Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-806 Exam - Cheat-Test.com

Free 920-806 Sample Questions:

1.A customer would like to limit access to the research and development network to engineers and their managers. These employees need the ability to login throughout the building on any PC and to access the network remotely.Which solution will accomplish this?
A.machine-based authentication using RADIUS authentication
B.PC-based authentication using LDAP authentication
C.Extensible Authentication Protocol over LAN (EAPoL) with TACACS+
D.policy-based user provisioning with Enterprise Policy Manager and RADIUS
Answer:D

2.Click on the Exhibit button.

A customer is using PPP to communicate between two locations that are connected by a dial-up circuit. They are having problems with the link and think that it is an issue with the CHAP authentication. They have the ability to perform a packet capture on the circuit. They will create a filter looking at the protocol field in the PPP header to reduce the volume of traffic they need to examine.
Which PPP protocol should they examine to see the CHAP authentication traffic during link setup?
A.Network Layer
B.Link Control Protocol (LCP)
C.Network Control Protocol (NCP)
D.Datalink Control Protocol (DCP)
Answer:B

3.Line-of-sight is one of the boundaries of Radio Frequency (RF) waves. They are also affected by
obstacles that can cause the waves to bend, bounce, or become distorted.Which type of electromagnetic wave is a radio wave?
A.direct wave
B.ground wave
C.space wave
D.fluid wave
Answer:A

4.Click on the Exhibit button.

Using the exhibit, what do you call the measure of the amount of time the wave takes from the moment it hits peak intensity to the moment it hits peak intensity again?
A.cycle
B.amplitude
C.frequency
D.wavelength
Answer:D

5.A large retail store has decided to use a wireless network to attach cash registers and computers to the network, so that they can rearrange the floor layout without having to pull network cable every time they rearrange displays. The issue is that when they first tried to implement IEEE 802.11b last year, there was too much interference from other WLANs and cordless telephones, and the computers received very poor signal strength.Which change would most help fix this problem?
A.Use 802.11g to increase the number of channels available.
B.Use 802.11a on the 5GHz range with more channels.
C.Use 802.11b on a non-standard channel to keep from conflicting with the other WLANs.
D.Use 802.11b on the alternate 5GHz range with more channels.
Answer:B

6.A small cafe has decided that it would like to provide a free wireless hotspot to attract new customers.
When they first installed the wireless access point (AP), they discovered that the signal strength was very poor. They think this may be related to another nearby hotspot. The AP that was installed supports 802.11g and 802.11b.
What should they do to improve the signal strength?
A.Install a new 802.11a AP.
B.Change their AP to 802.11g only.
C.Change their AP to 802.11b only.
D.Change the channel on the AP to remove the hotspot overlap.
Answer:D

7.A customer would like to increase the bandwidth between two locations connected over the WAN. They would like to have multiple paths that use a single entry in the route table if possible.Which solution allows for this?
A.multiline circuit
B.multilink trunking
C.Virtual Link Aggregation Control Protocol (VLACP)
D.Virtual Router Redundancy Protocol (VRRP)
Answer:A

8.Company A has purchased Ethernet switches that allow the administrator to configure how the switches queue traffic on the egress ports. The administrator created two queues with strict queuing. All voice and video traffic went into the high queue, while the rest of the traffic went into the low queue. Customers began to report that email and transaction processing applications were slow and would seem to hang from time to time.What is a possible explanation for this?
A.Strict queuing dictates that no traffic can be buffered, so the data traffic is being dropped, while the voice and video traffic is being processed.
B.Strict queuing dictates that the higher queues are always emptied before lower queues are processed. The lower queue will buffer the traffic until it is able to send it.
C.Strict queuing assigns each queue a weight, and the scheduler is responsible for servicing each queue based upon the importance of the queue.
D.Strict queuing assigns each packet to a queue, based upon the number of packets in each queue.
Answer:B

9.Click on the Exhibit button.

Use the following information:
end users are attached to each of the Layer 2 switches
end users are attached to the Layer 3 edge switches
end users are attached to the wireless access point
the secure router is not capable of remarking the DiffServ codepoint
the Wireless access point is not capable of remarking the DiffServ codepoint
Which ports in the exhibit are DiffServ access ports?
A.all access ports on the Layer 2 and Layer 3 edge switches
B.all access ports on the Layer 2 switches, Layer 3 edge, and core routing switch ports connected to the wireless access point and secure router
C.all ports on the Layer 2, Layer 3 edge, and core routing switches
D.all access ports on the layer 2 switches, layer 3 core routing switch port connecting to the wireless access point
Answer:B

10.Click on the Exhibit button.

Use the following information:
end users are attached to each of the Layer 2 switches
end users are attached to the Layer 3 edge switches
end users are attached to the wireless access point the secure router is not capable of remarking the DiffServ codepoint
the wireless access point is not capable of remarking the DiffServ codepoint
Which ports in the exhibit are DiffServ core ports?
A.all ports on core routing switchesB.all tagged ports on the Layer 2 and Layer 3 edge switches and all ports on the core routing switches
C.all tagged ports on the Layer 2 and Layer 3 edge switches and all ports on the core routing switches, except the ports connected to the wireless access point
D.all tagged ports on the Layer 2 and Layer 3 edge switches and all ports on the core routing switches, except the ports connected to the wireless access point and secure router
Answer:D

11.Many Layer 2 switches use the 802.1p Class of Service to determine which egress queue in which to place traffic.
Which 802.1p value indicates that the packet be placed in the highest priority queue?
A.000
B.000000
C.111
D.111111
Answer:C

12.A customer is connecting to an MPLS network that uses MPLS-LDP to exchange labels. They would like to maintain the priority information that is in the IP header of the packet.
Which feature of MPLS allows the customer to use the DSCP information in the IP header?
A.MPLS routers can be configured to read the DSCP information in the IP header.
B.MPLS routers automatically read the DSCP information in the IP header if RSVP is used.
C.MPLS routers can map the DSCP information to the three bit EXP field.
D.MPLS routers can copy the DSCP information to the six bit EXP field.
Answer:C

13.A hacker has targeted your website for the purpose of denying people access. To make their attack effective they have placed software that will attack your website on multiple machines.
What is this type of attack called?
A.man-in-the-middle attacks
B.multiple denial of service attacks
C.distributed denial of service attack
D.packet capture attacks
Answer:C

14.A new corporate policy states that packet capture software or hardware cannot be used on the network. The Information Technology (IT) department has requested that they be excluded from this policy. Which justification best explains why IT needs packet capture software?
A.to troubleshoot device "reachability" issues
B.to troubleshoot communication issues using the software combined with port mirroring
C.to capture user name and password information on the same collision domain
D.to bill departments for network use
Answer:B

15.Click on the Exhibit button.

Workstation 1 wants to send traffic through the router to the Internet. The host on 172.16.1.220 has been compromised by a hacker. The malicious host sends a Gratuitous ARP to Workstation 1 reporting 172.16.1.1 is at 0A:0B:0C:06:05:04 and to Router A reporting 182.16.1.200 is at 0A:0B:0C:06:05:04.Which technique and which type of attack did the hacker use?
A.ARP spoofing, man-in-the-middle
B.ARP spoofing, denial-of-service
C.DHCP spoofing, man-in-the-middle
D.DHCP spoofing, denial-of-service
Answer:A


© 2014 Cheat-Test.com, All Rights Reserved