Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-322 Exam - Cheat-Test.com

Free 920-322 Sample Questions:

1. Which statement best describes why a restricted Virtual Office (VO) login is applied to i2004 and i2050 TNs when end users log in using an i2002 Internet Telephone?
A. the i2002 Internet Telephone does not support Virtual Office login
B. the i2002 Internet Telephone does not recognize key sequences
C. the i2002 Internet Telephone does not support feature keys
D. the i2002 Internet Telephone supports only 4 feature keys
Answer: D

2. A company does not want the attendant answering calls that come into the PBX to DID DNs that have not been defined. They want the call to terminate on a Recorded Announcement trunk instead. The prompt in the Customer Data Block is CTVN. What is the proper configuration for this prompt?
A. OVF OVF OVF ATN
B. ATN ATN RAN ATN
C. ATN RAN OVF OVF
D. OVF OVF OVF RAN
Answer: D

3. What is the purpose of the Security Device and Software Keycodes in a Succession 1000M Rls. 3.0 system?
A. The Security Device protects the system from unauthorized access. The Software Keycode file contains a list of authorized users.
B. The Security Device protects the system from unauthorized access. The Software Keycode file contains information about what features the system provides as well as Incremental Software Management.
C. The Security Device performs security authentication; Matching the serial number of the system to the Software Keycode. The Software Keycode file contains a list of authorization codes and related Network Class of Service (NCOS) to control user-calling privileges.
D. The Security Device performs security authentication; Matching the serial number of the system to the Software Keycode. The Software Keycode file contains information about what features the system provides as well as Incremental Software Management.
Answer: D

4. A Succession 1000M Rls. 3.0 system is supporting serial-port access. The ports have been operating correctly over an extended period. Which action will the system software take if excessive interference is now detected on the TTY port?
A. It will issue a system message to check the port.
B. It will buffer the incoming data from the port for up to 30 minutes.
C. It will disable the port and will require intervention to re-enable the port.
D. It will lock the port temporarily and automatically re-enable the port after a short time.
Answer: D

5. Three users are communicating with a Succession 1000M Rls. 3.0 system using Multi-User Login to make database changes. How many more users can access the system concurrently to perform administrative tasks?
A. 1
B. 2
C. 3
D. 4
Answer: B

6. In a Succession 1000M Rls. 3.0 system, which item is defined in the Configuration Record (LD17)?
A. Digital Trunks
B. Listed Directory Numbers (LDN)
C. Input / Output Devices
D. Superloop Assignments
Answer: C

7. In a Succession 1000M Rls. 3.0 system, the Customer Data Block (LD 15) is used to define intercept treatment for various invalid or denied call scenarios. Which treatment option is NOT available to a customer?
A. Provide overflow (fast busy) tone
B. Intercept to the Attendant Console
C. Provide a Recorded Announcement (RAN)
D. Intercept to an announce only voicemail box
Answer: D

8. A Human Resources department wants to have the "HR help line" appear on everyone's telephone (eight users) in the department. They want any available employee to answer "HR help line" calls and want to be able to receive as many simultaneous calls as there are employees (eight) in the department. What would you recommend to the customer?
A. Setup an Automatic Call Distributor (ACD) queue in Load 32 and define the eight employees as agents of that ACD group.
B. Define a Uniform Call Distribution (UCD) list with the DN's of the eight employees in the Human Resources department.
C. Program a Multiple Appearance, Single Call Arrangement DN (SCR or SCN) as a secondary DN on the eight users' digital or Internet Telephones. It will allow as many calls to be in progress as there are appearances of the DN.
D. Program a Multiple Appearance, Multiple Call Arrangement DN (MCR or MCN) as a secondary DN on the eight users' digital or Internet Telephones. It will allow as many calls to be in progress as there are appearances of the DN.
Answer: D

9. A customer wants external calls at a particular station to forward to an administrative assistant under busy or no answer conditions, but wants internal calls receiving busy or no answer to forward to voicemail. What software feature in a Succession 1000M Rls. 3.0 system would you use to meet this request?
A. The Meridian Integrated Personal Call Director (MIPCD) would be required to route based on Caller ID.
B. The Call Forward by Call Type (CFCT) feature to route calls receiving a no answer or busy to separately defined dialing numbers (DNs) based on whether the call is internal or external.
C. The Call Forward by Call Type (CFCT) feature to only route calls receiving a no answer to separately defined dialing numbers (DNs) based on whether the call is internal or external. Busy calls will always follow the hunt DN.
D. The Call Forward by Call Type(CFCT) feature to only route calls receiving a busy condition to separately defined dialing numbers (DNs) based on whether the call is internal or external. No answer calls will always follow the forward no answer (FNA) DN.
Answer: B

10. The executives of a company want to forward all calls to the administrative assistant when they do NOT want to be disturbed. However, they do want the assistant to be able to transfer important calls back to them even though all calls are being forwarded. How can this request be accomplished?
A. The assistant can transfer the call back to the executive's telephone via a secondary Primary Dialing number (PDN) or a DN. It will follow the forward all calls path back to the assistant.
B. Use The Executive Barge-In feature to allow an assistant to transfer calls back to an executive's telephone, overriding the Call Forward All Calls (CFAC) feature by using the Barge-In key to complete the transfer.
C. Install a second telephone that is NOT forwarding calls with its own Telephone Number (TN) and Dialing Number (DN). It can be an analog 2500 telephone, Digital telephone or Internet Telephone. The assistant would then transfer important calls to this special non-published DN.
D. Use the Secretarial Filtering feature to allow all calls to be forwarded to a second telephone. The user at the second telephone can answer the forwarded call and can choose to transfer the call back to the (PDN) of the first telephone, overriding the CFAC feature.
Answer: D

11. A customer's traffic requires two Primary Rate Interfaces (PRIs) for local service with 40 trunks, and one PRI for direct long-distance access with 20 trunks. How many trunk groups and trunks should be provisioned?
A. Provision one trunk group in Load 16 and 60 trunks in Load 14.
B. Provision 60 trunk groups in Load 16, one for each active channel of the 3 PRIs (20 active channels per PRI).
C. Provision three trunk groups in Load 16, one for each T-1 with 20 trunks per route provisioned in Load 14, for a total of 60 trunks.
D. Provision two trunk groups in Load 16, one for local service with 40 trunks provisioned in Load 14, and one for long distance access with up to 20 trunks provisioned.
Answer: D

12. A company wants to control costs by allowing access to trunks only through Alternate Route Selection so that the most cost effective route is used for each call. Users will need to directly access paging trunks. What can be used to meet this request?
A. Class Of Service (COS) access restrictions to trunks
B. Access codes on Paging (PAG) routes to prevent access to other routes
C. Trunk Group Access Restrictions (TGAR) and Trunk Access Restriction Groups (TARG) on Trunk groups
D. The Trunk Barring on Central Office (CO) and Wide Area Telecommunications Service (WATS) trunks
Answer: C

13. On A Non Direct Inward Dial (DID) incoming trunk, which overlay (LD) should you use to route calls to an Automatic Call Distribution (ACD) DN 6000?
A. LD 16 AUTO ATDN (Auto Terminate DN) to 6000
B. LD 16 AUTO (Auto Terminate) YES and LD 14 ATDN (Auto Terminate DN) to 6000
C. LD 16 AUTO (Auto Terminate) YES and LD 15 ATDN (Auto Terminate DN) to 6000
D. LD 16 IDC (Incoming Digit Conversion) 27 and LD 49 IDTG (Incoming Digit Termination Group) to 6000
Answer: B

14. A customer has a Meridian Internet Enabled IP Trunk 3.01 and BCM 3.01 in the network. They use OTM 2.0 to administer and maintain the switch. They want to upgrade their Meridian 1 system to Succession 1000M Rls. 3.0 using the pre-upgrade migration method. As part of the pre-upgrade migration, there are certain procedures which migrates a network of IP Trunk 3.01 nodes and Business Communication Manager (BCM) 3.01 systems from the node-based Dialing Plan resolution to the Gatekeeper Network Numbering Plan resolution.
Some of these procedures are:
• Configuring the Network Numbering Plan for IP Trunk 3.01 and BCM 3.01 on the Gatekeeper
• Configuring IP Trunk Network to register with Gatekeeper and to use Gatekeeper Numbering Plan
What procedure must be done before the two procedures above?
A. Upgrade the firmware on the Voice Gateway Media Cards.
B. Configure and cutover an upgraded Succession 1000M Rls.3.0 system to use IP Peer Virtual Trunks.
C. Configure endpoints for IP Trunk 3.01and BCM 3.01 on the Gatekeeper.
D. Upgrade OTM 2.00 to OTM 2.10.
Answer: C

15. A customer has a Meridian Internet Enabled IP Trunk 3.01 and BCM 3.01 in the network. They are using OTM 2.0 to administer and maintain the switch. They want to upgrade a Meridian 1 system to Succession 1000M using the coordinated cutover method.
What is the first procedure that must be completed?
A. Upgrade the firmware on Voice Gateway Media Cards.
B. Configure and cutover an upgraded Succession 1000M Rls. 3.0 system to use IP Peer Virtual Trunks.
C. Configure H323-ID endpoints for IP Trunk 3.01and BCM 3.01 on the Gatekeeper.
D. Upgrade OTM 2.00 to OTM 2.10.
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved