known as colon
_ groups of _-bit __ numbers
8
16
hexadecimal
= all zeros in one or more group of 16-bit hexadecimal numbers
::
Extension Headers
- Routing
- Fragmentation
- Authentication
- Encapsulation
*Hop-by-Hop Option - Destination Options
Extended routing, like IPv4 loose list of routers to visit
Routing
Fragmentation and reassembly
Fragmentation
Integrity and authentication, security
Authentication
Confidentiality
Encapsulation
Special options that require hop-by-hop processing
Hop-by-Hop Option
Optional information to be examined by the destination node
Destination Options
❑ IPv6 is NEW …
– built on the experiences learned from IPv4
– new features
– large address space
– new efficient header
– autoconfiguration
❑ … and OLD
– still IP
– build on a solid base
– started in 1995, a lot of implementations and tests done
- What does OSI stand for?
A) Open System Internet
B) Open Source Interconnection
C) Open System Interconnection
D) Operating System Interconnection
C) Open System Interconnection
- How many layers does the OSI Model have?
A) 4
B) 5
C) 6
D) 7
D) 7
- Which layer of the OSI model is responsible for physical transmission of data?
A) Data Link
B) Network
C) Physical
D) Transport
C) Physical
- What is the main function of the Transport Layer in the OSI model?
A) Error detection
B) Data encryption
C) End-to-end communication and reliability
D) Logical addressing
C) End-to-end communication and reliability
- Which of the following protocols operates at the Application Layer of the OSI model?
A) IP
B) TCP
C) HTTP
D) ARP
C) HTTP
- Which OSI layer ensures that data is properly formatted and encrypted?
A) Transport
B) Session
C) Presentation
D) Application
C) Presentation
- The Network Layer is responsible for which of the following?
A) Routing and addressing
B) Encryption
C) Error detection
D) Physical transmission of bits
A) Routing and addressing
- Which layer in the OSI model is responsible for establishing, maintaining, and terminating
sessions?
A) Application
B) Session
C) Presentation
D) Transport
B) Session
- Which of the following is a Layer 2 protocol?
A) TCP
B) IP
C) Ethernet
D) UDP
C) Ethernet
- What is the function of the Data Link Layer?
A) Ensuring reliable data transmission
B) Managing network congestion
C) Handling logical addressing
D) Providing physical addressing and error detection
D) Providing physical addressing and error detection
- Which protocol is responsible for logical addressing?
A) TCP
B) IP
C) HTTP
D) FTP
B) IP
- What is the primary difference between TCP and UDP?
A) TCP is faster than UDP
B) TCP is connection-oriented, while UDP is connectionless
C) UDP provides error correction, while TCP does not
D) UDP is more reliable than TCP
B) TCP is connection-oriented, while UDP is connectionless
- Which layer of the OSI model does a router operate at?
A) Data Link
B) Network
C) Transport
D) Session
B) Network
- Which of the following is NOT a function of the Application Layer?
A) Determining resource availability
B) Identifying communication partners
C) Managing end-to-end transmission
D) Synchronizing communication
C) Managing end-to-end transmission
- Which protocol translates domain names into IP addresses?
A) HTTP
B) FTP
C) DNS
D) SMTP
C) DNS
- What does ARP stand for?
A) Automatic Routing Protocol
B) Address Resolution Protocol
C) Application Routing Process
D) Active Request Protocol
B) Address Resolution Protocol
- Which OSI layer is responsible for segmenting and reassembling data?
A) Network
B) Transport
C) Data Link
D) Session
B) Transport
- The TCP/IP model has how many layers?
A) 4
B) 5
C) 6
D) 7
A) 4
- Which of the following operates at Layer 3 of the OSI Model?
A) Switch
B) Router
C) Hub
D) Repeater
B) Router
- Which OSI layer is sometimes referred to as the “syntax layer”?
A) Network
B) Presentation
C) Transport
D) Application
B) Presentation
- What does VLAN stand for?
A) Virtual Local Area Network
B) Virtual Large Area Network
C) Variable Local Area Network
D) Variable Large Area Network
A) Virtual Local Area Network
- What is the primary purpose of VLANs?
A) To increase physical connections
B) To segment networks logically
C) To enhance physical security
D) To replace switches
B) To segment networks logically
- In a VLAN, workstations share the same VLAN regardless of what?
A) Physical connection
B) Network topology
C) Internet speed
D) Data type
A) Physical connection
- What is a broadcast domain in the context of VLANs?
A) A physical segment of the network
B) A group of devices that receive broadcast messages
C) A layer of the OSI model
D) A type of network protocol
B) A group of devices that receive broadcast messages
- Which layer of the OSI model is primarily involved in VLAN routing?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
C) Layer 3
- What happens to traffic between different VLANs?
A) It is bridged directly
B) It is filtered by switches
C) It is routed by routers
D) It is discarded
C) It is routed by routers
- In VLAN operation, what determines which VLAN a port belongs to?
A) The physical location of the port
B) The user connected to the port
C) The port’s assigned VLAN configuration
D) The network speed
C) The port’s assigned VLAN configuration
- What is the default VLAN for every port in a switch?
A) VLAN 10
B) VLAN 100
C) VLAN 1
D) VLAN 0
C) VLAN 1
- Which VLAN membership type assigns VLAN based on the MAC address of the device?
A) Port-based VLAN
B) MAC address-based VLAN
C) Protocol-based VLAN
D) Dynamic VLAN
B) MAC address-based VLAN
- What do dynamic VLANs allow for?
A) Manual configuration
B) Port-based assignment
C) Membership based on device MAC address
D) Physical connection reassignment
C) Membership based on device MAC address
- What is one key benefit of using VLANs?
A) Physical network restructuring
B) Logical organization of the LAN
C) Enhanced bandwidth for all devices
D) Simplified hardware requirements
B) Logical organization of the LAN
- Which of the following is NOT a basic type of VLAN membership?
A) Port-based VLANs
B) MAC address-based VLANs
C) Protocol-based VLANs
D) User-based VLANs
D) User-based VLANs
- What must be considered when defining the size of a switch regarding VLANs?
A) The physical size of the switch
B) The network bandwidth
C) The IP addressing scheme
D) The number of connected devices
C) The IP addressing scheme
- How many devices are recommended to be in a single VLAN?
A) No more than 100
B) No more than 200
C) No more than 254
D) No more than 300
C) No more than 254
- What is the consequence of bridging traffic between VLANs?
A) Enhanced network performance
B) Increased broadcast traffic
C) Violation of VLAN integrity
D) Improved security
C) Violation of VLAN integrity
- VLANs are primarily used to address which of the following?
A) Scalability, security, and network management
B) Physical connections and speed
C) Data encryption and compression
D) Hardware configuration
A) Scalability, security, and network management
- What does each port in a VLAN share?
A) Physical connections
B) Management permissions
C) Broadcast traffic
D) Security protocols
C) Broadcast traffic
- How does a switch learn MAC addresses in a VLAN?
A) By manual entry
B) Through user authentication
C) By adding source addresses to the bridging table
D) By polling connected devices
C) By adding source addresses to the bridging table
- What is a key feature of port-based VLAN membership?
A) It is user-dependent
B) It allows for multiple VLANs per port
C) Each port is assigned to a specific VLAN
D) It is dynamic in nature
C) Each port is assigned to a specific VLAN
- What is the primary reason for the development of IPv6?
A) To provide faster internet speeds
B) To address the depletion of IPv4 addresses
C) To simplify network configurations
D) To enhance security features
B) To address the depletion of IPv4 addresses
- How many unique addresses are available in the IPv4 addressing scheme?
A) 2^16
B) 2^32
C) 2^64
D) 2^128
B) 2^32
- What addressing hierarchy does the 32-bit IP addressing scheme use?
A) Host Number/Network Number
B) Network Number/Host Number
C) Subnet/Host/Network
D) Prefix/Host
B) Network Number/Host Number
- How many classes of addresses were defined in classful addressing?
A) 2
B) 3
C) 4
D) 5
D) 5
- What is one technique used to reduce address shortages in IPv4?
A) IPsec
B) NAT
C) OSPF
D) ARP
B) NAT
- In subnetting, how many levels of hierarchy are there?
A) One
B) Two
C) Three
D) Four
C) Three
- What does a subnet mask do?
A) Identifies the class of an IP address
B) Indicates which portion of the address is the network and which is the host
C) Provides security for IP addresses
D) Translates IP addresses to MAC addresses
b
- What are the reserved IP address ranges for private networks?
A) 10.0.0.0 – 10.255.255.255
B) 192.168.0.0 – 192.168.255.255
C) 172.16.0.0 – 172.31.255.255
D) All of the above
D) All of the above
- What is a key feature of IPv6?
A) Smaller address space
B) Classful addressing
C) Stateless Address Autoconfiguration
D) Limited mobility
C) Stateless Address Autoconfiguration
- How is an IPv6 address structured?
A) Four groups of 8-bit decimal numbers
B) Eight groups of 16-bit hexadecimal numbers
C) A single 32-bit number
D) Two groups of 32-bit binary numbers
B) Eight groups of 16-bit hexadecimal numbers
- What does the “::” notation in an IPv6 address represent?
A) All bits are set to one
B) All zeros in one or more groups
C) A wildcard address
D) A reserved address
B) All zeros in one or more groups
- Which feature of IPv6 ensures mandatory security?
A) NAT
B) Subnetting
C) IPsec
D) DHCP
C) IPsec
- Which of the following is NOT an extension header in IPv6?
A) Fragmentation
B) Hop-by-Hop Option
C) Network Address Translation
D) Authentication
C) Network Address Translation
- What is the purpose of the Routing extension header in IPv6?
A) To encrypt packets
B) To provide a list of routers to visit
C) To verify the integrity of packets
D) To configure IP addresses
B) To provide a list of routers to visit
- What was the starting year for IPv6 development?
A) 1981
B) 1995
C) 2000
D) 2005
A) 1981
- Which of the following best describes IPv6?
A) Completely new protocol
B) An evolution of IPv4 with new features
C) A protocol with the same features as IPv4
D) A protocol that only focuses on security
B) An evolution of IPv4 with new features
- What is the significance of the larger address space in IPv6?
A) It allows for more devices to connect to the internet
B) It increases network speeds
C) It simplifies network configurations
D) It enhances security measures
A) It allows for more devices to connect to the internet
- What aspect of IPv6 enhances routing efficiency?
A) Classful addressing
B) Aggregation-based address hierarchy
C) Network Address Translation
D) Static IP addressing
B) Aggregation-based address hierarchy
- Which of the following is true about the header of IPv6 packets?
A) It is less efficient than IPv4 headers.
B) It is simplified and more efficient than IPv4 headers.
C) It requires more processing time.
D) It contains more fields than IPv4 headers.
B) It is simplified and more efficient than IPv4 headers.
- What feature allows IPv6 addresses to be assigned without manual configuration?
A) DHCP
B) Static addressing
C) Stateless Address Autoconfiguration
D) Dynamic Host Configuration Protocol
C) Stateless Address Autoconfiguration