Download Oracle Communications Session Border Controller 7 Basic Implementation Essentials.1z0-404.ActualTests.2018-10-08.43q.vcex

Vendor: Oracle
Exam Code: 1z0-404
Exam Name: Oracle Communications Session Border Controller 7 Basic Implementation Essentials
Date: Oct 08, 2018
File Size: 171 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You configured the Session Agent Group (SAG) element. You want the Session Agent to be selected in the order in which they are listed in the destination list, with each agent selected in turn, one per session. 
How would you accomplish this?
  1. Navigate to the session-agent configuration element and set the strategy parameter to sequential.
  2. Navigate to the session-agent configuration element and set the strategy parameter to propdist.
  3. Navigate to the session-agent configuration element and set the strategy parameter to hunt.
  4. Navigate to the session-agent configuration element and set the strategy parameter to roundrobin.
  5. Navigate to the session-agent configuration element and set the strategy parameter to leastbusy.
Correct answer: D
Explanation:
Reference:  https://docs.oracle.com/cd/E52358_01/doc/sbc_scx620_aclireference.pdf (page 245)
Reference:  https://docs.oracle.com/cd/E52358_01/doc/sbc_scx620_aclireference.pdf (page 245)
Question 2
Which action triggers the 180 Ringing response in a User Agent Client (UAC)?
  1. the subscription to a SIP presence service
  2. the generation of a remote ring-back tone
  3. the generation of a local ring-back tone
  4. the establishment of a SIP session
  5. the termination of a SIP session
Correct answer: C
Question 3
Which two statements describe the functions of Session Border Controllers? (Choose two.)
  1. they replace typical edge routers and firewalls in order to provide a unified network border for signaling and media control
  2. they are session-aware devices that enable control of end-to-end interactive communications across IP network borders
  3. they are based on the Windows operating system
  4. they provide routing functions for IP, TCP, and SMTP using application parameters
  5. they provide signaling proxy functions for SIP, H.323, and MGCP, which includes access control, signaling constraints, and topology hiding
Correct answer: AE
Question 4
You are configuring a sip-interface configuration element. You encounter the error message: Error 409 saving configuration SipInterface.
Identify the cause of the error.
  1. You are creating a sip-port element with the same address parameter value of another sip-port.
  2. You are creating a sip-port element with the same port parameter value of another sip-port.
  3. You are creating a sip-port element with the same transport-protocol parameter value of another sip-port.
  4. You are creating a sip-interface element with the same realm-id parameter value of another sip-interface.
  5. You are creating a sip-interface element with a different realm-id parameter value of another sip-interface.
Correct answer: B
Explanation:
Question 5
You are configuring access rules in a Session Border Controller Peering architecture. 
Which two configuration steps are required to allow access only from User Agents (UAs) configured as session agents? (Choose two.)
  1. Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.
  2. Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).
  3. Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).
  4. Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.
  5. Navigate to the sip-port configuration element and set the allow-anonymous parameter to address-prefix.
Correct answer: BE
Question 6
When setting up the registration-caching parameter to enabled in the sip-interface configuration element, _____________.
  1. the Session Border Controller will never use the SIP-NAT mechanism for routing
  2. the Session Border Controller will not use the registration cache for routing
  3. all endpoints in the realm will be cached when registered
  4. only endpoints behind NAT in the realm will be cached when registered
  5. the Session Border Controller will never use the local-policy mechanism for routing
Correct answer: A
Question 7
You are configuring a network interface to enable the Session Border Controller to use the interface for signaling and media. 
Identify two valid configuration steps for supporting VLAN 12 (Choose two.) 
  1. Navigate to the network-interface configuration element and set the sub-port-id parameter to 12.
  2. Navigate to the network-interface configuration element and set the sub-port-id parameter to 0.
  3. Navigate to the phy-interface configuration element and configure the hip-id parameter.
  4. Navigate to the phy-interface configuration element and configure the pri-utility-address parameter.
  5. Navigate to the network-interface configuration element and configure the name parameter.
Correct answer: AC
Question 8
You are examining a SIP packet. There is no final response to the ACK method. 
What is the reason for this?
  1. The ACK method was defined only in RFC 2543 and it has been deprecated.
  2. The ACK method is part of the INVITE transaction.
  3. The ACK method is an exception in RFC 3261.
  4. The ACK method is an optional SIP method.
  5. The ACK method was replaced with the CANCEL method in RFC 3261.
Correct answer: B
Question 9
View the Exhibit. 
  
Which statement is true about this output of the show health command? 
  1. The two nodes have different health scores.
  2. The training1 peer is the standby node.
  3. The switchover berpd force command was executed to do a manual failover.
  4. The training6 peer is the active node.
  5. The training6 peer will wait 1050 ms before considering the training1 peer out of service.
Correct answer: E
Question 10
Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents. 
How would you accomplish this?
  1. Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.
  2. Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.
  3. Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.
  4. Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.
  5. Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!