Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-249 Exam -

Free 920-249 Sample Questions:

1. Which three commands would be useful when troubleshooting an issue with WCR? (Choose three.)
A. /cfg/slb/cur
B. /stats/slb/cur
C. /info/slb/dump
D. /info/l3/vrrp/dump
E. /info/slb/sess/dump
Answer: ACE

2. Each switch filter can be set to only one of four possible choices: allow, deny, and redirect are three of them. Which is the fourth choice?
A. cloak traffic
B. stack traffic
C. disable traffic
D. translate traffic
Answer: D

3. What happens to a WCR filter when all real servers in the associated group fail?
A. The filter becomes a deny filter.
B. The filter becomes an allow filter.
C. The filter is ignored and traffic will be dealt with by the next matching filter.
D. The backup action specified in the advanced filter menu will be used instead of redirection.
Answer: B

4. What does Virtual Matrix Architecture (VMA) do?
A. VMA allows filtering to be configured on all physical ports.
B. VMA allows the switch to process TCP traffic from telnet sessions.
C. VMA takes individual resources from any back-up switch and utilizes them for load balancing.
D. VMA makes use of any unused resources within a switch by distributing the workload to multiple processors.
Answer: D

5. Which two requirements are necessary for an application switch? (Choose two.)
A. edge routing
B. no clustering
C. session-based traffic management
D. single point of control for traffic to web components
Answer: CD

6.Which is the minimum platform requirement for a system with 14 simultaneous fast Ethernet connections and a single fiber connection?
A. 2208
B. 2216
C. 2424SSL
D. 3408
Answer: B

7. Which two are valid characteristics of content identifiers, such as URLs. (Choose two.)
A. They can be of varying lengths.
B. They have to be of constant lengths.
C. They can be terminated by VLAN tagging.
D. They can appear at unpredictable locations within a request.
Answer: AD

8. Why is delayed binding necessary when doing URL or content-based switching?
A. Layer 7 information is not sent in the first packet.
B. It prevents DOS attacks against web services.
C. It creates the correct source IP for traffic returning from the realserver.
D. It creates the correct destination IP for traffic returning from the realserver.
Answer: A

9. By default, how are non-GET requests handled in URL based WCR?
A. dropped
B. sent to a cache
C. forwarded to the origin server
D. load balanced across the cache server group
Answer: C

10. For Layer 7 load balancing, where must the sub-string match "/profit" be located in the URL?
A. inside the first 32 bits
B. inside the first 64 bytes
C. immediately following the FQDN
D. slash not specified in a sub-string match
Answer: C

11. While performing URL-based load balancing, why might you see a session with a real IP of
A. The client is refreshing a page.
B. The switch has been incorrectly configured.
C. All real servers related to that VIP are down.
D. The switch has not received sufficient information to make a load balancing decision.
Answer: D

12. Which two settings must be enabled before configuring the Application Switch for Real Time Streaming Protocol (RTSP)? (Choose two.)
A. proxy IP addressing
B. Direct Access Mode (DAM)
C. Virtual Matrix Architecture (VMA)
D. port-based bandwidth management
Answer: BC

13. Which two components use Real Time Streaming Protocol (RTSP) as the delivery media? (Choose two.)
B. Real Server
C. Microsoft Media
D. QuickTime Server
Answer: BD

14. Which two components are required to configure port mirroring? (Choose two.)
A. a sniffer
B. a mirror port
C. a monitor port
D. a separate license
Answer: BC

15. Which metric is supported in Intrusion Detection System load balancing?
A. hash
B. roundrobin
C. leastconns
D. response time
Answer: A

© 2014, All Rights Reserved