Quiz Complete, well Done!
Every device connected to a network must have a
MAC address.
IP v6 addresses are made up of
bits.
What is the range of possible MAC addresses?
the mac address of a device can make it difficult to track the origin of a network attack.
Mac address spoofing is often used in
attacks to intercept network traffic.
The first three groups in a MAC address represent the
of the device.
MAC Addresses
Mac address spoofing can be used to
security measures and gain unauthorized access to a network.
Using a
IP address provides an additional layer of security by hiding devices from the public internet.
An IPv4 address consists of
octets.
Which of the following is a valid IPv6 address?
What is the purpose of a MAC address?
How many bytes are there in a MAC address?
The use of
IP addresses helps conserve IPv4 address space.
How many bits does IPv4 address consist of?
Which layer of the OSI model is responsible for assigning MAC addresses?
What does IPv6 stand for?
public IP
A
IP address is only accessible within a local network.
Which part of an IPv4 address identifies the network?