Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-261 Exam -

Free 920-261 Sample Questions:

1. In order to create a BWM (Bandwidth Management) policy you must assign a policy number, specify limits (reservation limit, soft limit, hard limit), and which of the following?
A. Specify a buffer limit.
B. Associate a new IP address with the necessary VLAN.
C. Map IP addresses in a sufficient range.
D. Create a table entry.
Answer: A

2. What is an advantage of a bandwidth management policy?
A. It creates a health check on the available bandwidth.
B. It creates a set of rules that determines the limits and packet precedence.
C. It collects rules that assign the traffic specified to a certain port.
D. It assigns the total amount of bandwidth that gets through the switch.
Answer: B

3. To manage bandwidth, a bandwidth management contract is created. Which two parameters must the contract include? (Choose two.)
A. blocking guidelines for unexpected or unwanted users
B. a classification policy where frames are grouped together
C. a key that allows for emergency expansion of bandwidth limits
D. a policy that specifies a set of bandwidth usage limitations to apply to the frames
Answer: BD

4. Which three settings help you to determine whether or not you can apply a specific contract to the Nortel Application Switch? (Choose three.)
A. Bandwidth management is enabled.
B. Healthchecks are monitoring traffic flow.
C. A relevant classification is associated with that switch.
D. The Application Switch is acting as a "core" Layer 2 device.
E. The sum of all your CIRs does not exceed the bandwidth available.
Answer: ACE

5. What does a Virtual Server Router (VSR) provide redundancy for?
Answer: B

6. Which two parameters must be configured the same on all switches for a given VIR?
A. VRID and Priority for the VIR
B. Priority and Interface IP address for the VIR
C. IP address and VRID for the VIR
D. VRID and Interface IP address for the VIR subnet
Answer: C

7. Which is true when sharing is enabled for a Virtual Server Routers (VSR)?
A. Client/server processing takes place on both switches.
B. Server processing operates in round-robin mode between the switches.
C. All client/server processing is forced to the master switch.
D. Sessions are synchronized between both switches.
Answer: A

8. Which of the following is a valid VRRP tracking parameter?
A. Ports
Answer: A

9. In which circumstance will a backup switch become the primary switch?
A. when it ceases to receive advertisements from the primary switch
B. after a successful bid to become the primary switch
C. when forced via the /oper/vrrp/master command
D. after receiving an advertisement with a lower preemption than its own
Answer: A

10. After a Virtual Server Routers (VSR) has been created, which action can only be done by the master?
A. host a telnet session
B. respond to ARP requests
C. keep track of available real servers
D. process packets destined for the VIP
Answer: B

11. In standard FWLB, each switch checks the health of the interfaces of the opposing switch. Which statement is true?
A. Each switch automatically selects and adds the required static routes.
B. Filters must be specified to allow for periodic access beyond the local firewall.
C. The firewall must occasionally be shut down to allow contact with other interfaces.
D. Static routes must be added to direct health checks through the proper firewall and to the other side.
Answer: D

12. Standard server load balancing uses the source IP address, WCR uses the destination IP address.
What does the FWLB use to determine distribution and ensure consistency?
A. source IP address only
B. source port number only
C. source and destination IP address
D. source and destination port number
Answer: C

13. What happens to a FWLB redir filter if all real servers for the group fail their healthchecks?
A. The filter becomes a deny filter.
B. The filter becomes an allow filter.
C. The filter is ignored and traffic is dealt with by the next matching filter.
D. The backup action specified in the advanced filter menu is used, instead of redirection.
Answer: A

14. Which statement is true when a session is created by a packet entering an RTS enabled port?
A. The session has a default age of 6 minutes.
B. The session has a default age of 8 minutes.
C. The RTS sessions statistic increments by one.
D. The destination IP of the packet is the source IP of the session.
Answer: D

15. An advantage of delayed binding is the ability to support Cookie-based persistence, to support SSL session ID persistence, and which of the following?
A. to support VRRP persistence
B. to support L7 load balancing
C. to support load balancing overhead
D. to support Layer-2 bridging
Answer: B

© 2014, All Rights Reserved