Term
Neighbor Discovery has five functional processes. |
|
Definition
|
|
Term
Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network. |
|
Definition
|
|
Term
Neighbor Discovery makes abundant use of messages. |
|
Definition
|
|
Term
ND takes over the functions that ARP and Reverse ARP handled in IPv4. |
|
Definition
|
|
Term
Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set. |
|
Definition
|
|
Term
DHCP can exclude individual addresses or address ranges from dynamic allocation to client machines. |
|
Definition
|
|
Term
Clients ordinarily attempt to renew existing releases by default, but you can instruct a DHCP server to deny lease renewals, or even cancel leases, when necessary. |
|
Definition
|
|
Term
The DHCP specification, RFC 2131, defines the default value for T1 as: 0.95 * duration_of_lease |
|
Definition
|
|
Term
The structure of the DNS database mirrors the structure of the domain namespace itself. |
|
Definition
|
|
Term
Twenty-six root name servers (named A.ROOT-SERVERS.NET., B.ROOT-SERVERS.NET., etc.) act as the top of the DNS hierarchy worldwide. They provide the ultimate source for all name lookups that cannot be resolved through other means. |
|
Definition
|
|
Term
Domains (such as ibm.com) can be broken into subdomains (such as clearlake.ibm.com), as needed. |
|
Definition
|
|
Term
Not all the data in a DNS cache has an expiration value. |
|
Definition
|
|
Term
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism. |
|
Definition
|
|
Term
UDP is the only connectionless TCP/IP protocol at the Transport layer. |
|
Definition
|
|
Term
TCP half-open connections occur when the handshake process does not end successfully with a final ACK. |
|
Definition
|
|
Term
TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer. |
|
Definition
|
|
Term
The obvious solution to an Internet running two versions of IP is to have it populated by hosts and routers that also run two versions of IP. |
|
Definition
|
|
Term
By default, application services such as DNS, DHCP, and FTP are compatible with the IPv6 address space. |
|
Definition
|
|
Term
The nested model could be used for an IPv6 site that requires one or more “islands” of IPv4 subnets. |
|
Definition
|
|
Term
The transition from IPv4 to IPv6 requires that multiple stages occur in the move from a pure IPv4 environment to one that exclusively uses IPv6. |
|
Definition
|
|
Term
Both dual-IP-layer and dual-stack architecture require IPv6-over-IPv6 tunneling to be effective as a transition mechanism. |
|
Definition
|
|
Term
When applications are written, they usually call functions in standard libraries that implement network tasks. |
|
Definition
|
|
Term
Most IPv4 drivers are old, which means that they are full of bugs. |
|
Definition
|
|
Term
The reasons for which a company is deploying IPv6 should not determine the due dates and project funding. |
|
Definition
|
|
Term
You do not have to perform IP subnetting in IPv6 because each subnet can support an extremely large number of hosts. |
|
Definition
|
|
Term
Use of DHCPv6 for address assignment will result in a locally unique host identifier that changes when you move to a different network. |
|
Definition
|
|
Term
Fundamental protocols—including IP and TCP or UDP—offer no built-in security controls. |
|
Definition
|
|
Term
A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections. |
|
Definition
|
|
Term
Proxy server software permits internal network addresses to be “translated” into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet. |
|
Definition
|
|
Term
Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic. |
|
Definition
|
|
Term
____ uses ICMPv6 type 134 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
____ uses ICMPv6 type 135 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
____ uses ICMPv6 type 136 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
C. Neighbor Advertisement |
|
|
Term
____ use ICMPv6 type 137 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Redirect |
|
Definition
|
|
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::2).
a.all nodes
c.all proxies
b.all routers
d.all domains |
|
Definition
|
|
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::1).
a.all nodes
c.all proxies
b.all routers
d.all domains |
|
Definition
|
|
Term
IPv6 Neighbor Solicitation protocol can be compared with IPv4 ____. a. ARP Request c. Router Advertisement b. Router Solicitation d. Redirect |
|
Definition
|
|
Term
In the ICMPv6 Router Solicitation message, the ____ field is an unused field that is set to 0 by the source node and ignored by the destination node.
a.Reserved
c.Checksum
b.Options
d.Type |
|
Definition
|
|
Term
The Target Link-Layer Address option is used in Neighbor Advertisement and ____ messages.
a.Neighbor Advertisement
c.Router Solicitation
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
The ____ option is sent in Router Advertisement messages to provide a common MTU value for nodes on the same network segment.
a.Prefix Information
c.Redirected Header
b.Target Link-Layer Address
d.MTU |
|
Definition
|
|
Term
The ____ option, if included, is used in Mobile IPv6 by mobile nodes receiving Router Advertisement messages for their movement detection algorithm.
a.Target Link Layer Address
c.Advertisement Interval
b.Redirected Header
d.Home Agent Information |
|
Definition
|
|
Term
A node invokes the ____ process when it wants to send a packet to an on-link neighbor but the sender does not know the link-layer address for the target node.
a.Address Resolution
c.Router Discovery
b.Duplicate Address Detection
d.Redirect Function |
|
Definition
|
|
Term
____ is used by nodes to discover neighbor routers on the local link, learn prefixes, configure their default gateway, and other possible configuration parameters relating to autoconfiguration (stateless or stateful) useful to the node.
a.Address Resolution
c.Router Discovery
b.Duplicate Address Detection
d.Redirect Function |
|
Definition
|
|
Term
____ was developed in the 1970s as a way to provide sufficient network access so diskless workstations could access startup information across the network, instead of reading it from a local disk drive.
a.TCP/IP
c.DHCP
b.WINS
d.BOOTP |
|
Definition
|
|
Term
If no DHCP server is present in some broadcast domain, a special piece of software called a(n)____ must be present in that broadcast domain.
a.broadcast bit
c.DHCP relay agent
b.address pool
d.address scope |
|
Definition
|
|
Term
The job of the DHCP ____ software is to intercept address requests on a local cable segment and repackage those requests as a unicast to one or more DHCP servers.
a.relay agent
c.client
b.cluster
d.router |
|
Definition
|
|
Term
With a(n) ____ the administrator explicitly assigns an IP address manually by associating a client’s hardware address with a specific IP address to be leased to that client.
a.dynamic address lease
c.IP gateway
b.manual address lease
d.discovery broadcast |
|
Definition
|
|
Term
A(n) ____ is used to assign addresses to clients or other machines when fixed IP addresses are not required.
a.dynamic address lease
c.IP gateway
b.manual address lease
d.discovery broadcast |
|
Definition
|
|
Term
When a DHCP client boots up, it performs a Standard ____ to enable it to communicate on the network.
a.Address Discovery
c.Router Discovery
b.Client Discovery
d.Packet Discovery |
|
Definition
|
|
Term
The ____ packet includes the IP address that is offered to the client and, sometimes, answers to the requested options in the DHCP Discover packet.
a.Acknowledgement
c.Request
b.Offer
d.Discover |
|
Definition
|
|
Term
The ____ packet is sent from the server to the client to indicate the completion of the four-packet DHCP Discovery process.
a.Acknowledgement
c.Request
b.Offer
d.Discover |
|
Definition
|
|
Term
The ____ field contains the address being offered by the DHCP server.
a.Your IP Address
c.Flags
b.Hops
d.Transaction ID Number |
|
Definition
|
|
Term
The DHCP ____ process relies heavily on broadcasts, but most routers do not forward broadcasts.
a.discovery
c.request
b.lease
d.boot |
|
Definition
|
|
Term
One good way to troubleshoot DHCP is to use a ____.
a.relay agent
c.firewall
b.router
d.protocol analyzer |
|
Definition
|
|
Term
By ____ DNS data from one or more database segments on one or more DNS servers, DNS also provides a mechanism whereby it can attempt to satisfy name resolution requests locally before attempting them remotely, thereby greatly improving the speed of such name resolution.
a.transferring
c.resolving
b.caching
d.spoofing |
|
Definition
|
|
Term
A ____ record is used to create aliases.
a.canonical name
c.name server
b.mail exchange
d.pointer |
|
Definition
|
|
Term
A(n) ____ record stores IP address-to-domain name translation data and supports the operation known as a reverse DNS lookup.
a.well-known services
c.pointer
b.text
d.host information |
|
Definition
|
|
Term
A(n) ____ record lists the IP-based services, such as Telnet, FTP, HTTP, and so forth, that an Internet host can supply.
a.well-known services
c.name server
b.text
d.host information |
|
Definition
|
|
Term
It is important to understand that the zone data on a secondary server always originates from a(n) ____ server.
a.caching
c.name
b.incremental
d.primary |
|
Definition
|
|
Term
A(n) ____ is usually some application or service that encounters a domain name for which it needs an IP address.
a.address request
c.caching server
b.TCP/IP client
d.DNS client |
|
Definition
|
|
Term
Most DNS resolvers issue what is called a(n) ____ from the client side.
a.recursive query
c.nslookup
b.address query
d.name query |
|
Definition
|
|
Term
A ____ is a query that keeps working until an answer of some kind is forthcoming.
a.domain query
c.recursive query
b.reverse query
d.NSLOOKUP query |
|
Definition
|
|
Term
____ requests always go to the name server that is authoritative for the domain that contains the requested name or address to make completely sure data is obtained directly from the source.
a.Root server
c.Mail server
b.Client server
d.Cache server |
|
Definition
|
|
Term
DNS ____ is responsible for initiating and sequencing DNS queries that result in name resolution for an application running on the computer.
a.name resolver
c.primary master
b.subdomain
d.caching server |
|
Definition
|
|
Term
By default, ____ queries the default name server specified in the current machine’s TCP/IP configuration.
a.nslookup
c.multi-homed
b.mail exchange
d.IP |
|
Definition
|
|
Term
____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP.
a.UDP
c.RTO
b.DoS
d.MSS |
|
Definition
|
|
Term
UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing.
a.20
c.40
b.30
d.50 |
|
Definition
|
|
Term
Dynamic ports are used as ____ for specific communications while they are underway.
a.temporary ports
c.byte streams
b.core services
d.lost segments |
|
Definition
|
|
Term
The ____ process guarantees that packets are ordered properly and protects against missing segments.
a.watchdog
c.handshake
b.keep-alive
d.sequence and acknowledgement |
|
Definition
D. sequence and acknowledgement |
|
|
Term
____ is the overloading of the network or a receiver.
a.Sequence number tracking
c.Congestion
b.Buffering
d.Windowing |
|
Definition
|
|
Term
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____ without waiting for the retransmission timer to expire.
a.duplicate ACKs
c.byte streams
b.core services
d.lost segments |
|
Definition
|
|
Term
TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender.
a.congestion
c.sliding window
b.retry
d.watchdog |
|
Definition
|
|
Term
____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.
a.DoS
c.Time Wait delay
b.Silly Window Syndrome
d.Retransmission timeout |
|
Definition
|
|
Term
The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned.
a.host
c.port
b.packet
d.segment |
|
Definition
|
|
Term
____ addresses are composed of a valid 64-bit unicast address prefix and an IPv4 interface identifier.
a.ISATAP
c.6to4
b.Teredo
d.6over4 |
|
Definition
|
|
Term
The ____ network model can represent a number of hybrid configurations, but it assumes that a site has a variety of different subnets, based on IP version implementation.
a.basic hybrid
c.nested
b.transition hybrid
d.true hybrid |
|
Definition
|
|
Term
A(n) ____ protocol for a host or router is implemented at the level of the device’s operating system, allowing the device to support both IPv4 and IPv6, either as independent protocols or in a hybrid form.
a.dual-stack
c.hybrid
b.dual-architecture
d.transition |
|
Definition
|
|
Term
With IPv6-over-IPv4, when the IPv4 header is created, the protocol field value is set at ____ to indicate that it is an encapsulated IPv6 packet.
a.37
c.53
b.41
d.61 |
|
Definition
|
|
Term
The ____ node is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet.
a.encapsulator
c.decapsulator
b.parser
d.gateway |
|
Definition
|
|
Term
ISATAP nodes locate an ISATAP router by using address prefixes advertised by the ISATAP ____ that identifies the logical ISATAP subnet for the nodes.
a.proxy
c.relay
b.gateway
d.router |
|
Definition
|
|
Term
A 6to4 ____ is a specialized device that acts as an IPv6/IPv4 router.
a.router
c.node/router
b.relay
d.host/router |
|
Definition
|
|
Term
A Teredo ____ is an IPv4/IPv6 node that is connected to both an IPv4 Internet and an IPv6 Internet using different interfaces.
a.client
c.relay
b.host
d.server |
|
Definition
|
|
Term
The key point with IPv6 deployments is that they use a new “____ layer” or “routed” protocol.
a.physical
c.network
b.data
d.transport |
|
Definition
|
|
Term
____ address autoconfiguration is accomplished via a new version of DHCP known as DHCPv6.
a.Stateless
c.Aware
b.Stateful
d.Awareless |
|
Definition
|
|
Term
Stateless address autoconfiguration is defined in the aptly named RFC ____, “IPv6 Stateless Address Autoconfiguration.”
a.3314
c.4862
b.3786
d.5123 |
|
Definition
|
|
Term
Static tunnels on the routers are often called ____ tunnels.
a.private
c.automatic
b.configured
d.self-managed |
|
Definition
|
|
Term
ISATAP requires all hosts to be ____ stack.
a.single
c.home
b.mono
d.dual |
|
Definition
|
|
Term
RFC 6145 describes ____ IP/ICMP translation, or SIIT.
a.awareless
c.awareful
b.stateless
d.stateful |
|
Definition
|
|
Term
The current clear front-runner for most IPv4-to-IPv6 transitions is the ____ method.
a.dual-stack
c.Teredo
b.6to4
d.ISATAP |
|
Definition
|
|
Term
____ are quite popular in legacy IPv4 networks because they solve several issues regarding tracking and assignment of scarce resources and they facilitate DDNS.
a.DHCPv6
c.IPAMs
b.CMDBs
d.OOB gateways |
|
Definition
|
|
Term
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.
a.agent
c.port scanner
b.Trojan
d.socket |
|
Definition
|
|
Term
A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.
a.back door
c.discovery
b.hole
d.hash |
|
Definition
|
|
Term
The purpose of ____ is to find out what you have and what is vulnerable.
a.reconnaissance
c.session hijacking
b.covering-up
d.packet sniffing |
|
Definition
|
|
Term
____-related attacks include SYN Flood, broadcast amplification attacks, and buffer overflow.
a.DoS
c.Man-in-the middle
b.Brute force
d.IP service |
|
Definition
|
|
Term
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.
a.SA bundle
c.Adware
b.Spyware
d.Cache |
|
Definition
|
|
Term
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.
a.Ingress filtering
c.Network sniffing
b.Data authentication
d.Spoofing |
|
Definition
|
|
Term
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.
a.Access control
c.Data origin authentication
b.Connectionless integrity
d.Confidentiality |
|
Definition
|
|
Term
A function that provides ____ checks the integrity of each packet individually.
a.access control
c.data origin authentication
b.connectionless integrity
d.confidentiality |
|
Definition
B. connectionless integrity |
|
|
Term
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.
a.firewall
c.DMZ
b.bastion host
d.boundary router |
|
Definition
|
|
Term
A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.
a.firewall
c.DMZ
b.bastion host
d.boundary router |
|
Definition
|
|