Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


NetWare IPX addressing uses a network number and a node

number. Which statements are true?

A. The network address is administratively assigned and can

be up to 16 hexadecimal digits long.

B. The node address is always administratively assigned.

C. The node address is usually the MAC address.

D. If the MAC address is used as the node address, then IPX

eliminates the use of ARP.



NetWare IPX addressing uses a network number and a node number. Which statements are true? A. ..

Answer / guest

Answer: A, C &D

The network address can be up to 16

hexadecimal digits in length. The node number is 12

hexadecimal digits. The node address is usually the MAC

address. An example IPX address is 4a1d.0000.0c56.de33.

The network part is 4a1d. The node part is 0000.0c56.de33.

The network number is assigned by the system administrator

of the Novell network.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the subnet? Why is it used?

0 Answers  


What command can be used to test IPX connectivity? A.) Ping 2e.000.0045.8923 B.) Ping 192.168.100.1 C.) Ping ipx 2e.0000.0045.8923 D.) Ipx ping 2e.0000.0045.8923

2 Answers   Ethio Telecom,


2500 Value in which type of access list?

0 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

3 Answers  


Identify the command to display the Frame Relay map table? A.) Router# display frame-relay map B.) Router# show frame-relay map C.) Router(setup)# show frame-relay map D.) Router# show map frame-relay

1 Answers  


Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic

1 Answers  


what is subnet mask?

5 Answers   HCL,


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


How does rip differs from igrp?

0 Answers  


What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3

1 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP

2 Answers  


Categories