Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
Network III.

Quiz
•
Computers
•
University
•
Medium
Judit Horváth
Used 1+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The Source Address field name from IPv4 is kept in IPv6.
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
Answer explanation
The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.192
255.255.255.252
255.255.255.240
255.255.255.0
255.255.255.224
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What characteristic describes identity theft?
the use of stolen credentials to access private data
software on a router that filters traffic based on IP addresses or applications
software that identifies fast-spreading threats
a tunneling protocol that provides remote users with secure access into the network of an organization
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
255.255.255.0
255.255.255.248
255.255.255.224
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cost per meter (foot)
cable lengths
connector color
pinouts
connector types
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What is wrong with the displayed termination?
The woven copper braid should not have been removed.
The wrong type of connector is being used.
The untwisted length of each wire is too long.
The wires are too thick for the connector that is used.
Answer explanation
When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
FTP
SSH
Telnet
Create a free account and access millions of resources
Similar Resources on Quizizz
46 questions
CTBASNTL - INF226 Online Midterm Examination

Quiz
•
University
47 questions
Iceberg_TeamMode_Post

Quiz
•
University
50 questions
JARINGAN KOMPUTER

Quiz
•
University
50 questions
THIRD QUARTER ASSESSMENT IN CSS - GRADE 9

Quiz
•
9th Grade - University
48 questions
NET1L - Lesson 11 (IPv4 Addressing)

Quiz
•
University
50 questions
Routing & OSPF

Quiz
•
University
50 questions
P2 NETWORKING BSIT 2-2

Quiz
•
University
53 questions
Azure Networking and Security Quiz

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade