Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are configuring access rules in a Session Border Controller Peering architecture.

Which two configuration steps are required to allow access only from User Agents (UAs) in a specific IP subnet? (Choose two.)

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

B.

Navigate to the session-agent configuration element and set the ip-address parameter to the IP address of your trusted User Agent (UA).

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.

E.

Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agents (UAs).

What two problems do Network Address Translations (NATs) introduce into VoIP networks? (Choose two.)

A.

There are no major concerns with NATs.

B.

NATs block unsolicited incoming signaling and media.

C.

NATs block unsolicited incoming signaling but allow incoming media.

D.

NATs pinholes expire after a configurable time.

E.

NATs devices can be overloaded by incoming registrations.

Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.

How would you accomplish this?

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

B.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.

E.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.

What configuration step is required for booting the Session Border Controller from an external FTP server?

A.

Navigate to the bootparams configuration branch and set the host inet field to the IP address of the external BOOTP Server from which the Session Border Controller can boot.

B.

Navigate to the system configuration branch and set the ip address field of the wancom1 management interface.

C.

Navigate to the bootparams configuration branch and set the ip address field of the destination SIP device with which the Session Border Controller needs to interact.

D.

Navigate to the system configuration branch and set the ip address field of the wancom0 management interface.

E.

Navigate to the bootparams configuration branch, set the host inet or Host IP, FTP username, and FTP password for the external FTP Server in which the image file resides.

To ensure proper operation of a Session Border Controller High Availability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.

How is this type of traffic accommodated?

A.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the management interfaces

B.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the media interfaces

C.

by setting the utility address and sec-gateway values to addresses in different subnets as the IP address configured on the wancom interfaces

D.

by setting a unique address on the wancoml and wancom2 interfaces via the utility address command

E.

via the utility address parameters on the wancoml and wancom2 interfaces

What is the first thing you must do when setting up the boot parameters of the Session Border Controller?

A.

reset the system clock

B.

know the superuser mode password and access the configuration mode

C.

disable FTP access to the wancom0 management interface

D.

obtain the bootparam license

E.

verify the configuration by executing the verify-config command

You used the no command to delete a configuration element.

Which statement is true?

A.

The deletion is lost on immediate reboot.

B.

The deletion is reflected when viewing the running configuration.

C.

The deletion takes effect immediately in the saved configuration.

D.

The deletion always requires a reboot to take effect.

E.

The deletion requires auto-save enabled.

Which statement is true when SNMP access is enabled to the Session Border Controller?

A.

The default community strings are acme and packet.

B.

The default community strings are public and private.

C.

Community strings are in passive mode.

D.

There are no default community strings.

E.

Only one trap receiver can be configured.

You are logged in to the Session Border Controller a superuser. You want to remove other user from the system.

How do you accomplish this?

A.

from the superuser mode, by executing the remove user command

B.

from the user mode, by executing the kill command

C.

from the superuser mode, by executing the remove user command

D.

from the superuser mode, by executing the kill command

E.

from the user mode, by executing the remove user command

Your Session Border Controller is configured as the source and destination for all signaling messages and media streams coming into and leaving the provider’s network.

Which two SIP functions does it provide? (Choose two.)

A.

an IP edge router

B.

Back-to-Back User Agent (B2BUA)

C.

Edge proxy

D.

Data firewall

E.

Media gateway