Given the Novell IPX address 1aceb0b.0000.0c12.3456 which
part is

the network portion of the address?

A.) 0000

B.) 1

C.) 3456

D.) 1ace

E.) 0000.0c12.3456

F.) 1aceb0b

Answers were Sorted based on User's Feedback



Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the add..

Answer / reddy

e

Is This Answer Correct ?    0 Yes 0 No

Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the add..

Answer / guest

Answer: F

IPX addresses are 80 bits total: The first section of the
address is the

network portion, the last 3 groups of numbers are the host.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

Where would network testing be included in an IP packet? A. IP Options field B. Identification field C. Type of Service field D. Reservation field

1 Answers  


Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

2 Answers  


At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 Answers   EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,


hi im ccna certified im searching 4 job in networking domain can any guide wats the rite way of job approach ,wat r the rite sites for searching job im eagerly 4 ur replies

1 Answers  


Can you explain the broader steps of how L2F establishes the tunnel?

0 Answers   CCIE,






HIGH MY ALL FRIENDS. CURRENTLY I AM WORKING DESKTOP SUPPORT ENGINEER IN mahindra & mahindra lTD.I AM CERTIFIED IN CCNA SINCE 28 DEC 2009.BUT I HAVE NOT RECEIVED CCNA CERTIFICATE. PLEASE HELP ME ..HOW RECEIVE THE CCNA CERTIFICATE.IF ANY INFORMATION IS AVAILABLE PLS SEND INFORMATION TO MY GMAIL ID.MY ID---- ngawde.cisco@gmail.com ngawde@yahoo.com

1 Answers   MAHINDRA,


How does Hold-downs work?

0 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link

1 Answers  


Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classfull address, no subnets C.) Enable CDP so neighbors can be detected D.) Same autonomous network

1 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

2 Answers  


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


Categories