Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Novell IPX network addresses have two conferrable parts.
The network administrator specifies the IPX network number.
How is the node number determined?

A. It is the serial number of the given device

B. It is assigned as a lease by Novell DHCP

C. It is also set by the network administrator

D. It is usually the MAC address of one Interface

E. It is downloaded by Netware Core Protocol (NCP)



Novell IPX network addresses have two conferrable parts. The network administrator specifies the I..

Answer / guest

Answer: D

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Explain the types of ethernet?

0 Answers  


Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register

1 Answers  


Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network

3 Answers  


what are the different asymmetric algorithms?

0 Answers   CCIE,


Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute

4 Answers   CTS,


Explain the difference between half-duplex and full-duplex?

0 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP

2 Answers  


What is the meaning of synchronization?

0 Answers  


Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process

1 Answers  


When you use the Cisco IOS command show configuration on a router which part of the output shows the specific conferred IP addresses and shored masks? A. the IP host table B. the interfaces output C. each section of the output D. the global configuration statements E. the section under the autonomous system number

1 Answers  


Identify the named IP access-list number range? A.) 600 - 699 B.) 1 - 99 C.) 900 - 999 D.) 200 - 299 E.) none of the above

2 Answers  


Categories