Page 1

920-806 Nortel Advanced Data Networking Technology


Question: 1 An employee wants to set up a wireless network at home, so that the employee can work from anywhere in the house. They know that using the default security settings on the WLAN would leave their network open to attack. They would like to avoid eavesdropping passive network attacks. Which security procedure best provides authentication, encryption, and authorization? A. Enable 128-bit Wired Equivalent Privacy (WEP). B. Enable Temporal key integrity protocol (TKIP). C. Disable broadcast of the Service Set Identifier (SSID). D. Limit logins to a single MAC address.

Answer: B Question: 2 A customer is requesting help with deciding what authentication protocol they should use with their Extensible Authentication Protocol over LAN (EAPoL) configuration. Their environment contains the following: switches that support EAP-MD5, EAP-TLS, and PEAP-MSCHAPv2 corporate workstations that run Microsoft Windows 2000 corporate servers that run Microsoft Windows 2003 The solution should have the following characteristics: user credentials should be username and password machine credentials should be hostname and password authenticator credentials should be digital certificates a single sign-on solution machine authentication should occur transparently using a random password assigned to the computer in the domain user authentication should occur transparently using the user credentials when the user logs into the computeruser authentication should occur transparently using the userWhich Extensible Authentication Protocol (EAP) authentication protocol should they select? A. EAP-MD5 B. EAP-TLS C. PEAP-MSCHAPv2 D. no supported authentication protocol supports all the requirements

Answer: C


Question: 3 Click on the Exhibit button.

Workstation 1 wants to send traffic through the router to the Internet. The host on has been compromised by a hacker. The malicious host sends a Gratuitous ARP to Workstation 1 reporting is at 0A:0B:0C:06:05:04 and to Router A reporting is at 0A:0B:0C:06:05:04. Which technique and which type of attack did the hacker use? A. ARP spoofing, man-in-the-middle B. ARP spoofing, denial-of-service C. DHCP spoofing, man-in-the-middle D. DHCP spoofing, denial-of-service

Answer: A Question: 4 A hacker would like to capture traffic that belongs to other users in the same VLAN on the same switch. To do this they would like to make the switch flood all of the packets on the VLAN. Which technique would the hacker use? A. ARP spoofing B. DHCP spoofing C. MAC overflow D. ICMP echo


Answer: C Question: 5 A customer is trying to decide what type of VPN to implement. They are trying to decide between an IPSec VPN and a Secure Socket Layer (SSL) VPN. They need to support remote access and branch office VPNs. Which option should they choose and why? A. SSL VPN, because it does not require client software installation. B. SSL VPN, because it supports the use of a web browser to establish the VPN. C. IPSec VPN, because it supports branch office and remote access users. D. IPSec VPN, because it is supported by all router and firewall implementations.

Answer: C Question: 6 A new corporate policy states that packet capture software or hardware cannot be used on the network. The Information Technology (IT) department has requested that they be excluded from this policy. Which justification best explains why IT needs packet capture software? A. to troubleshoot device "reachability" issues B. to troubleshoot communication issues using the software combined with port mirroring C. to capture user name and password information on the same collision domain D. to bill departments for network use

Answer: B Question: 7 A hacker has targeted your website for the purpose of denying people access. To make their attack effective they have placed software that will attack your website on multiple machines. What is this type of attack called? A. man-in-the-middle attacks B. multiple denial of service attacks C. distributed denial of service attack D. packet capture attacks

Answer: C


Question: 8 A customer is concerned about implementing Internet Group Management Protocol (IGMP) v2 on their network. They wonder what would happen if a multicast application on their PC either died or was shut down before sending the leave group message. What should you tell the customer to reassure them? A. The PC will issue a leave message automatically when it receives multicast traffic for a group to which it is not subscribed. B. The switch will send the multicast stream to the port attached to the PC until the multicast stream ends or the port is inactive. C. The PC will be removed from the IGMP group when it fails to respond to a specified number of membership queries. D. The PC will be removed from the IGMP group when it fails to respond to host membership reports.

Answer: C Question: 9 Click on the Exhibit button.


In the exhibit, Workstation 1 joined the multicast group with the multicast server. All four workstations are in the same VLAN and now receive the multicast stream. What should be implemented on the switch to limit the multicast stream to only the workstations that have joined the workstation group? A. IGMP proxy B. IGMP snooping C. DVMRP D. PIM-SM

Answer: B Question: 10 A customer would like to specify the source IP addresses for multicast feeds that will be accepted on the host systems. They would also like the ability to specify that hosts not receive data from particular source IP addresses. Which protocol allows the host to filter multicast traffic, based upon source IP address? A. Internet Group Management Protocol (IGMP) v2 B. Protocol Independent Multicast - Sparse Mode (PIM-SM) C. Internet Group Management Protocol (IGMP) v3 D. Distance Vector Multicast Routing Protocol (DVMRP)

Answer: C


You will not find better practice material than testsexpert PDf questions with answers on the web because it provides real exams preparation environment. Our practice tests and PDF question, answers are developed by industry leading experts according to the real exam scenario. At the moment we provides only question with detailed answers at affordable cost. You will not find comparative material elsewhere on the web at this price. We offer Cisco, Microsoft, HP, IBM, Adobe, Comptia, Oracle exams training material and many more.

We also provide PDF Training Material for: Cisco CCNA CCNP CCIP CCIE CCVP CCSP CXFF CCENT CCDE



IBM Adobe Comptia Oracle Lotus CS4 A+ 11g DBA WebSphere CS3 Security+ 10g DBA Mastery ACE Server+ OSA 10g SOA CS5 Network+ OCA 9i Storage CS2 Linux+ 11i Rational Captivate iNet+ 9i Forms Tivoli Flex Project+ Weblogic IBM DB2 CSM RFID+ Oracle 8i IBM XML MX7 HTI+ PTADCE

We provide latest exams preparation material only. Contact US at: Join Us at Twitter: FaceBook:


Nortel Advanced Data Networking Technology  

/920-806.html Nortel Advanced Data Networking Technology ↘ Answer: B Answer: C Question: 1 Question: 2 A. Enable 128-bit Wired Equivalent Pr...

Nortel Advanced Data Networking Technology  

/920-806.html Nortel Advanced Data Networking Technology ↘ Answer: B Answer: C Question: 1 Question: 2 A. Enable 128-bit Wired Equivalent Pr...