Pass the Oracle Session Border Control 1z0-404 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What configuration step is required for booting the Session Border Controller from an external FTP server?

Options:

A.

Navigate to the bootparams configuration branch and set the host inet field to the IP address of the external BOOTP Server from which the Session Border Controller can boot.


B.

Navigate to the system configuration branch and set the ip address field of the wancom1 management interface.


C.

Navigate to the bootparams configuration branch and set the ip address field of the destination SIP device with which the Session Border Controller needs to interact.


D.

Navigate to the system configuration branch and set the ip address field of the wancom0 management interface.


E.

Navigate to the bootparams configuration branch, set the host inet or Host IP, FTP username, and FTP password for the external FTP Server in which the image file resides.


Questions # 2:

You used the no command to delete a configuration element.

Which statement is true?

Options:

A.

The deletion is lost on immediate reboot.


B.

The deletion is reflected when viewing the running configuration.


C.

The deletion takes effect immediately in the saved configuration.


D.

The deletion always requires a reboot to take effect.


E.

The deletion requires auto-save enabled.


Questions # 3:

When setting up the registration-caching parameter to enabled in the sip-interface configuration element, _____________.

Options:

A.

the Session Border Controller will never use the SIP-NAT mechanism for routing


B.

the Session Border Controller will not use the registration cache for routing


C.

all endpoints in the realm will be cached when registered


D.

only endpoints behind NAT in the realm will be cached when registered


E.

the Session Border Controller will never use the local-policy mechanism for routing


Questions # 4:

Which three statements are true about SIP, per RFC 326? (Choose three.)

Options:

A.

SIP does not provide for resource reservation.


B.

SIP defines native methods for negotiating media streams.


C.

A SIP transaction occurs between a client and a server.


D.

To set up a voice session, SIP relies on protocols such as SDP and RTP.


E.

SIP signaling can only be used for voice over IP thereby limiting its use as a general signaling protocol.


Questions # 5:

To ensure proper operation of a Session Border Controller High Availability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.

How is this type of traffic accommodated?

Options:

A.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the management interfaces


B.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the media interfaces


C.

by setting the utility address and sec-gateway values to addresses in different subnets as the IP address configured on the wancom interfaces


D.

by setting a unique address on the wancoml and wancom2 interfaces via the utility address command


E.

via the utility address parameters on the wancoml and wancom2 interfaces


Questions # 6:

You were working with the Session Border Controller in configuration mode and you forgot to close your session. Your colleague who connected after you left says that he cannot enter into configuration mode.

Why is your colleague not able to configure the Session Border Controller?

Options:

A.

The Session Border Controller does not allow more than one configuration session within 24 hours.


B.

The Session Border Controller does not support Telnet/SSH timeouts.


C.

The Session Border Controller supports only one simultaneous configuration session, and the Telnet/SSH timeouts are set to 0.


D.

The Session Border Controller supports only 10 simultaneous configuration sessions.


E.

The Session Border Controller supports only five simultaneous Telnet/SSH sessions.


Questions # 7:

What is the drawback of configuring Policy-Based Realm Bridging (PBRB) without the assistance of Header Manipulation Rules (HMRs)?

Options:

A.

Topology hiding is incomplete.


B.

The configuration requires a home realm to be defined, which can make privacy harder to achieve.


C.

The configuration requires you to enable SIP-NAT bridging, which is complex.


D.

The architecture is simple, and really designed for lab environments.


E.

The performance is poor relative to other models.


Questions # 8:

You finished configuring a not Real Time Change (not RTC)-supported configuration element and you want to apply the change in your service.

Which two options are valid in order to accomplish this? (Choose two.)

Options:

A.

From user mode, execute the save-config and activate-config commands.


B.

From configuration mode, execute the save-config, activate-config, and reboot commands.


C.

From superuser mode, execute the save-config and activate-config and reboot commands.


D.

From superuser mode, execute the save-config and activate-config commands.


E.

From superuser mode, execute the save-config, activate-config, and reboot force commands.


Questions # 9:

What do you need to do to support ftp service on a media interface?

Options:

A.

Add the IP address of the remote device to the hip-ip-list and ftp-address parameters.


B.

Set the ftp-address parameter to enabled.


C.

Add the IP address of the interface in the hip-ip-list and ftp-address parameters.


D.

Set the hip-address parameter to enabled.


E.

Add the IP address of the interface in the hip-ip-list and telnet-address parameters.


Questions # 10:

You are configuring access rules in a Session Border Controller Peering architecture.

Which two configuration steps are required to allow access only from User Agents (UAs) in a specific IP subnet? (Choose two.)

Options:

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.


B.

Navigate to the session-agent configuration element and set the ip-address parameter to the IP address of your trusted User Agent (UA).


C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.


D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.


E.

Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agents (UAs).


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions