Briefly describe ISATAP.

What will be an ideal response?


ISATAP automatic tunneling, which can be applied to dual-stack devices, implements router-to-host, host-to-router, and host-to-host address assignments so that any two IPv6 nodes can communicate with each other over an IPv4 network infrastructure. ISATAP is supported on Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008. Additionally, Windows XP SP 1 (and updated in SP 2) has the ability to automatically assign link-local ISATAP addresses to each IPv4 network interface as an ISATAP tunneling interface. These addresses are fixed as FE80::5EFE:w.x.y.z for private addresses or FE80::200:5EFE:w.x.y.z for public addresses.

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2Jakob needs to modify some reports that were already created by his team. Some of the changes will require working with controls that are bound to the data that underlies the report, some will be changes that have no link to the data source, and still others will be mathematically determined by performing a calculation using the contents of a field or fields in the table. Jakob needs to add a title to his report and the title will not be coming from the underlying table. What kind of control does he use to perform this addition?

A. unbound B. calculated C. bound D. concatenated

Computer Science & Information Technology

Items such as graphics, charts, or spreadsheets that can be inserted into Word documents are called:

A) blocks. B) placeholders. C) templates. D) objects.

Computer Science & Information Technology

All of the following statements are TRUE about the new data model EXCEPT:

A) Data can be added to the data model from a variety of sources. B) Many organizations store data inside a relational database such as MySQL, Oracle, or a DBMS like Microsoft Access. C) Most organizations store their data in a relational database in order to ensure their data are secure, accurate, and consistent. D) Prior to Excel 2010, it would be very complicated and time consuming to integrate relational data into an analysis.

Computer Science & Information Technology

What is the calculation you should use for safeguard value?

A. (ALE before safeguard) + (ALE after safeguard) – (annual cost of safeguard) B. (ALE before safeguard) – (ALE after safeguard) – (annual cost of safeguard) C. (ALE before safeguard) – (ALE after safeguard) + (annual cost of safeguard) D. (ALE before safeguard) + (ALE after safeguard) + (annual cost of safeguard)

Computer Science & Information Technology