NetWare IPX addressing uses a network number and a node

number. Which statements are true?

A. The network address is administratively assigned and can

be up to 16 hexadecimal digits long.

B. The node address is always administratively assigned.

C. The node address is usually the MAC address.

D. If the MAC address is used as the node address, then IPX

eliminates the use of ARP.



NetWare IPX addressing uses a network number and a node number. Which statements are true? A. ..

Answer / guest

Answer: A, C &D

The network address can be up to 16

hexadecimal digits in length. The node number is 12

hexadecimal digits. The node address is usually the MAC

address. An example IPX address is 4a1d.0000.0c56.de33.

The network part is 4a1d. The node part is 0000.0c56.de33.

The network number is assigned by the system administrator

of the Novell network.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the command to start IP RIP version 1 routing on a Cisco router? A. show rip B. enable rip C. router enable D. router rip

6 Answers  


You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255

2 Answers  


Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN

1 Answers  


What is the different between console port and auxiliary port?

0 Answers  


what is the subnet for the host ip address 172.16.210.0/22

8 Answers   IBM, Microland,






1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself

1 Answers  


1) How a router established a neighbor relation ship in ospf

1 Answers   Infosys,


Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation

2 Answers   CTS,


What key do you use to view the last command? A.) Left Arrow B.) Ctrl-P C.) Up Arrow D.) Right Arrow

2 Answers  


How do we do encryption and authentication in L2TP?

0 Answers   CCIE,


Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table

1 Answers  


5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address

6 Answers  


Categories