1. How many bits are in an Ipv6 address? ____ 128 ____ 2. How many bits are used
ID: 3672229 • Letter: 1
Question
1. How many bits are in an Ipv6 address? ____128____
2. How many bits are used for network? __________ How many bits for Host? _________
3. In IPv4 a period separates the bytes like 192.168... How many bytes are between the colons in IPv6 typically? _______ ( not the abbreviated IPv6).
4. What is a nibble?_____________
5. What does the Zone ID, sometimes called Scope ID, after the Link Local address identify? __________
6. How many bits are used for the Interface ID? __________
7. When subnetting use ______________ nibble boundaries (count in increments of _____ when selecting subnets).
8. A Managed Address Configuration flag (M Flag) indicates a (a) stateful or (b) stateless configuration?_______
9. Explain to the best of your ability how Internet Connection Sharing (ICS) with IPv6 turned on can allow your computer to become a man in the middle attack host?
10. What is the difference between the commands:
ping -4 www.yahoo.com and ping -6 www.yahoo.com
Explanation / Answer
1.16 bits
2.32bits,32bit
3.The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address. IPv6 addresses look nothing like IPv4 addresses. IPv6 addresses are 128 bits in length and are made up of hexadecimal characters.
4.In computers and digital technology, a nibble (pronounced NIHB-uhl; sometimes spellednybble) is four binary digits or half of an eight-bit byte. A nibble can be conveniently represented by one hexadecimal digit.
5.
The purpose of zone IDs is to distinguish these addresses. For instance, if host A has two NICs that are connected to two different links (subnets), the same local-link address could have been used for NIC 1 on host A and on host B that is on the link of host A’s NIC 2. To distinguish this ambiguous link-local address, host A uses the interface index of NIC 1 as the zone ID for the local IP address.
For site-local addresses, the operating system uses the site ID (also called the scope ID). If a host is only connected to one site, this ID is always 1.
6..64 bits
7.The reason this is such an important question is that it's very easy to get IPv6 subnetting wrong by doing it like you do in IPv4. The problem is that there is a paradigm shift needed from IPv4 subnetting to IPv6 subnetting — you simply can't approach them the same way. The reason for this harkens back to the primary driver for deploying IPv6 in the first place: More addresses! So many more in fact that individual addresses become essentially meaningless in IPv6 address planning and subnetting. A single IPv6 /64 subnet contains roughly ten quintillion addresses, quite obviously more than you will ever need in one IP network segment.
8.Managed-Config-Flag tells the end-host to use DHCPv6 exclusively.Other-Config-Flag tells the end-host to use SLAAC to get IPv6 address and DHCPv6 to get other parameters (DNS server address, for example).Absence of both flags tells the end-host to use only SLAAC.
9.
As you create a network security policy, you must define procedures to defend your network and users against harm and loss. With this objective in mind, a network design and the included components play an important role in implementing the overall security of the organization.
An overall security solution includes design elements and components such as firewalls, VLANS, and perimeter network boundaries that distinguish between private networks, intranets, and the Internet. This section discusses these elements and will help you tell them apart and understand their function in the security of the network.
10.The Ping service allows you to notify Yahoo! when your site changes. You may notify us about a single page, or a set of pages that need attention. This call is very similar to the Update Notification service, but does not require an appid.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.