최신 Nortel Other Certification 920-271 무료샘플문제:
1. A Nortel WLAN 2300 series network contains multiple WLAN Security Switches. One
WLAN Security Switch is configured as the primary mobility domain seed. Another WLAN
Security Switch is configured as the secondary mobility domain seed. If the primary mobility domain seed becomes unavailable, the secondary mobility domain seed is promoted to be the primary mobility domain seed.
When the original primary mobility domain seed becomes available again, what happens to the recently promoted secondary mobility domain seed?
A) The secondary mobility domain seed remains in the promoted stated until the network administrator intervenes.
B) The promoted secondary mobility domain seed remains as the permanent primary mobility domain seed.
C) The mobility domain seed with the lowest IP address becomes the primary mobility domain seed.
D) The secondary mobility domain seed is automatically demoted back to its original state.
2. What are two IPSec security protocols? (Choose two.)
A) Authentication Header (AH)
B) IP Header
C) Point-to-Point tunneling Protocol (PPTP)
D) Encapsulating Security Payload (ESP)
3. You have planned a WLAN network using the WLAN Management System (WMS). You have also calculated the coverage your antennas provide. What else should you do to ensure adequate coverage?
A) use WMS to calculate the available bandwidth for the network
B) measure the distance between access points to ensure adequate coverage
C) install an access point at the site and check your handset connection to it
D) conduct a site survey to determine actual radio wave strength at various locations at the site
4. A customer needs to use the Wireless Management System (WMS) to manage multiple
WLAN security switches. What is true about enabling the WMS service to monitor network data?
A) It is used to discover and add WMS clients that will monitor Wireless Security Systems
(WSS).
B) It is used to discover and add location engines to be monitored.
C) It is used to discover and add application servers to be monitored.
D) It is used to discover and add Wireless Security Systems (WSS) to be monitored.
5. Many services can be configured and used with the Wireless Security System (WSS) such as Telnet, SNMP and HTTPS. What else can be configured to work with the WSS?
A) SSH
B) SNTP
C) SSL
D) RADIUS
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: A,D | 질문 # 3 정답: D | 질문 # 4 정답: D | 질문 # 5 정답: A |