Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-404 - Oracle Communications Session Border Controller 7 Basic Implementation Essentials

Page: 2 / 3
Total 70 questions

What does the Session Border Controller do when the Adaptive Hosted NAT (HNT) feature is enabled?

A.

It sends a periodic re-register command to each endpoint behind a NAT.

B.

It creates a binding for the Address of Record (AOR) of an endpoint that is behind a NAT.

C.

It creates a binding for the Address of Record (AOR) of an endpoint that is NOT behind a NAT.

D.

It sends SIP OPTIONS at increasing intervals to test if an endpoint behind a NAT device is still reachable.

E.

It sends ICMP PNGs to dynamically learn the binding time of an endpoint behind a NAT device.

You are configuring access rules in a Session Border Controller Peering architecture.

Which two configuration steps are required to allow access only from User Agents (UAs) in a specific IP subnet? (Choose two.)

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

B.

Navigate to the session-agent configuration element and set the ip-address parameter to the IP address of your trusted User Agent (UA).

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.

E.

Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agents (UAs).

How does the Session Border Controller ensure that a pinhole is kept open for persistent communication to a SIP endpoint behind a NAT device?

A.

by changing the expires= parameter to a defined value in 200 OK responses to REGISTERs

B.

by changing the expires= parameter to a defined value in 200 OK responses to INVITEs

C.

by issuing PINGs to the endpoint's NAT address

D.

by sending Address Resolution Protocol (ARP) requests at a defined frequency

E.

by sending messages at a defined frequency

The Session Border Controller needs to be configured to act as a Back-to-Back User Agent (B2BUA).

How would you accomplish this?

A.

Navigate to the sip-config configuration element and set the operation-mode to stateless.

B.

Navigate to the sip-config configuration element and set the operation-mode to dialog.

C.

Navigate to the sip-config configuration element and set the operation-mode to stateful.

D.

Navigate to the session-router configuration element and set the operation-mode to dialog.

E.

Navigate to the session-router configuration element and set the operation-mode to none.

Which configuration step is required to route a SIP call based on the value of the SIP INVITE Request-URI?

A.

Navigate to the policy-attribute configuration element and configure the from-address parameter to match the Request-URI value.

B.

Navigate to the policy-attribute configuration element and configure the to-address parameter to match the Request-URI value.

C.

Navigate to the local-policy configuration element and configure the from-address parameter to match the Request-URI value.

D.

Navigate to the local-policy configuration element and configure the to-address parameter to match the Request-URI value.

E.

Navigate to the local-policy configuration element and configure the destination-address parameter to match the Request-URI value.

Which two statements are true about SIP response code handling on the Session Border Controller? (Choose two.)

A.

The Session Border Controller will originate a 503 when there are no steering pool ports available.

B.

The Session Border Controller will originate a 403 response when bandwidth allocated to a realm has been exhausted.

C.

The Session Border Controller cannot originate 3xx class redirect responses.

D.

By default, the Session Border Controller will recurse on the 6xx messages.

E.

The Session Border Controller can transmit a different SIP response code than it received.

Which two statements are true about a realm on the Session Border Controller?

A.

It can only have one steering pool port per realm.

B.

It is a layer 3 abstraction of a VoIP network.

C.

It is a logical definition of a network or group of networks comprising devices that provide real-time communication.

D.

It is a layer 5 abstraction of a VoIP network.

E.

It is a collection of IP devices that perform IP routing functions.

You configured the Session Agent Group (SAG) element. You want the Session Agent to be selected in the order in which they are listed in the destination list, with each agent selected in turn, one per session.

How would you accomplish this?

A.

Navigate to the session-agent configuration element and set the strategy parameter to sequential.

B.

Navigate to the session-agent configuration element and set the strategy parameter to propdist.

C.

Navigate to the session-agent configuration element and set the strategy parameter to hunt.

D.

Navigate to the session-agent configuration element and set the strategy parameter to roundrobin.

E.

Navigate to the session-agent configuration element and set the strategy parameter to leastbusy.

What is the effect of executing the save-config command in superuser mode?

A.

The running configuration version is reset to 1.

B.

The running configuration version does not increase and is equal to the saved configuration version.

C.

The saved configuration version increases by 1 and is higher than the running configuration version.

D.

The running configuration version increases by 1 and is higher than the saved configuration version.

E.

The editing configuration version increases by 1 and is higher than the saved configuration version.

You need to configure the Session Border Controller to perform load balancing between two downstream SIP proxies.

Which option shows the configuration elements that you should configure for the load balancing feature?

A.

session-router and router-group

B.

realm-config and enum-group

C.

group-policy and load-policy

D.

proxy and proxy-pool

E.

local-policy and session-group