Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-270 Exam -

Free 920-270 Sample Questions:

1. A Voice over WLAN customer is determining the type of WLAN handsets to provide to their users. The customer's environment is industrial and noisy, so maximum durability and loud-environment ringer and speaker is required. Many users will also need push-to-talk (PTT) capability.
Which WLAN handset should the customer select to provide the desired functionality to the users?
Answer: D

2. A customer wants to provide network connectivity to a new building on its campus, but does not want to run cables between buildings. You determine that this can be accomplished using mesh services on the WLAN 2300 series network.
Which Access Point model can support this configuration?
Answer: C

3. A large business operation has an existing wired network with subnets in the business office and showroom. They wish to extend wireless access to the warehouse. The customer does not have wireless access anywhere else in its network. There are a number of mobile users who move to and from the business office, showroom, and warehouse with customers.
Which WLAN mode of operation is best suited to these mobile users?
A.Ad Hoc Wireless LAN
B.Infrastructure Wireless LAN
C.Ad Hoc Wireless LAN for roaming
D.Infrastructure Wireless LAN for roaming
Answer: B

4. A site survey for a Wireless LAN site has been completed. Given the configuration and building materials within the facility, it is expected that a high number of access points (AP) in close proximity will be required to ensure adequate coverage. The design team is concerned with channel overlap due to the number of AP required and has determined that 802.11a will be used.
Which rationale supports this choice?
A.802.11a has more non-overlapping channels than 802.11b.
B.802.11a uses non-overlapping channels while 802.11b does not.
C.802.11a covers more distance than 802.11b and requires fewer APs.
D.802.11a is better able to penetrate dense building materials than 802.11b.
Answer: A

5. A customer is deploying wireless 6120/6140 handsets throughout their Wireless LAN. They are using a DHCP server to configure the 6120/6140 systems. By using a DHCP they are currently assigning an IP address, and DHCP options 1, 3, 60, and 66.
In this scenario, which DHCP option is also required?
Answer: D

6. A new WLAN customer wants secure their wireless network.
Which method would you least recommend because of its weaknesses?
D.128-bit WEP
Answer: D

7. A customer with a new WLAN 2300 series has some basic WLAN Security needs. They want to provide WLAN to visitors for Internet access without security.
Which basic type of security will accomplish this?
A.MAC filters
B.bandwidth limitation access area
D.DMZ connection only
Answer: D

8. A customer wants to install a WLAN. They are concerned about security and want to know about
device-independent authentication.
Which two methods would be considered a device-independent type of authentication? (Choose two.) card
B.MAC filtering directory
D.biometric device
Answer: AD

9. You want to implement RADIUS in a WLAN network.
Which network component cannot be used as a Network Access Server (NAS) in the WLAN?
A.Access Point
B.Security Server
C.Client PC
D.Location Server
Answer: C

10. A WLAN 2300 series customer wants to use robust WLAN security that is server-based. The authentication method needs to be functional and compatible with dial-up and provide database lookup.
Which security method will provide this?
Answer: C

11. The WLAN 2300 series has some basic WLAN Security. There are two types of basic security offering authentication and encryption security methods.
What is a type of basic security?
C.MAC Filters
D.VPN with IPSec
Answer: C

12. The WLAN 2300 series offers robust WLAN Security. One version of this robust security is called Temporal Key Integrity Protocol (TKIP).
Which statement about the strengths of TKIP is true?
A.TKIP is only available in WEP.
B.The MAC address is basic.
C.TKIP uses 48 bit encryption key.
D.TKIP calculates a different key for every frame.
Answer: D

13. The WLAN 2300 series uses various robust security methods such as the Wi-Fi Protected Access (WPA) security method.
Which statement about WPA is true?
A.User verification is required.
B.It uses 802.1x and EAP for user authentication.
C.User authentication occurs after data encryption.
D.Data encryption occurs after user authentication.
Answer: B

14. A customer with a WLAN 2300 series would like to implement robust WLAN Security using something similar to WEP. Temporal Key Integrity Protocol (TKIP) corrects the holes in WEP.
What is an enhancement in TKIP?
A.AES enhancement
B.128-bit initialization vector
C.Uses key mixing
D.Extensible Authentication Protocol (EAP)
Answer: C

15. A customer's robust security plan includes some version of Extensible Authentication Protocol (EAP). Their network is comprised of Windows XP systems.
Which EAP version is best suited for this application?
Answer: A

© 2014, All Rights Reserved