If the Remote Worker cluster is using a Real Server IP and Real Server Port, over which protocols are these registration requests routed?
A. HTTP/HTTPS
B. LDAP/PPM
C. FTP/SFTP
D. RTP/SFTP
What can a Topology Hiding Profile hide?
A. Source and destination FQDNs
B. Source and destination IP addresses
C. Source and destination transport protocol
D. Source and destination codec selection
What do Server Profiles define?
A. The connection and transport parameters from the SBC to the service provider and to the SAL gateway.
B. The connection and transport parameters from the SBC to the service provider and to the call
C. The signaling and media parameters f.om the SBC to the call server and to the NTP server
D. The signaling and media parameters from the SBC to the service provider and the call server
What kind and how many routing profiles are required for a SIP trunk?
A. One: defines complete end-to-end routing map
B. Two: from call server to trunk server; from trunk server to call server
C. Three: from call server to trunk server; from FMS to both call server and trunk server
D. Four: from call server to trunk server; from trunk server to call server, from EMS to both call and trunk server
What are the three essential elements of a SIP trunk?
A. SIP service provider, SBC, call server (IP-PBX)
B. SBC, media gateway, call server (IP-PBX)
C. SIP service provider, SBC, media gateway
D. SBC, media gateway, trunk server
You have been asked to create and apply a Time of Day (ToD) domain policy to secure a SIP trunk.
What is the correct order of the policy application sequence?
A. Packet examined, destination evaluated, ToD evaluated, policy applied
B. Packet examined, ToD evaluated, flow determined, policy applied
C. Packet examined, ToD evaluated, policy applied, routing applied
D. packet examined, flow determined, policy applied, ToD evaluated
What are the essential steps to administer a Signaling Interface?
A. Add signaling interface, and assign to Interworking Profile.
B. Add media interface, and assign to signaling interface.
C. Add media interface, and assign to Server Flow.
D. Add signaling interface, and assign IP addresses and ports.
Why can you not select an Installation type of "EMS + UC-Sec" for a high Availability (duplicated) configuration?
A. The EMS has too few interfaces for High Availability.
B. The SBC has too few Interfaces for High Availability.
C. EMS and UC-Sec have- different interfaces and are incompatible with High Availability.
D. High Availability configurations always require a separate (standalone) EMS.
Prior to installing a Session Border Controller (SBC), which action would highlight a problem with inadequate customer network bandwidth?
A. Commission the SBC.
B. Register the SBC.
C. Network assessment (CIRS/NANO).
D. Provision the SBC.
What is the recommended interface for the Ethernet Management System (EMS) in a standalone or co-resident configuration?
A. A1
B. B1
C. B2
D. M1
In general, under which condition is an SBC alarm triggered?
A. System level failures
B. Any software process restart in SBC
C. Any hardware failure such as link down, disk usage, etc.
D. All high availability cases
Which type of information describes a SBC call trace?
A. Payload information: voice, video, or data
B. Signaling level information for a given URI
C. Application information (for example Wireshark, traceSM)
D. Network topology information
Which file is a manually created backup?
A. ...6.2.0.Qnn.zip
B. ...snapshot.zip
C. ...6.2.0.Qnn.xls
D. ...backup.zip
Where can you find details of SBC operational problems?
A. System Incidents
B. System Failures
C. Topology Hiding
D. System Platform
E. Server Configuration
Which configuration requires a separate (standalone) Element Management System (EMS)?
A. SBC is inside the DMZ
B. SBC is inside the enterprise core
C. High Availability
D. All SBCs, all configuration