Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-246 Exam - Cheat-Test.com

Free 920-246 Sample Questions:

Q: 1 A customer is planning protection for their WLAN. Part of their basic plan is to use a closed system. Which statement describes a closed system?
A. SSID is not broadcast.
B. IPSec is implemented.
C. WEP encryption is used.
D. Only specific MAC addresses have access to the WLAN.
Answer: A

Q: 2 A customer is setting up their WLAN 2300 series to provide security. They have an existing PKI environment in place, and would like to leverage the existing environment. Which supported authentication/encryption method will meet this requirement?
A. PEAP
B. EAP-TLS
C. EAP-MD5
D. WPA-PSK
Answer: B

Q: 3 A customer is using the WMS 2300 planning tool to plan wireless coverage for a site. An important part of this configuration is properly configuring the layout. What is the most important consideration when configuring the layout using the WMS planning tool?
A. the location of the APs
B. the number of security switches
C. the proper scaling of the document
D. a location of the seed Wireless Security Switch
Answer: C

Q: 4 WLAN management system 2300 allows you to create a network plan. This plan can optionally be saved into a standard format. Which program is used to view a network plan?
A. Text Editor
B. Adobe Acrobat
C. Microsoft PowerPoint
D. Standard web browser
Answer: D

Q: 5 A customer is setting up their WLAN 2300 series to provide security. They need to provide for encryption and authentication via 802.1x. Which two supported authentication/encryption methods will meet this requirement? (Choose two.)
A. PEAP
B. EAP-TLS
C. EAP-MD5
D. MAC authentication
Answer: A, B

Q: 6 The WLAN 2300 series support a mobility domain. The mobility domain allows for transparent roaming and consistent user experience. In providing the benefits of a mobility domain, which two statements are true? (Choose two.)
A. All APs broadcast identical SSIDs.
B. A mobility domain seed member must be configured.
C. WMS 2300 manages all Wireless Security Switches.
D. All WSSs must be a member of the same mobility domain.
Answer: B, D

Q: 7 All communication between the WLAN Security Switch and AP is encrypted, including all control and management traffic. This feature limits the ability of the Rogue AP to join the network. Which two methods are used to secure this traffic? (Choose two.)
A. WEP
B. AES-CCM
C. HMAC-MD5
D. 802.1X/EAP
Answer: B, C

Q: 8 The 2330 AP can be deployed easily throughout the WLAN. It is designed for dense deployments and delivers high performance without sacrificing security. However, when deployed in a distributed topology, the 2330 has certain requirements. Which two are required in a Distributed Topology? (Choose two.)
A. DHCP Server
B. SSL certificate
C. Layer three device (router)
D. PoE (Power over Ethernet)
Answer: A, D

Q: 9 A customer is implementing security with the WLAN 2300 series, and they want to provide strong authentication of their users. They want the Wireless Security Switch to authenticate users directly to an external database. Which database can the Wireless Security Switch directly query?
A. NTLM
B. RADIUS
C. Certificate Authority
D. Active Directory (LDAP)
Answer: B

Q: 10 The WLAN 2300 series can use ACLs to prioritize traffic. VoIP traffic requires prioritization to ensure fast delivery of voice packets. ACLs can be used to prioritize WMM or non WMM traffic. How do ACLs prioritize traffic?
A. They modify the ToS field.
B. They modify the CoS field.
C. They modify the IP address.
D. They modify the MAC address.
Answer: B

Q: 11 A customer is implementing security with the WLAN 2300 series and wants to provide strong authentication of their users. They have an existing LDAP database with users already configured. What must be in place to query the LDAP server?
A. NTLM
B. LDAP
C. RADIUS Server
D. Active Directory
Answer: C

Q: 12 A customer is planning security for their WLAN. They want to use pre-shared keys for encryption. Which method will support a pre-shared key?
A. WPA
B. IPSec
C. 802.1x
D. MAC Filters
Answer: A

Q: 13 WLAN IP telephony handsets can access the WLAN through different forms of authentication/encryption. The authentication/encryption used depends of the security requirements of the network. Which two are possible methods of authentication and/or encryption for IP telephony handsets? (Choose two.)
A. WPA with PSK
B. X-509 certificates
C. WPAII with 802.1x
D. MAC authentication
Answer: A, D

Q: 14 A customer is planning a WLAN for a site that implements Wireless IP telephony. Planning for this requires the minimum radio signal strength be taken into account. What is the minimum radio signal strength required for IP telephony?
A. -50dbm
B. -60dbm
C. -70dbm
D. -80dbm
Answer: C

Q: 15 Wireless networks need to provide access to multiple devices using a shared medium. Since wireless networks use the air as the medium, data collisions cannot be detected. What is the method that WLAN uses to prevent collisions?
A. CPDQ
B. CSMA/CA
C. CSMA/CD
D. Backoff Timer
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved