REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Shyanne
 
 

 

Braindumps of 920-804
Technology Standards and Protocol
For Converged Networks

Exam Questions, Answers, Braindumps (920-804)

Hi all.
I think it was tough but thanks to www.examcheats.net . I purchased their study material and got through. The stuff had drag and drops, exhibits and all that is required for the exam.

QUESTION 1
Given the following network information:
1. The call server located at the corporate office is accessible directly through the LAN by local employees.
2. Remote office are able to access the corporate server through a managed Internet service Provider (ISP)
3. The corporate network and all endpoint have firewalls that limit access. Only ports 22 and 443 allow traffic traversal for the servers.
4. The firewalls are provided and managed by the ISP and their contract is exclusive for the next three years.
5. The firewalls are NOT stateful and do NOT understand the complexities of SIPorH.323.However, the ISP will NOT replace them without a significant charge to the customer.
Which two solutions can the company implement to enable VoIP traffic to securely traverse the network? (Choose two.)
A. Configure SIP-proxy servers on the network to intercept and propagate the VoIP traffic through the ISP-managed firewalls.
B. Install Virtual Private Network (VPN) devices at the remote locations. These can intercept and encapsulate VoIP traffic going to and from the call server with tunneling using port 443.
C. Implement VPN devices at all locations with split tunneling configured to tunnel VoIP traffic with QoS to the call server. This moves the VoIP traffic from the Internet and only makes it accessible on the intranet. The ISP will need to be asked to allow the VPN tunnel traffic.
D. Recommend that the customer purchase their own SIP/H.323-Capable firewalls fro the opposite ends of all the managed connections. The firewalls need to be placed in front of the ISP-owned firewalls and firewall ports need to be opened to permit VoIP traffic.
Answer: B C
QUESTION 2
Abc .com has recently migrated their network from a dedicated Frame Relay (FR) WAN to managed full-mesh IP Security Protocols (IPSec) Virtual Private Network (VPN). Given the following network information:
1. All of the branch offices are now connected to the main data center and to each other through the full-mesh IPSec-VPN.
2. For branch offices with 50 to 100 users and data connection to the managed IPSec-VPN is provided via a cable modem at a rate of 2 Mbps.
3. The branch offices with 10 to 50 users also use cable modems but with bandwidths of 1 Mbps to the managed IPSec-VPN.
4. The individual home-office users are provided with synchronous Digital Subscriber Line (DSL) connections that are 256 kbps, that are tunneled to the managed IPSec-VPN using a Customer Provided Equipment (CPE) based IPSec-VPN device.
5. Other than the individual home-office users, the traffic leaving the branch office locations is NOT encrypted until it leaves the local networks and enters the IPSec-VPN at the Internet Service Provider (ISP) backbone.
VoIPsystem tests find that there is significant jitter on the home-office users' VoIP calls when they attempt to download e-mail at the same time. Which two network issues are the most plausible causes of the VoIP traffic issue? (Choose two.)
A. The IPSec-VPNs do NOT have QoS to manage the VoIP calls.
B. Delays introduced by the e-mail server cause the VoIP traffic to be queued until the e-mail transfer starts to send out a smooth flow of data.
C. Circuit bandwidths speeds are greater than the speed at which the IPSec-VPN devices can encrypt and decrypt, resulting in additional delay and jitter in the VoIP communications.
D. The processor on the CPE that is terminating the IPSec-VPN can only handle the processing of the VoIP call or the e-mal transfer while encrypting either into the IPSec-VPN tunnel.
E. VoIP is more difficult to secure in an IPSec-VPN than typical IP traffic, thus the IPSec-VPN device is taxed with the additional processing, which slows the transmitting of the VoIP payload.
Answer: A C
QUESTION 3
Given the following network information:
1. All remote users are restricted to 56 kbps dial-up access to the company network.
2. The Layer 1 connections between the campus buildings consist of T3/E3 circuits to their local Internet Service Provider (ISP), which routes their Layer 3 information to the Internet
3. The IP Security Protocols (IPSec) Virtual Private Network (VPN) tunnels are currently exceeding the bandwidth of the circuits between the VPN tunnel and points.
4. The VoIP calls that are being completed between campus buildings are noticeably degrading during hours of peak bandwidth usage.
5. All intra- and inter-office communications are using the G.711 CODEC between the Internet Telephones and the VoIP call servers.
6. All VoIP calls made by the remote users are using the G.729 CODES.
7. During random times of the day, the IP-VPN tunnel are NOT using the full bandwidth of the T3/E3 circuits, but latency across the tunnels between campus buildings is excessive (>=150 milliseconds.)
Which three recommendations should you make to prevent the degradation of VoIP traffic as it traverses the IPSec-VPN tunnels along with all other traffic? (Choose three.)
A. Add an IP-VPN device at each campus building to handle additional inter-office traffic.
B. Recommend a configuration that forces remote users to use L2TP tunnels to access the network.
C. Recommend a managed backbone other than the Internet for inter-office traffic, such as Asynchronous Transfer Mode (ATM) or Frame Relay (FR).
D. Verify that al remote users have their Internet Telephones configured with the G.711 CODEC.
E. Verify that all remote users have their Internet Telephones configured with the G.711 CODEC.
F. Recommend IP-VPN termination for remote client PCs on the Internet (aggressive mode) with DiffServ and QoS.
Answer: A B C
QUESTION 4
An organization that has Internet Telephones and VoIP applications throughout its network is having issues with equipment that has been recently deployed. Given the following network information:
1. Recently a disabled firewall that has been forwarding al traffic was discovered on the network. It is located between the segment on which all executives are connected and the rest of the organization's backbone.
2. Per the organization's security policy, this firewall as immediately re-enabled to protect the executive data. As a result, the executive network is NO longer able to log in to the call servers.
3. The call servers and the Internet Telephones use the SIP and the g.711 CODEC for the voice portion of the connection.
4. Upon review of the firewall policies and specifications, it has been identified as a proxy firewall for File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) traffic. The policies on the firewall permit all traffic from the executive LAN into the organization's backbone and drop all other traffic.
Which recommendation would enable the executive LAN to make VoIP calls again, maximize network security, and require minimal IT support?
A. Install an additional PC-based gateway device to act as a SIP proxy for the VoIP calls.
B. Replace the proxy firewall with a stateful-inspection firewall, which is able to understand SIP.
C. Leave the proxy firewall in place and install an ESP/AH based-VPN (Virtual Private Network) to get the VoIP calls to the call server.
D. Replace the proxy firewall with a router that has packet filtering enabled. Then open up the appropriate ports needed for communication.
Answer: B
QUESTION 5
When planning for the installation of a VoIP telephone system that is going to be responsible for both basic and enhanced emergency-service calls, which three statements are true? (Choose three.)
A. Identification of the locations of VoIP callers is the responsibility of the telephone-service carriers of the VoIP callers.
B. Keeping E/911 and E/211 database updated with the latest information in the ALI is essential for dispatching emergency crews to the right emergency locations.
C. The ability to have VoIP callers move their own telephones represents a potentially life-threatening issue when you consider the importance of E/911 and E/211 call processing.
D. If emergency station location details are NOT updated in the Automatic Location Identifier (ALI), a Public Service Answering Point (PSAP) may dispatch an emergency crew to the wrong location.
Answer: B C D
QUESTION 6
Given the following VoIP system information, evaluate the company's VoIP implementation for potential issues or non-compliance to emergency-service requirements:
1. A company has installed a VoIP system that is able to identify the location of a caller based on the telephone that the caller uses to place a call.
2. The company is moving to a new office and all employees are asked to move their own Internet Telephones to their new desks in the new office.
3. The administrator of the VoIP telephone system moves the VoIP gateway device form the old office to the new office on moving day without making any changes to database for user location identification.
4. Upon completion of the VoIP gateway move, the administrator is out of the office due to a family emergency for three days. During that time a few employees have engineered their Internet Telephones to make calls from their home office using the company VoIP gateway/switch.
What are the two liability assessments for this configuration? (Choose two.)
A. A Public Service Answering Point (PSAP) NOT located in the same jurisdiction as the caller could answer all call types, but this is NOT standard operating procedure.
B. All E911/E211 calls could encounter connection issues, but this could be corrected once the VoIP administrator updates the user database.
C. A PSAP NOT located in the same jurisdiction as the caller could answer emergency calls, but these calls would receive NO delay in response the emergency.
D. All call types could be completed successfully and in the most expedient manner, but there could be issues with the locations and identification of E911/E211 callers.
E. All call types would NOT indicate the number the calls originated from because the Automatic Number information (ANI) would NOT be available. This information would only be available to Internet Telephones that are able to identify caller locations via E911/E211.
Answer: A B.
QUESTION 7
Abc .com has an IP WAN with multiple routes supporting various data applications. They have added support for VoIP to take advantage of enhanced services and bandwidth efficiencies. The voice traffic has frequently been distorted, and technicians suspect that the cause is serial delay (jitter) within the routing scheme. Which two viable approaches can the customer use in the router setup to help reduce this issue? (Choose two.)
A. Implement Layer 2 fragmentation on the WAN links.
B. Use voice compression for packets tagged as voice.
C. Use small packets for VoIP so that less time is spent accumulating voice samples.
D. Use large packets for VoIP so that more of a voice sample can be sent at one time.
Answer: A C
QUESTION 8
Abc .com plans to implement VoIP within the year. You are assigned to access the network status and recommend changes that may be required to support VoIP. Given the following network conditions:
1. The two core routers have eight of ten slots populated.
2. The Central Processing Unit (CPU) usage of the core routers is at a baseline of 85%.
3. One Open Shortest Path First (OSPF) area is configured for every two interfaces.
4. Routers are based on a distributed processing architecture.
5. Each core router maintains four LinkStateDatabases (LSDs).
6. New code is able to loaded to make the routers Differentiated Services (DiffServ) capable.
Which action should you take to reduce the CPU utilization in preparation of DiffServ queuing?
A. Add a passive standby CPU.
B. Reduce the number of OSPF areas on each router.
C. Enable the compression accelerator card on each router.
D. Do nothing the performance of the installed core routers CANNOT be improved.
Answer: B

920-804


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend