Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-404 Exam Dumps - Oracle Communications Session Border Controller 7 Basic Implementation Essentials

Question # 4

What is the first thing you should do when you want the Session Border Controller to detect that an endpoint is behind a NAT/firewall device?

A.

Navigate to the sip-port configuration element and set the nat-traversal parameter to disabled.

B.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to never.

C.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to always.

D.

Navigate to the sip-port configuration element and set the nat-traversal parameter to enabled.

E.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to detect.

Full Access
Question # 5

In which two ways can you remove support for telnet from a media interface? (Choose two.)

A.

Navigate to the network-interface configuration element and run the delete-hip-ip command.

B.

Navigate to the phy-interface configuration element and run the remove-hip-ip command.

C.

Navigate to the network-interface configuration element and run the remove-telnet-ip command.

D.

Navigate to the network-interface configuration element and run the remove-hip-ip command.

E.

Navigate to the phy-interface configuration element and run the remove-telnet-ip command.

Full Access
Question # 6

When provisioning the redundancy-configuration, the peer name for each of the peers in a High Availability configuration must also be defined in each system’s ______________.

A.

hostname parameter under the sip-config configuration element

B.

hostname parameter under the account-config configuration element

C.

hostname parameter under the bootparam configuration branch

D.

target name parameter under the bootparam configuration branch

E.

hostname parameter under the system-config configuration element

Full Access
Question # 7

You finished configuring a not Real Time Change (not RTC)-supported configuration element and you want to apply the change in your service.

Which two options are valid in order to accomplish this? (Choose two.)

A.

From user mode, execute the save-config and activate-config commands.

B.

From configuration mode, execute the save-config, activate-config, and reboot commands.

C.

From superuser mode, execute the save-config and activate-config and reboot commands.

D.

From superuser mode, execute the save-config and activate-config commands.

E.

From superuser mode, execute the save-config, activate-config, and reboot force commands.

Full Access
Question # 8

Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.

How would you accomplish this?

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

B.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.

E.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.

Full Access
Question # 9

Which statement is true about the Host In Path (HIP) feature In the Session Border Controller?

A) By default, the Session Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed via the management interfaces.

B) To enable these services (FTP ICMP, SNMP, and Telnet services), the enable host-in-path command must be executed from the superuser mode.

C) To enable these services, the Session Border Controller includes a software license that enables administrative traffic over the media interfaces.

D) By default, the Session Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed via the media interfaces.

E) These four fields (FTP, ICMP, SNMP, and Telnet services) are collectively known as the Host Interface Priority.

Full Access
Question # 10

Which two statements are true about realm bridging in the Session Border Controller? (Choose two.)

A.

The realm-config configuration element provides G.711 to G.729 transcoding functions.

B.

You can configure more than one SIP port per realm.

C.

You can only configure a single SIP port per realm.

D.

The ingress realm and egress realm for a specific SIP session can be the same.

E.

The ingress realm is always different than the egress realm for a specific SIP session.

Full Access