Solved

I need clarification on this question for my MCSE EXAM

Posted on 2011-09-13
3
396 Views
Last Modified: 2012-05-12
You work as the enterprise administrator at CertKiller.com. The CertKiller.com network consists of
a single Active Directory domain named CertKiller.com which uses Internet Protocol version 6
(IPv6)
CertKiller.com currently has their headquarters located in Miami containing 25 subnets.
During the course of the business day you receive instruction from CertKiller.com to install a
server named CERTKILLER-SR01 on the network. CertKiller.com wants you to configure
CERTKILLER-SR01 to communicate with all client computers on all the IPv6 subnets.

What should you do?
Microsoft 70-649: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 127
ActualTests.com
A. You should consider having the IPv6 address fe80::2c0:d11f:fec8:3124/64 configured for
CERTKILLER-SR01.
B. You should consider having the IPv6 address fd00:: 2c0:d11f:fec8:3124/8 configured for
CERTKILLER-SR01.
C. You should consider having the IPv6 address 0000::2c0:d11f:fec8:3124/64 configured for
CERTKILLER-SR01.
D. You should consider having the IPv6 address ff80::2c0:d11f:fec8:3124/64 configured for
CERTKILLER-SR01

What is the answer?
0
Comment
Question by:Zak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 19

Accepted Solution

by:
bevhost earned 500 total points
ID: 36534133

They will be looking for Answer B.

why?

fd00:: is a private IP range which can only be used by computers on a closed network.
fe80:: is a local link only.
0000:: is a deprecated IPv4 Address map.
ff80:: is in the multicast range


(fd00:: addresses are also not recommended, as you really should use public address space. So one could argue the correct answer is E) none of the above.)



0
 

Author Comment

by:Zak
ID: 36555236
Thank you for the explanation.
0
 

Author Closing Comment

by:Zak
ID: 36555237
Thanks
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question