Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the two components of an IPX address?

A. network number IP address

B. MAC address node number

C. network number MAC address

D. network number arched number



What are the two components of an IPX address? A. network number IP address B. MAC address nod..

Answer / guest

Answer: C

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?

8 Answers   Cubicor, HCL,


Name the 2 protocols are in wan technology?

0 Answers  


Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols

1 Answers  


How many ports are present in a router?

0 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


Which protocol called rapid protocol?

0 Answers  


What does the Frame Relay switch use to distinguish between each PVC connection? A. data-link connection identifiers (DLCIs) B. BECNs C. FECNs D. the Local Management Interface (LMI)

2 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub

5 Answers   CET, IBM,


Explain the difference between simple authentication and md5?

0 Answers  


what is burst rate

1 Answers   ASD Lab,


7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater

2 Answers   iGate,


Categories