Oracle Communications Session Border Controller 7 Basic Implementation Essentials v7.0 (1z0-404)

Page:    1 / 5   
Total 74 questions

You are troubleshooting a SIP routing issue and you haveaccess to the SIP call ow processed by the Session Border Controller.
Which two steps are valid for troubleshooting this type of issues? (Choose two.)

  • A. It is necessary to locate the SIP session to troubleshoot and check if there is a 404 Routes Not Found SIP error message.
  • B. It is recommended to look for 183 Session Progress SIP error messages that indicate routing issues.
  • C. It is recommended to check the called number by looking at the Request-URI of the INVITE message and making sure it is a validnumber to be routed.
  • D. It is recommended to find the CANCEL method received by the Session Border Controller which typically identifies a SIP routing issue.
  • E. It is necessary to find an initial INVITE received by the Session Border Controller which getsa 503 Service Unavailable SIP error message.


Answer : B,E

You are configuring the boot parameters in the Session Border Controller.
Which three statements are true about the boot parameters? (Choose three.)

  • A. A reboot is always required to apply any change to the boot parameters.
  • B. The target name is usedfor domain name resolution.
  • C. The system clock is a boot parameter.
  • D. The boot parameters are stored in Non-Volatile Random Access Memory (NVRAM).
  • E. The boot parameters are not affected by the activate-config command.


Answer : A,C,D

Which three statements are true about the bootloader? (Choose three.)

  • A. It decompresses the image file and loads it into the main RAM
  • B. It reads the imagefile
  • C. It is based on Linux
  • D. It looks at the boot parameters
  • E. It is a Windriver’s VxWork product


Answer : A,B,D

You are configuring access rules in a Session Border Controller Peering architecture.
Which configuration step is required to allow access from any User Agent (UA)?

  • A. Navigate to thesip-port configuration element and set the allow-anonymous parameter to all.
  • B. Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).
  • C. Navigate to the sip-port configurationelement and set the allow-anonymous parameter to address-prefix.
  • D. Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).
  • E. Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.


Answer : A

The Session Border Controller needs to be configured to act as a Back-to-Back User Agent
(B2BUA).
How would you accomplish this?

  • A. Navigate to the sip-config configuration element and set the operation-mode to stateless.
  • B. Navigate to the sip-configconfiguration element and set the operation-mode to dialog.
  • C. Navigate to the sip-config configuration element and set the operation-mode to stateful.
  • D. Navigate to the session-router configuration element and set the operation-mode to dialog.
  • E. Navigate to the session-router configuration element and set the operation-mode to none.


Answer : B

What is the first thing you should do when you want the Session Border Controller to detect that anendpoint is behind a NAT/firewall device?

  • A. Navigate to the sip-port configuration element and set the nat-traversal parameter to disabled.
  • B. Navigate to the sip-interface configuration element and set the nat-traversal parameter to never.
  • C. Navigate to the sip-interface configuration element and set the nat-traversal parameter to always.
  • D. Navigate to the sip-port configuration element and set the nat-traversal parameter to enabled.
  • E. Navigate to the sip-interface configuration element and set the nat-traversal parameter to detect.


Answer : C

You are logged in to the Session Border Controller a superuser. You want to remove other user from the system.
How do you accomplish this?

  • A. from the superuser mode, by executing the remove user <index number> command
  • B. from the user mode, by executing the kill <index number> command
  • C. from the superuser mode, by executing the remove user <username> command
  • D. from the superuser mode, by executing the kill <index number> command
  • E. from the user mode, by executing the remove user <index number> command


Answer : C

Whichtwo statements are true about SIP response code handling on the Session Border
Controller? (Choose two.)

  • A. The Session Border Controller will originate a 503 when there are no steering pool ports available.
  • B. The Session Border Controller will originate a 403 response when bandwidth allocated to a realm has been exhausted.
  • C. The Session Border Controller cannot originate 3xx class redirect responses.
  • D. By default, the Session Border Controller will recurse on the 6xx messages.
  • E. The Session Border Controller can transmit a different SIP response code than it received.


Answer : A,C

When provisioning the redundancy-configuration, the peer name for each of the peers in a
High Availability configuration must also be defined in each systems ______________.

  • A. hostname parameter under the sip-configconfiguration element
  • B. hostname parameter under the account-config configuration element
  • C. hostname parameter under the bootparam configuration branch
  • D. target name parameter under the bootparam configuration branch
  • E. hostname parameter under the system-config configuration element


Answer : E

You are associating network-interface configuration elements with a physical- interfaceconfiguration element on the Session Border Controller.
Which parameter must contain the same unique ID in these two configuration elements?

  • A. port-id
  • B. identifier
  • C. unique-id
  • D. name
  • E. sub-port-id


Answer : A

You configured theSession Agent Group (SAG) element. You want the Session Agent to be selected in the order in which they are listed in the destination list, with each agent selected in turn, one per session.
How would you accomplish this?

  • A. Navigate to the session-agentconfiguration element and set the strategy parameter to sequential.
  • B. Navigate to the session-agent configuration element and set the strategy parameter to propdist.
  • C. Navigate to the session-agent configuration element and set the strategy parameter tohunt.
  • D. Navigate to the session-agent configuration element and set the strategy parameter to roundrobin.
  • E. Navigate to the session-agent configuration element and set the strategy parameter to leastbusy.


Answer : D

What does the Session Border Controller do when the Adaptive Hosted NAT (HNT) feature is enabled?

  • A. It sends a periodic re-register command to each endpoint behind a NAT.
  • B. It creates a binding for the Address of Record (AOR) of an endpoint that is behind a NAT.
  • C. It creates a binding for the Address of Record (AOR) of an endpoint that is NOT behind a NAT.
  • D. It sends SIP OPTIONS at increasing intervals to test if an endpoint behind a NAT device is still reachable.
  • E. It sends ICMP PNGsto dynamically learn the binding time of an endpoint behind a NAT device.


Answer : C

Which two states are needed by the active node while transitioning to standby? (Choose two.)

  • A. Out of service
  • B. Becoming-active
  • C. Relinquishing-standby
  • D. Relinquishing-active
  • E. Becoming-standby


Answer : B,D

To ensure proper operation of a Session Border Controller HighAvailability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.
How is this type of traffic accommodated?

  • A. by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the management interfaces
  • B. by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the media interfaces
  • C. by setting the utility address and sec-gateway values to addresses in different subnets as the IP address configured on the wancom interfaces
  • D. by setting a unique address on the wancoml and wancom2 interfaces via the utilityaddress command
  • E. via the utility address parameters on the wancoml and wancom2 interfaces


Answer : A

Which two statements are true about realm bridging in the Session Border Controller?
(Choose two.)

  • A. Therealm-config configuration element provides G.711 to G.729 transcoding functions.
  • B. You can configure more than one SIP port per realm.
  • C. You can only configure a single SIP port per realm.
  • D. The ingress realm and egress realm for a specific SIP session can be the same.
  • E. The ingress realm is always different than the egress realm for a specific SIP session.


Answer : B,D

Page:    1 / 5   
Total 74 questions