New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Oracle 1z0-404 Oracle Communications Session Border Controller 7 Basic Implementation Essentials Exam Practice Test

Page: 1 / 7
Total 70 questions

Oracle Communications Session Border Controller 7 Basic Implementation Essentials Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

You are logged in to the Session Border Controller a superuser. You want to remove other user from the system.

How do you accomplish this?

Options:

A.

from the superuser mode, by executing the remove user command

B.

from the user mode, by executing the kill command

C.

from the superuser mode, by executing the remove user command

D.

from the superuser mode, by executing the kill command

E.

from the user mode, by executing the remove user command

Question 2

You configured the Session Agent Group (SAG) element. You want the Session Agent to be selected in the order in which they are listed in the destination list, with each agent selected in turn, one per session.

How would you accomplish this?

Options:

A.

Navigate to the session-agent configuration element and set the strategy parameter to sequential.

B.

Navigate to the session-agent configuration element and set the strategy parameter to propdist.

C.

Navigate to the session-agent configuration element and set the strategy parameter to hunt.

D.

Navigate to the session-agent configuration element and set the strategy parameter to roundrobin.

E.

Navigate to the session-agent configuration element and set the strategy parameter to leastbusy.

Question 3

You finished configuring a not Real Time Change (not RTC)-supported configuration element and you want to apply the change in your service.

Which two options are valid in order to accomplish this? (Choose two.)

Options:

A.

From user mode, execute the save-config and activate-config commands.

B.

From configuration mode, execute the save-config, activate-config, and reboot commands.

C.

From superuser mode, execute the save-config and activate-config and reboot commands.

D.

From superuser mode, execute the save-config and activate-config commands.

E.

From superuser mode, execute the save-config, activate-config, and reboot force commands.

Question 4

Which two statements are true about a realm on the Session Border Controller?

Options:

A.

It can only have one steering pool port per realm.

B.

It is a layer 3 abstraction of a VoIP network.

C.

It is a logical definition of a network or group of networks comprising devices that provide real-time communication.

D.

It is a layer 5 abstraction of a VoIP network.

E.

It is a collection of IP devices that perform IP routing functions.

Question 5

Which two statements describe the functions of Session Border Controllers? (Choose two.)

Options:

A.

they replace typical edge routers and firewalls in order to provide a unified network border for signaling and media control

B.

they are session-aware devices that enable control of end-to-end interactive communications across IP network borders

C.

they are based on the Windows operating system

D.

they provide routing functions for IP, TCP, and SMTP using application parameters

E.

they provide signaling proxy functions for SIP, H.323, and MGCP, which includes access control, signaling constraints, and topology hiding

Question 6

Which two states are needed by the active node while transitioning to standby? (Choose two.)

Options:

A.

Out of service

B.

Becoming-active

C.

Relinquishing-standby

D.

Relinquishing-active

E.

Becoming-standby

Question 7

When provisioning the redundancy-configuration, the peer name for each of the peers in a High Availability configuration must also be defined in each system’s ______________.

Options:

A.

hostname parameter under the sip-config configuration element

B.

hostname parameter under the account-config configuration element

C.

hostname parameter under the bootparam configuration branch

D.

target name parameter under the bootparam configuration branch

E.

hostname parameter under the system-config configuration element

Question 8

What is the first thing you must do when setting up the boot parameters of the Session Border Controller?

Options:

A.

reset the system clock

B.

know the superuser mode password and access the configuration mode

C.

disable FTP access to the wancom0 management interface

D.

obtain the bootparam license

E.

verify the configuration by executing the verify-config command

Question 9

You are configuring access rules in a Session Border Controller Peering architecture.

Which two configuration steps are required to allow access only from User Agents (UAs) configured as session agents? (Choose two.)

Options:

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.

B.

Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).

C.

Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

E.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to address-prefix.

Question 10

What two problems do Network Address Translations (NATs) introduce into VoIP networks? (Choose two.)

Options:

A.

There are no major concerns with NATs.

B.

NATs block unsolicited incoming signaling and media.

C.

NATs block unsolicited incoming signaling but allow incoming media.

D.

NATs pinholes expire after a configurable time.

E.

NATs devices can be overloaded by incoming registrations.

Page: 1 / 7
Total 70 questions