NetWare IPX addressing uses a network number and a node
number. Which statements are true?
A. The network address is administratively assigned and can
be up to 16 hexadecimal digits long.
B. The node address is always administratively assigned.
C. The node address is usually the MAC address.
D. If the MAC address is used as the node address, then IPX
eliminates the use of ARP.
Answer / guest
Answer: A, C &D
The network address can be up to 16
hexadecimal digits in length. The node number is 12
hexadecimal digits. The node address is usually the MAC
address. An example IPX address is 4a1d.0000.0c56.de33.
The network part is 4a1d. The node part is 0000.0c56.de33.
The network number is assigned by the system administrator
of the Novell network.
Is This Answer Correct ? | 0 Yes | 0 No |
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
Who controls mac address uniqueness and how?
Tell me which cable called roll-over?
What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"
Mention the ranges for the private IP?
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
10. Which STP state populates the MAC address table but doesn't forward data frames? A. Blocking B. Listening C. Learning D. Forwarding
Which protocol works only on cisco routers?
Which LAN switching method is used in CISCO Catalyst 5000?
Explain what is route poisoning?
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical