Pass the Oracle Session Border Control 1z0-404 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which two statements describe the functions of Session Border Controllers? (Choose two.)

Options:

A.

they replace typical edge routers and firewalls in order to provide a unified network border for signaling and media control


B.

they are session-aware devices that enable control of end-to-end interactive communications across IP network borders


C.

they are based on the Windows operating system


D.

they provide routing functions for IP, TCP, and SMTP using application parameters


E.

they provide signaling proxy functions for SIP, H.323, and MGCP, which includes access control, signaling constraints, and topology hiding


Questions # 12:

After configuring Header Manipulation Rules (HMRs) for topology hiding, your subsequent testing shows that the manipulation is not taking effect.

Identify two causes for this (Choose two.)

Options:

A.

You have not configured the out-manipulationid parameter of the sip-interface configuration element.


B.

You have not enabled policy-based realm-bridging.


C.

The value of the name parameter in the header-rule configuration element is different than the value of the out-manipulationid parameter in the sip-interface configuration element.


D.

The value of the match-val-type parameter is not written correctly.


E.

The home-proxy-address value does not match the $LOCAL_IP value in the new-value parameter.


Questions # 13:

You are troubleshooting a SIP routing issue and you have access to the SIP call flow processed by the Session Border Controller.

Which two steps are valid for troubleshooting this type of issues? (Choose two.)

Options:

A.

It is necessary to locate the SIP session to troubleshoot and check if there is a 404 Routes Not Found SIP error message.


B.

It is recommended to look for 183 Session Progress SIP error messages that indicate routing issues.


C.

It is recommended to check the called number by looking at the Request-URI of the INVITE message and making sure it is a valid number to be routed.


D.

It is recommended to find the CANCEL method received by the Session Border Controller which typically identifies a SIP routing issue.


E.

It is necessary to find an initial INVITE received by the Session Border Controller which gets a 503 Service Unavailable SIP error message.


Questions # 14:

What is used by the standby Session Border Controller to send ARP requests via the media interface in a High Availability (HA) architecture?

Options:

A.

the IP utility address and its virtual MAC address


B.

the virtual IP address and its hardcoded MAC address


C.

the IP utility address and its hardcoded MAC address


D.

the virtual IP address and its virtual MAC address


E.

the IP utility address and the MAC utility address


Questions # 15:

Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.

How would you accomplish this?

Options:

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.


B.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.


C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.


D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.


E.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.


Questions # 16:

You are configuring access rules in a Session Border Controller Peering architecture.

Which configuration step is required to allow access from any User Agent (UA)?

Options:

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.


B.

Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).


C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to address-prefix.


D.

Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).


E.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.


Questions # 17:

What is the effect of executing the save-config command in superuser mode?

Options:

A.

The running configuration version is reset to 1.


B.

The running configuration version does not increase and is equal to the saved configuration version.


C.

The saved configuration version increases by 1 and is higher than the running configuration version.


D.

The running configuration version increases by 1 and is higher than the saved configuration version.


E.

The editing configuration version increases by 1 and is higher than the saved configuration version.


Questions # 18:

Which three statements are true about the bootloader? (Choose three.)

Options:

A.

It decompresses the image file and loads it into the main RAM


B.

It reads the image file


C.

It is based on Linux


D.

It looks at the boot parameters


E.

It is a Windriver’s VxWork product


Questions # 19:

Examine the output below from the show sipd invite command:

Question # 19

How many 600 Busy Everywhere messages sent by the Session Border Controller in the last 140 seconds did not originate from a downstream device?

Options:

A.

157


B.

13


C.

4


D.

161


E.

0


Questions # 20:

Which three options are valid ways to apply Header Manipulation Rules (HMRs) to your existing configuration?

Options:

A.

Navigate to the network-interface configuration element and configure the in-manipulationid parameter.


B.

Navigate to the session-agent configuration element and configure the in-manipulationid parameter.


C.

Navigate to the sip-interface configuration element and configure the in-manipulationid parameter.


D.

Navigate to the session-agent configuration element and configure the in-manipulationid parameter.


E.

Navigate to the session-group configuration element and configure the in-manipulationid parameter.


Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions