REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Micheal
 
 

 

Braindumps of 920-449
Contivity Security

Exam Questions, Answers, Braindumps (920-449)

I have questions for you but I have only one suggestion for you ------ No need for anything just go for www.examcheats.net study material.

QUESTION 1
For planning purposes, bandwidth often equals the excepted or current use plus a growth potential of:
A. 0%
B. 50%
C. 100%
D. 10-20%
Answer: D
QUESTION 2
You are tasked with configuring Branch Office Tunnel on a Contivity 2700. If the two devices establishing the tunnel have different encryption settings (due either export laws or administrative configuration), how will the two devices react?
A. They will default to DES with SHA1 Integrity.
B. They will negotiate upward until each has a compatible encryption capability.
C. They will negotiate downward until each has a compatible encryption capability.
D. They will negotiate upward until each has a compatible encryption capability.
Answer: C
QUESTION 3
You are tasked with configuring a new Point-to-Point Protocol over Ethernet (PPPoE) connection on the public interface of a Contivity 1100. Which PPPoE usage restriction do you NOT need to consider?
A. PPPoE changes are dynamically applied.
B. You muse set the appropriate filter (deny all by default).
C. Cannot use dynamic routing on PPPoE interfaces (unless tunneling).
D. PPPoE has a Maximum Transmission Unit (MTU) limitation of 1492 bytes.
Answer: A
QUESTION 4
You are attempting to establish a VPN user tunnel to a Contivity 1700 using the Contivity VPN Client. When trying to login, a popup window appears with the following message:
Login Failure due to: Remote host not responding.
What are the two probable causes for this Login Failure? (Choose two.)
A. The user password is not correct.
B. The Contivity 1700 is not accessible.
C. User Datagram Protocol (UDP) port 500 is blocked.
D. The Group Security Authorization is mis-configured.
Answer: A B
QUESTION 5
You have configured an Ipsec peer to peer branch office tunnel between a Contivity 4600 and a Contivity 1700. When the tunnel tries to initiate, you receive the following message in the Contivity 4600's event log:
ISAKMP [13] No proposal chosen in message from X.X.X.X
Which condition will generate this message?
A. A remote branch office gateway rejected your gateway's attempt to authenticate.
B. The encryption types proposed by the remote branch office do not match the encryption types configured locally.
C. One side of the connection is configured to support dynamic routing while the other side is configured fro static routing.
D. The proposal made by the local gateway has been rejected by a remote branch office gateway, or by an IPsec implementation from another vendor.
Answer: B
QUESTION 6
You are tasked with configuring a Contivity 4600 to connect to a frame relay gateway. You want to gateway type to be user configurable, with the gateway type determining both the LMI format and the FECN/BECN processing. When configuring the frame relay interface, how must the connection type be set?
A. direct
B. looped
C. switched
D. non-switched
Answer: C
QUESTION 7
User at a remote location can not access their local mail server or print locally when they are tunneled into their corporate LAN via a gateway Contivity 1700.The elements have the following addresses:
-mail server (10.23.23.5)
-print locally (10.23.23.6)
-corporate LAN (192.168.1.0)
To allow access to the local servers and remain tunneled into the corporate LAN, which accessible addresses (es) should be used if split tunneling is configured?
A. 10.23.23.0
B. 192.168.1.0
C. 192.168.1.255.
D. 10.23.23.5 and 10.23.23.6
Answer: B
QUESTION 8
Which Branch Office network design provides redundancy with the lowest system overhead?
A. Full Mesh
B. Hub and Spoke
C. Redundant full mesh
D. Redundant hub and spoke
Answer: D
QUESTION 9
The load balance and fail over features available for user tunnels apply to clients connecting through which method?
A. SSL
B. Private interface
C. Nortel Networks Contivity VPN client
D. Microsoft dial-up networking PPTP client
Answer: C

920-449


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend