Internet Protocol Analysis/IPv6/Quiz

1

IPv6 is an

-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks.

2

IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of

.

3

IPv6 uses

-bit addresses, commonly displayed to users as

groups of

hexadecimal digits separated by

.

4

In an IPv6 address, leading zeroes may be removed from any group of hexadecimal digits. Multiple consecutive groups of zeroes may be replaced with

.

5

The IPv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to

bits.

6

IPv6 does not implement interoperability features with IPv4, but essentially creates a

. Exchanging traffic between the two networks requires special translator

.

7

Work on IPv6 began by

, and was first published in a series of RFCs in

.

8

Most transport and application-layer protocols need

to operate over IPv6.

9

Multicasting is part of the base specification in IPv6. IPv6 does not implement traditional IP

and does not define

.

10

IPv6 hosts can configure themselves automatically when connected to a routed IPv6 network using the

via Internet Control Message Protocol version 6 (ICMPv6) router discovery messages.

11

IPv6 routers do not perform

.

12

Privacy extensions for IPv6 allow the operating system to generate

for communication with remote hosts.

13

The IPv6 header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. The fixed header requires

octets (

bits) and contains

.

14

The IPv6 loopback address is

.

15

Link-local addresses begin with

.

16

Tunneling may be used to enable IPv4 networks to communicate with IPv6 networks. In tunneling,

packets are encapsulated within

packets, in effect using

as a

layer for

.

17

Teredo is an

-site tunneling technique that uses

encapsulation and

cross Network Address Translation (NAT) nodes.

18

Teredo addresses begin with

.

19

ISATAP is an

-site tunneling technique that uses

encapsulation. It

cross NAT nodes.

20

ISATAP addresses begin with

.

21

6to4 is an

-site tunneling technique that uses

encapsulation. It

cross NAT nodes.

22

6to4 addresses begin with

and relay through

.

23

6in4 is a

-site tunneling technique that uses

encapsulation. It

cross NAT nodes.

24

6in4 addresses are

addresses assigned by the tunnel broker, and therefore create security risks.

25

NAT64 is a

that allows

-only hosts to communicate with

-only servers.

26

NAT64 server addresses begin with

.