Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Nortel 920-807 Exam -

Free 920-807 Sample Questions:

1.A company that is implementing unified communications (UC) has a mobile workforce that utilizes mobile end point devices such as PDA devices.Which security method will be needed to secure UC dialogue between the PDA devices?
C.One time passwords
D.RFID tagging and tracking
Answer: B

2.When making a decision to deploy a multi-vendor unified communications enabled solution using SIP, what should the enterprise IT support teams do in preparation for the project?
A.Fully test the solution for interoperability.
B.Ask management to consider a single vendor.
C.Look for open source tools to manage the solution.
D.Request that all vendors adhere to strict common standards.
Answer: A

3.In the review and validation steps of a unified communications proof-of-concept scope of work document, which task should be completed first?
A.Create upper management reporting templates.
B.Measure key performance indicators (KPI) for reporting purposes.
C.Create a monthly project assessment template to collect UC project data points.
D.Calculate the financial return on investment (ROI) benchmarks.
Answer: C

4.Which statement supports why a project team should conduct the requirements definition prior to the unified communications (UC) proof-of-concept project scope of work definition?
A.It helps identify a short-list of vendor UC solutions that can be incorporated into the UC project.
B.It slows down the UC proof-of-concept project from moving forward due to internal politics.
C.It provides a detailed project plan defining project milestones and timelines.
D.It identifies the scope of the UC project for labor estimating and project planning.
Answer: D

5.When determining whether to proceed with a unified communications proof-of-concept project, which steps are decision points for a Chief Financial Officer? (Choose two.)
A.creating an acceptable UC project budget
B.defining who should be on the UC project team
C.obtaining an acceptable preliminary financial ROI return
D.developing a UC project plan that spans 6 to 9 months
Answer: AC

6.A unified communications pilot project financial return on investment (ROI) model must have access to the organizations accurate sales, general, and administrative overhead expenses.Which decision criterion is critical for a Chief Financial Officer prior to signing-off on the preliminary financial ROI model?
A.acceptance of key performance indicators with metrics
B.determining the length of time that the UC proof-of-concept pilot project ROI must make
C.identifying and validating all associated costs and that they are correctly entered into the ROI model
D.planning on whether to use CAPEX or OPEX to pay for the UC proof-of-concept project
Answer: C

7.A company has an existing traditional TDM PBX and wishes to implement a unified communications project. At the present time it is more feasible to add a second VoIP-enabled PBX into the existing configuration to complete the project rather than replace the existing system.To make this system work as designed, the company must purchase and configure which other piece of hardware for this solution?
B.IP gateway
C.New telephone sets
D.This solution is not possible
Answer: B

8.In some cases IP gateways are required in a pure IP PBX environment.Where in the network would the IP gateway be placed, if one were required?
A.between the IP PBX and the carrier
B.between the IP call server and its associated gateways
C.between the IP PBX and any firewalls IP gateway is not required in a pure IP PBX solution
Answer: A

9.Which unified communications application, when implemented, can successfully solve the time value of money business challenge for bank and financial institutions attempting to provide customers with faster loan approvals?
A.self-service websites enabled with IM chat
B.real-time unified messaging with key loan personnel
C.reservation-less audio conferencing
D.real-time collaboration with key loan personnel
Answer: D

10.When paired with a Communication Server 1000 PBX, the Microsoft Office Communicator client uses a feature called twinning or dual-forking.
What is twinning?
A.a type of conference call
B.two telephones sharing a single extension number
C.telephone set cloning
D.two users sharing an extension number
Answer: B

11.In an Office Communications Server (OCS) 2007 Enterprise Edition environment, which solution increases the availability of OCS 2007 services?
A.deployment of a mediation server
B.deployment of an archiving server
C.deployment of edge servers
D.deployment of a load balancing technology with the OCS 2007
Answer: D

12.Given that several VoIP protocols have been used for communications between end-point devices, which protocol is versatile enough to act as the signaling protocol for mobile, fixed, and software-based end-point devices?
Answer: B

13.Installation of Office Communications Server (OCS) 2007 requires the extension of the active directory domain services schema so that creation and configuration of objects in the Active Directory can take place.Which two active directory objects are necessary for OCS 2007 to operate? (Choose two.)
A.home telephone number
B.session initiation protocol (SIP) URI
C.telephone extension number
D.fully qualified domain name
Answer: BC

14.Dual mode devices are devices that can utilize the carriers mobile data network or a local corporate Wi-Fi hotspot.
Which reason is the primary reason for using such a device in a corporate environment? enhance security ease access to data simplify the use of applications reduce carrier usage and per minute charges
Answer: D

15.Every mobile device that uses a wireless connection should employ point-to-point encryption between the endpoint mobile device and the enterprise network.
Which two methods will support point-to-point encryption? (Choose two.)
B.the cellphone service provider
C.native SIP
D.using WPA and WPA2 security
Answer: AD

© 2014, All Rights Reserved