Issuu on Google+

     

Exam

: Nortel 920-807

Title

: Nortel Unified Communications Solutions

Version : R6.1

www.prepking.com   


Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.prepking.com   


1.A company that is implementing unified communications (UC) has a mobile workforce that utilizes mobile end point devices such as PDA devices.Which security method will be needed to secure UC dialogue between the PDA devices? A.Authentication B.Encryption C.One time passwords D.RFID tagging and tracking Answer: B

2.When making a decision to deploy a multi-vendor unified communications enabled solution using SIP, what should the enterprise IT support teams do in preparation for the project?A.Fully test the solution for interoperability. B.Ask management to consider a single vendor. C.Look for open source tools to manage the solution. D.Request that all vendors adhere to strict common standards. Answer: A

3.In the review and validation steps of a unified communications proof-of-concept scope of work document, which task should be completed first? A.Create upper management reporting templates. B.Measure key performance indicators (KPI) for reporting purposes. C.Create a monthly project assessment template to collect UC project data points. D.Calculate the financial return on investment (ROI) benchmarks. Answer: C

4.Which statement supports why a project team should conduct the requirements definition prior to the unified communications (UC) proof-of-concept project scope of work definition? A.It helps identify a short-list of vendor UC solutions that can be incorporated into the UC project. B.It slows down the UC proof-of-concept project from moving forward due to internal politics. C.It provides a detailed project plan defining project milestones and timelines. www.prepking.com   


D.It identifies the scope of the UC project for labor estimating and project planning. Answer: D

5.When determining whether to proceed with a unified communications proof-of-concept project, which steps are decision points for a Chief Financial Officer? (Choose two.) A.creating an acceptable UC project budget B.defining who should be on the UC project team C.obtaining an acceptable preliminary financial ROI returnD.developing a UC project plan that spans 6 to 9 months Answer: AC

6.A unified communications pilot project financial return on investment (ROI) model must have access to the organizations accurate sales, general, and administrative overhead expenses.Which decision criterion is critical for a Chief Financial Officer prior to signing-off on the preliminary financial ROI model? A.acceptance of key performance indicators with metrics B.determining the length of time that the UC proof-of-concept pilot project ROI must make C.identifying and validating all associated costs and that they are correctly entered into the ROI model D.planning on whether to use CAPEX or OPEX to pay for the UC proof-of-concept project Answer: C

7.A company has an existing traditional TDM PBX and wishes to implement a unified communications project. At the present time it is more feasible to add a second VoIP-enabled PBX into the existing configuration to complete the project rather than replace the existing system.To make this system work as designed, the company must purchase and configure which other piece of hardware for this solution? A.Router B.IP gatewayC.New telephone sets D.This solution is not possible Answer: B

8.In some cases IP gateways are required in a pure IP PBX environment.Where in the network would the IP www.prepking.com   


gateway be placed, if one were required? A.between the IP PBX and the carrier B.between the IP call server and its associated gateways C.between the IP PBX and any firewalls D.an IP gateway is not required in a pure IP PBX solution Answer: A

9.Which unified communications application, when implemented, can successfully solve the time value of money business challenge for bank and financial institutions attempting to provide customers with faster loan approvals? A.self-service websites enabled with IM chat B.real-time unified messaging with key loan personnel C.reservation-less audio conferencing D.real-time collaboration with key loan personnel Answer: D

10.When paired with a Communication Server 1000 PBX, the Microsoft Office Communicator client uses a feature called twinning or dual-forking. What is twinning? A.a type of conference call B.two telephones sharing a single extension number C.telephone set cloning D.two users sharing an extension number Answer: B

11.In an Office Communications Server (OCS) 2007 Enterprise Edition environment, which solution increases the availability of OCS 2007 services? A.deployment of a mediation server B.deployment of an archiving server C.deployment of edge servers www.prepking.com   


D.deployment of a load balancing technology with the OCS 2007 Answer: D

12.Given that several VoIP protocols have been used for communications between end-point devices, which protocol is versatile enough to act as the signaling protocol for mobile, fixed, and software-based end-point devices? A.MGCP B.SIP C.H.323 D.SGCP Answer: B

13.Installation of Office Communications Server (OCS) 2007 requires the extension of the active directory domain services schema so that creation and configuration of objects in the Active Directory can take place.Which two active directory objects are necessary for OCS 2007 to operate? (Choose two.) A.home telephone number B.session initiation protocol (SIP) URI C.telephone extension number D.fully qualified domain name Answer: BC

14.Dual mode devices are devices that can utilize the carriers mobile data network or a local corporate Wi-Fi hotspot. Which reason is the primary reason for using such a device in a corporate environment? A.to enhance security B.to ease access to data C.to simplify the use of applications D.to reduce carrier usage and per minute charges Answer: D

www.prepking.com   


15.Every mobile device that uses a wireless connection should employ point-to-point encryption between the endpoint mobile device and the enterprise network. Which two methods will support point-to-point encryption? (Choose two.) A.IPSec VPN B.the cellphone service provider C.native SIP D.using WPA and WPA2 security Answer: AD

16.A unified communications (UC) solution with endpoint devices has been deployed in a large enterprise, it utilizes SIP. The company needs to restrict access to the UC network by unauthorized endpoint devices.Which authentication solution can support this deployment requirement considering that the network supports a wide range of endpoint devices? A.WPA B.one time password C.end point registration D.MAC address filtering Answer: C

17.A company needs to deploy a VoIP infrastructure able to handle mobile end-users. Internal security policies state that mobile end-users must be located through a mobile device such as a PDA or smartphone. The tracking and monitoring of the mobile user must support location traceable services throughout the USA and eventually globally. Which technology should be used to track and identify mobile end-users through their end-point devices? A.GPS B.RFID C.IP mobility D.Asset tagging Answer: A

www.prepking.com   


18.When deploying a SIP registration device, what authentication method can be used between the endpoint device and the registration device? A.MP3 B.Certificate C.IP address D.MAC address Answer: B

19.A common vulnerability that has appeared with the widespread use of softphones is called Data Piggybacking.Where would the most likely source of this vulnerability be located? A.the users desktop computer B.a modified copy of the softphone software C.an attached hardware IP telephone D.the users email software Answer: B

20.Which VoIP protocol was introduced to specifically handle security aspects of the original H.323 protocol? A.H.450 B.H.225 C.H.235 D.SIP Answer: C

21.Session Initiation Protocol (SIP) uses clear text communications between endpoint devices.Which protocol was developed to encrypt all messages between each endpoint in a SIP application? A.Transport Layer Security (TLS) B.UNISIM by Nortel Networks C.Real Time Streaming Protocol (RTSM) D.Multi Protocol Layered Switching (MPLS) www.prepking.com   


Answer: A

22.When evaluating confidentiality-related security for a VoIP and unified communications deployment, a list of all services and user types should be compiled. Which user type should be treated differently because they are not typically connected to the enterprise network? A.support or operations user B.home office user C.mobile or traveling user D.sales and marketing user E.business office user Answer: C

23.A unified communications enabled company uses VoIP and instant messaging that employs the Session Initiation Protocol (SIP). SIP is somewhat lacking in security features but one way to protect the data is to use a form of encryption. Which type of encryption is typically used with SIP? A.VPN B.Third party applications C.Transport Layer SecurityD.Transport Layer Signaling Answer: C

24.A large companys infrastructure consists of a centralized data center with two branch offices. A threat is identified which may affect the companys current VoIP configuration. The equipment vendors website contains very limited information regarding the threat, but more information will be available soon. It does not appear that the threat is capable of being catastrophic in nature. Which action should be taken first? A.Notify end users of the threat. B.Wait for a patch to be released. C.Immediately isolate the affected systems. www.prepking.com   


D.Evaluate the threat before taking any action. Answer: D

25.When implementing a multiple vendor unified communications enablement project, it is a good practice to certify all fixed and mobile endpoint devices. Which three devices should be certified in this case? (Choose three.) A.laptop computers B.routers C.desktop computers D.ethernet switches E.smartphones Answer: ACE

26.When multi-vendor VoIP/unified communication solutions are implemented, which activity is the most important?A.frequent project meetings B.individual project plans for all vendors C.a certification program to monitor compatibility D.no special steps are needed for multi-vendor solutions Answer: C

27.In terms of a unified communications deployment using the Session Initiation Protocol (SIP) protocol, which item would hackers usually focus on, when attempting to gather employee information, redirect calls or steal media streams? A.Edge Router B.Firewall C.SIP Proxy D.IP-enabled PBX Answer: C

28.Which type of security is included in the basic Session Initiation Protocol (SIP) protocol? www.prepking.com   


100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/920-807.htm


Pass4sure 920-807 dumps