Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-271 Exam -

Free 920-271 Sample Questions:

1. A Nortel WLAN 2300 series network contains multiple WLAN Security Switches. One WLAN Security Switch is configured as the primary mobility domain seed. Another WLAN Security Switch is configured as the secondary mobility domain seed. If the primary mobility domain seed becomes unavailable, the secondary mobility domain seed is promoted to be the primary mobility domain seed.
When the original primary mobility domain seed becomes available again, what happens to the recently promoted secondary mobility domain seed?
A.The secondary mobility domain seed remains in the promoted stated until the network administrator intervenes.
B.The secondary mobility domain seed is automatically demoted back to its original state.
C.The promoted secondary mobility domain seed remains as the permanent primary mobility domain seed.
D.The mobility domain seed with the lowest IP address becomes the primary mobility domain seed.
Answer: B

2. The WLAN 2300 Management System allows a graphical view of site installations. It can also be used to monitor real time events in the Wireless LAN.
Which statement about the features of the WLAN 2300 Management System is true?
A.It only runs on Linux.
B.It runs on WLAN Security Switch.
C.It offers web-based management.
D.It offers pre-deployment planning and configuration.
Answer: D

3. A signal with a strength of 200 mW leaves an access point and travels through a cable with a loss of -3 dB.
Using the rule of 3s and 10s, calculate the power of the signal when it reaches the antenna.
A.197 mW
B.100 mW
C.197 dB
D.50 dB
Answer: B

4. An access point generates a 4 W signal; it is equipped with a cable that has a loss of 3 dB and an antenna with a gain of 10 dB.
What is the power radiated to the air?
A.40 W
B.2 W
C.20 W
D.10 W
Answer: C

5. A customer wants to calculate the actual throughput for a WLAN site. The 802. 11b data rate is 11Mbps. Because of the use of back-off timers and ACKs, the throughput is reduced.
Which data rate is closest to the actual throughput of this site?
A.5.5 Mbps
B.4.5 Mbps
C.7.5 Mbps
D.8.5 Mbps
Answer: A

6. What is one way of increasing an RF signal amplitude?
A.use a Wireless Security Server (WSS) to increase the RF signal
B.use a high gain antenna to focus the RF signa
C.use a device to cause diffraction of the RF signal
D.use a bridge to connect equipment
Answer: B

7. You have planned a WLAN network using the WLAN Management System (WMS). You have also
calculated the coverage your antennas provide.
What else should you do to ensure adequate coverage?
A.use WMS to calculate the available bandwidth for the network
B.install an access point at the site and check your handset connection to it
C.measure the distance between access points to ensure adequate coverage
D.conduct a site survey to determine actual radio wave strength at various locations at the site
Answer: D

8. Wireless networks need to provide access to multiple devices using a shared medium. Since wireless networks use the air as the medium, data collisions cannot be detected.
Which method is used in a WLAN network to prevent collisions?
Answer: B

9. A 128-bit Wired Equivalent Privacy (WEP) is a shared key authentication system that means the client machine and Access Point share the same key.
Which vulnerability is inherent with this type of security scheme?
A.The open architecture of the WEP security scheme leaves it vulnerable to hackers.
B.Any WEP enabled device transmitting OTA unencrypted makes the WLAN vulnerable.
C.A static WEP key can be compromised if a hacker can gather enough transmitted packet information.
D.The WEP security model is open to impersonation type hacking, by replication of MAC addresses,
usernames, and passwords.
Answer: C

10. You are preparing to deploy a WLAN, which action leaves a LAN most vulnerable to security risks?
A.attaching the WLAN directly to the LAN
B.using WPA as an authentication method
C.creating a DMZ on a subnet and connecting the WLAN to it
D.connecting a WLAN 2300 security switch directly to a DMZ
Answer: A

11. A VPN using IPSec has been chosen as a security measure in a customers WLAN deployment.
What additional security measures should you take for this deployment?
A.allow SSID broadcasts in the network
B.disable the encapsulating security payload (ESP) protocol on the network
C.require the client to authenticate using the WLAN firewall or security switch to start an IPSec session
D.ensure a secure IPSec connection, applying a different set of rules to the server so the client does not know the server settings
Answer: C

12. The WLAN 2300 series solution provides a number of security features, including the use of Temporal Key Integrity Protocol. TKIP fixes holes in the WEP security model.
Which property is an advantage when using TKIP over WEP?
A.MAC based filtering
B.Uses 5/9s algorithm
C.TKIP uses a 24bit IV
D.Message Integrity Check
Answer: D

13. WLAN 2300 release 7.0 introduces Dynamic RADIUS.
What does this feature do?
A.It allows a RADIUS server to automatically detect and locate new devices.
B.It allows all RADIUS servers to dynamically locate the Wireless Security Servers (WSS) in the network.
C.It allows the WLAN Management Software (WMS) to automatically discover RADIUS servers in the network.
D.It allows administrators supporting a RADIUS server to disconnect a user and change the authorization attributes of an existing user session.
Answer: D

14. A customer is setting up the WLAN 2300 series to provide security. They have an existing PKI
environment in place and would like to leverage the existing environment.
Which two supported authentication/encryption methods meet this requirement? (Choose two.)
Answer: AB

15. What are two IPSec security protocols? (Choose two.)
A.IP Header
B.Authentication Header (AH)
C.Encapsulating Security Payload (ESP)
D.Point-to-Point tunneling Protocol (PPTP)
Answer: BC

© 2014, All Rights Reserved