Match each item with a statement below.

A. a protocol in IPv6 that permits nodes and routers on a local link to keep one another updated about any recent change in their network connectivity or status
B. a method for checking the IPv6 address that a node wishes to use by sending a Neighbor Advertisement message to see if it is already in use by some other node
C. messages used to find (or verify) the link-layer address for a local node, to see if that node is still available, or to check that an address is not in use by another node
D. a message sent out by a router which contains its own link-layer address, the network prefix of the local subnet, the MTU for the local link, suggested hop limit values, and other parameters useful for nodes on the local link
E. messages sent by nodes that include their IPv6 and link-layer addresses to maintain information about local addresses and on-link status
F. a reserved address used as a source address if a node does not have an assigned IPv6 address
G. a message sent out by a router to inform a sending node that there is a better first-hop router to access a destination node that is off-link
H. a message sent out by a node to ask routers connected to a local link to identify themselves by immediately sending a Router Advertisement message rather than waiting for the next scheduled advertisement to appear
I. a multicast address with link-local scope, which helps reduce the number of multicast groups to which nodes must subscribe in order to make themselves available for solicitation by other nodes on their local links


A. Neighbor Discovery
B. Duplicate Address Detection
C. Neighbor Solicitation
D. Router Advertisement
E. Neighbor Advertisement
F. unspecified address
G. Redirect
H. Router Solicitation
I. solicited-node address

Computer Science & Information Technology

You might also like to view...

You can use the ____ statement to code both a pretest loop and a posttest loop.

A. For…Next B. While…Wend C. Next…For D. Do…Loop

Computer Science & Information Technology

Suppose str is a String variable. The statement str = new String("Programming"); is similar to which of the following?

A. new String = "Programming"; B. String new = "Programming"; C. str = "Programming"; D. str new "Programming";

Computer Science & Information Technology

Ann, a security administrator at a call center, has been experiencing problems with users intentionally installing unapproved and occasionally malicious software on their computers. Due to the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?

A. Deploy a HIDS suite on the users' computer to prevent application installation B. Maintain the baseline posture at the highest OS patch level C. Enable the pop-up blockers on the user's browsers to prevent malware D. Create an approved application list and block anything not on it

Computer Science & Information Technology

____ feasibility determines whether there are specific budget limitations on a project decision.

A. Economic B. Operational C. Technological D. Timeline

Computer Science & Information Technology