Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Oracle 1z0-404 Oracle Communications Session Border Controller 7 Basic Implementation Essentials Exam Practice Test

Demo: 10 questions
Total 70 questions

Oracle Communications Session Border Controller 7 Basic Implementation Essentials Questions and Answers

Question 1

What do you need to do to support ftp service on a media interface?

Options:

A.

Add the IP address of the remote device to the hip-ip-list and ftp-address parameters.

B.

Set the ftp-address parameter to enabled.

C.

Add the IP address of the interface in the hip-ip-list and ftp-address parameters.

D.

Set the hip-address parameter to enabled.

E.

Add the IP address of the interface in the hip-ip-list and telnet-address parameters.

Question 2

In which two ways can you remove support for telnet from a media interface? (Choose two.)

Options:

A.

Navigate to the network-interface configuration element and run the delete-hip-ip command.

B.

Navigate to the phy-interface configuration element and run the remove-hip-ip command.

C.

Navigate to the network-interface configuration element and run the remove-telnet-ip command.

D.

Navigate to the network-interface configuration element and run the remove-hip-ip command.

E.

Navigate to the phy-interface configuration element and run the remove-telnet-ip command.

Question 3

Which statement is true about the Host In Path (HIP) feature In the Session Border Controller?

A) By default, the Session Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed via the management interfaces.

B) To enable these services (FTP ICMP, SNMP, and Telnet services), the enable host-in-path command must be executed from the superuser mode.

C) To enable these services, the Session Border Controller includes a software license that enables administrative traffic over the media interfaces.

D) By default, the Session Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed via the media interfaces.

E) These four fields (FTP, ICMP, SNMP, and Telnet services) are collectively known as the Host Interface Priority.

Options:

Question 4

How does the Session Border Controller ensure that a pinhole is kept open for persistent communication to a SIP endpoint behind a NAT device?

Options:

A.

by changing the expires= parameter to a defined value in 200 OK responses to REGISTERs

B.

by changing the expires= parameter to a defined value in 200 OK responses to INVITEs

C.

by issuing PINGs to the endpoint's NAT address

D.

by sending Address Resolution Protocol (ARP) requests at a defined frequency

E.

by sending messages at a defined frequency

Question 5

Examine the output below from the show sipd invite command:

How many 600 Busy Everywhere messages sent by the Session Border Controller in the last 140 seconds did not originate from a downstream device?

Options:

A.

157

B.

13

C.

4

D.

161

E.

0

Question 6

Which two statements describe the functions of Session Border Controllers? (Choose two.)

Options:

A.

they replace typical edge routers and firewalls in order to provide a unified network border for signaling and media control

B.

they are session-aware devices that enable control of end-to-end interactive communications across IP network borders

C.

they are based on the Windows operating system

D.

they provide routing functions for IP, TCP, and SMTP using application parameters

E.

they provide signaling proxy functions for SIP, H.323, and MGCP, which includes access control, signaling constraints, and topology hiding

Question 7

You need to configure the Session Border Controller to perform load balancing between two downstream SIP proxies.

Which option shows the configuration elements that you should configure for the load balancing feature?

Options:

A.

session-router and router-group

B.

realm-config and enum-group

C.

group-policy and load-policy

D.

proxy and proxy-pool

E.

local-policy and session-group

Question 8

You are logged in to the Session Border Controller a superuser. You want to remove other user from the system.

How do you accomplish this?

Options:

A.

from the superuser mode, by executing the remove user command

B.

from the user mode, by executing the kill command

C.

from the superuser mode, by executing the remove user command

D.

from the superuser mode, by executing the kill command

E.

from the user mode, by executing the remove user command

Question 9

Which statement is true about Session Border Controller architectures and realm bridging?

Options:

A.

The Hosted NAT Traversal (HNT) architecture focuses on the border point between two different service provider networks, both in the home realm.

B.

The Hosted IP architecture focuses on the border point between one enterprise network realm and one service provider network realm.

C.

The Access-backbone architecture focuses on the border point between two backbone realms.

D.

The Peering architecture focuses on the border point between two different service provider networks and their realms.

E.

The Gateway architecture Focuses on the border point between one enterprise network realm and one service provider network realm.

Question 10

Which node automatically assumes the active role when peers boot simultaneously and their health scores are equivalent in a High Availability (HA) scenario?

Options:

A.

the node with the highest wancom IP address

B.

the node that is configured as secondary

C.

the node that had the role of active last

D.

the node with the lowest wancom IP address

E.

the node with the highest round-robin score

Demo: 10 questions
Total 70 questions