NetWare IPX addressing uses a network number and a node

number. Which statements are true?

A. The network address is administratively assigned and can

be up to 16 hexadecimal digits long.

B. The node address is always administratively assigned.

C. The node address is usually the MAC address.

D. If the MAC address is used as the node address, then IPX

eliminates the use of ARP.



NetWare IPX addressing uses a network number and a node number. Which statements are true? A. ..

Answer / guest

Answer: A, C &D

The network address can be up to 16

hexadecimal digits in length. The node number is 12

hexadecimal digits. The node address is usually the MAC

address. An example IPX address is 4a1d.0000.0c56.de33.

The network part is 4a1d. The node part is 0000.0c56.de33.

The network number is assigned by the system administrator

of the Novell network.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 Answers   Wipro,


Who controls mac address uniqueness and how?

0 Answers  


Tell me which cable called roll-over?

0 Answers  


What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"

1 Answers   Cisco,


Mention the ranges for the private IP?

0 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255

1 Answers  


10. Which STP state populates the MAC address table but doesn't forward data frames? A. Blocking B. Listening C. Learning D. Forwarding

3 Answers   Cisco,


Which protocol works only on cisco routers?

0 Answers  


Which LAN switching method is used in CISCO Catalyst 5000?

0 Answers  


Explain what is route poisoning?

0 Answers  


Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical

6 Answers   Wipro,


Categories