Nortel Secuse Router Rls.2.0 Configuration
Which two commands can be used to edit an access list? (Choose two.)
Answer: B, C
Which is the definition of a Security Zone within the framework of the Nortel Secure Router
A. A separate firewall running on each interface individually.
B. A logical difference between WAN interfaces for security.
C. A virtual firewall with its own inbound and outbound database.
D. A representation of each firewall in your WAN and branch network.
Which are attributes of a Nortel Secure Router access list filter? (Choose two.)
A. They are applied to an interface with a direction.
B. Filters can only be used on WAN side interfaces.
C. There is an implicit Deny at the end of every filter.
D. There is an implicit Allow at the end of every filter.
Answer: A, C
Which mechanism most directly manages SIP traffic on the Nortel Secure Router?
A. Stateful Inspection
B. SIP Audio scanning
C. Source Based Filtering
D. Application Level Gateway
Which command will show the status, number of links, total bandwidth and TX/RX statistic
for a bundle named WAN?
A. show bundle WAN
B. debug interface bundle
C. show interface bundle WAN
D. show module configuration WAN
Which connector does a CT3 use?
Which is the limiting factor to how many T1s can be placed in a single bundle?
A. Code version
B. 3 on a 1000, 8 on a 3120
C. Number available on the platform
D. Bandwidth divided by modules installed
To what lowest level will the Nortel Secure Router products support fractional T1s?
D. No fractional T1