1Z0-404 Exam - Oracle Communications Session Border Controller 7 Basic Implementation Essentials

certleader.com

It is more faster and easier to pass the Oracle 1Z0-404 exam by using Downloadable Oracle Oracle Communications Session Border Controller 7 Basic Implementation Essentials questuins and answers. Immediate access to the Update 1Z0-404 Exam and find the same core area 1Z0-404 questions with professionally verified answers, then PASS your exam with a high score now.

NEW QUESTION 1
CORRECT TEXT
Which statement is true about the Host In Path (HIP) feature In the Session Border Controller?

  • A. By default, theSession Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed via the management interfaces.
  • B. To enable these services (FTP ICMP, SNMP, and Telnet services), the enable host-in-path command must be executed from the superuser mode.
  • C. To enable these services, the Session Border Controller includes a software license that enables administrative traffic over the media interfaces.
  • D. By default, the Session Border Controller's FTP, ICMP, SNMP, and Telnet services cannot be accessed viathe media interfaces.
  • E. These four fields (FTP, ICMP, SNMP, and Telnet services) are collectively known as the Host Interface Priority.

Answer: A

Explanation:
Reference https://docs.oracle.com/cd/E52358_01/doc/sbc_scx620_acliconfiguration.pdf

NEW QUESTION 2
You are logged in to the Session Border Controller a superuser. You want to remove other user from the system.
How do you accomplish this?

  • A. from the superuser mode, by executing the remove user <index number> command
  • B. from the user mode, by executing the kill <index number> command
  • C. from the superuser mode, by executing the remove user <username> command
  • D. from the superuser mode, by executing the kill <index number> command
  • E. from the user mode, by executing the remove user <index number> command

Answer: C

NEW QUESTION 3
You are adding peers to a Policy-Based Realm Bridging (PBRB) configuration. Which two configuration steps, among others, are required? (Choose two.)

  • A. Navigate to the media-manager configuration branch and configure the realm-config configuration element.
  • B. Navigate to the session-router configuration branch and configure the sipd-address configuration element.
  • C. Navigate to the session-router configuration branch and configure the local-policy configuration element.
  • D. Navigate to the session-router configuration branch and configure the sip-nat configuration element.
  • E. Navigate to the media-manager configuration branch and configure the access-control configuration element.

Answer: AE

NEW QUESTION 4
The Session Border Controller ACLI is structured in a way that separates configuration of layers 3,4, and 5. This allows the system administrator to link each configuration together as needed for signaling and media routing purposes.
Which two options are valid to link signaling and media interfaces to a realm? (Choose two.)

  • A. Navigate to the iwf-config configuration element and set the media-interface-id parameter to the realm name.
  • B. Navigate to the account-config configuration element and set the realm-id parameter to the realm name.
  • C. Navigate to the network-interface configuration element and set the sip-interface-id parameter to the realm name.
  • D. Navigate to the steering-pool configuration element and set the realm-id parameter to the realm name.
  • E. Navigate to the sip-interface configuration element and set the realm-id parameter to the realm name.

Answer: AB

NEW QUESTION 5
You used the no command to delete a configuration element. Whichstatement is true?

  • A. The deletion is lost on immediate reboot.
  • B. The deletion is reflected when viewing the running configuration.
  • C. The deletion takes effect immediately in the saved configuration.
  • D. The deletion always requires a reboot to take effect.
  • E. The deletion requires auto-save enabled.

Answer: A

NEW QUESTION 6
You are troubleshooting a SIP routing issue and you haveaccess to the SIP call ow processed by the Session Border Controller.
Which two steps are valid for troubleshooting this type of issues? (Choose two.)

  • A. It is necessary to locate the SIP session to troubleshoot and check if there is a 404 Routes Not Found SIP error message.
  • B. It is recommended to look for 183 Session Progress SIP error messages that indicate routing issues.
  • C. It is recommended to check the called number by looking at the Request-URI of the INVITE message and making sure it is a validnumber to be routed.
  • D. It is recommended to find the CANCEL method received by the Session Border Controller which typically identifies a SIP routing issue.
  • E. It is necessary to find an initial INVITE received by the Session Border Controller which getsa 503 Service Unavailable SIP error message.

Answer: BE

NEW QUESTION 7
You are configuring access rules in a Session Border Controller Peering architecture. Which configuration step is required to allow access from any User Agent (UA)?

  • A. Navigate to thesip-port configuration element and set the allow-anonymous parameter to all.
  • B. Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).
  • C. Navigate to the sip-port configurationelement and set the allow-anonymous parameter to address-prefix.
  • D. Navigate to the session-agent configuration element and set the ip-address parameterto the IP subnet of your trusted User Agent (UA).
  • E. Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

Answer: A

NEW QUESTION 8
Which two statements are true about realm bridging in the Session Border Controller? (Choose two.)

  • A. Therealm-config configuration element provides G.711 to G.729 transcoding functions.
  • B. You can configure more than one SIP port per realm.
  • C. You can only configure a single SIP port per realm.
  • D. The ingress realm and egress realm for a specific SIP session can be the same.
  • E. The ingress realm is always different than the egress realm for a specific SIP session.

Answer: BD

NEW QUESTION 9
Which two statements are true about dynamic realm bridging? (Choose two.)

  • A. Egressrealm can be any, depending on time-of-day, called number, and so on.
  • B. Dynamic realm bridging is the routing of a signaling message coming from a given ingress realm to a next hop in an egress realm.
  • C. Dynamic realm bridging is a one-to-one associationaccomplished by using SIP-NAT.
  • D. Ingress and egress realms are unconditionally paired.
  • E. Dynamic realm bridging decisions are based solely on layer 3 (IP) information.

Answer: AB

NEW QUESTION 10
Which configuration step is correct for a phy-interface configuration element used for signaling and/or media?

  • A. A phy-interface elementmust be configured for each interface used for High Availability(HA) heartbeats, but not for signaling and/or media.
  • B. After configuring a phy-interface configuration element for signaling and/or media, a reboot of the Session Border Controller is required.
  • C. A phy-interface configuration element must be configured for each interface used.
  • D. A unique phy-interface configuration element is created for all signaling/media interfaces.
  • E. A phy-interface configuration element for signaling and/or media hasthe operation-type parameter set to control.

Answer: B

NEW QUESTION 11
Which two statements describe the functions of Session Border Controllers? (Choose two.)

  • A. they replace typical edge routers and firewalls in order to provide a unified network border forsignaling and media control
  • B. they are session-aware devices that enable control of end-to-end interactive communications across IP network borders
  • C. they are based on the Windows operating system
  • D. they provide routing functions for IP, TCP, and SMTPusing application parameters
  • E. they provide signaling proxy functions for SIP, H.323, and MGCP, which includes access control, signaling constraints, and topology hiding

Answer: AE

NEW QUESTION 12
You are configuring the boot parameters in the Session Border Controller. Which three statements are true about the boot parameters? (Choose three.)

  • A. A reboot is always required to apply any change to the boot parameters.
  • B. The target name is usedfor domain name resolution.
  • C. The system clock is a boot parameter.
  • D. The boot parameters are stored in Non-Volatile Random Access Memory (NVRAM).
  • E. The boot parameters are not affected by the activate-config command.

Answer: ACD

NEW QUESTION 13
Which configuration step is required to route a SIP callbased on the value of the SIP INVITE Request-URI?

  • A. Navigate to the policy-attribute configuration element and configure the from-address parameter to match the Request-URI value.
  • B. Navigate to the policy-attribute configuration element and configure the to-address parameter to match the Request-URI value.
  • C. Navigate to the local-policy configuration element and configure the from-address parameter to match the Request-URI value.
  • D. Navigate to the local-policy configuration element and configure the to-address parameter to match the Request-URI value.
  • E. Navigate to the local-policy configuration element and configure the destination-address parameter to match the Request-URI value.

Answer: C

NEW QUESTION 14
You made a configuration change to a media interface.
Which command must be executed to commit the change to volatile (RAM) memory?

  • A. From configuration mode, execute the done command.
  • B. From superuser mode, execute the write-config command.
  • C. From user mode, execute the save-config command.
  • D. From user mode, execute the commit-config command.
  • E. From superuser mode, execute the save-config command.

Answer: A

Explanation:
Reference http://www.oracle.com/webfolder/technetwork/acmepacket/Additional%20Technical%20Sol ution%20Documentation/SFB%20video%20ESBC.pdf

NEW QUESTION 15
What is the first thing you should do when you want the Session Border Controller to detect that anendpoint is behind a NAT/firewall device?

  • A. Navigate to the sip-port configuration element and set the nat-traversal parameter to disabled.
  • B. Navigate to the sip-interface configuration element and set the nat-traversal parameter to never.
  • C. Navigate to the sip-interface configuration element and set the nat-traversal parameter to always.
  • D. Navigate to the sip-port configuration element and set the nat-traversal parameter to enabled.
  • E. Navigate to the sip-interface configuration element and set the nat-traversal parameter to detect.

Answer: C

NEW QUESTION 16
After configuring Header Manipulation Rules (HMRs) for topology hiding, your subsequent testing shows that the manipulation is not takingeffect.
Identify two causes for this (Choose two.)

  • A. You have not configured the out-manipulationid parameter of the sip-interface configuration element.
  • B. You have not enabled policy-based realm-bridging.
  • C. The value of the name parameter in the header-rule configuration element is different than the value of the out-manipulationid parameter in the sip-interface configuration element.
  • D. The value of the match-val-type parameter is not written correctly.
  • E. The home-proxy-address value does not matchthe $LOCAL_IP value in the new-value parameter.

Answer: AE

NEW QUESTION 17
Which three statements are true about SIP, per RFC 326? (Choose three.)

  • A. SIP does not provide for resource reservation.
  • B. SIP defines native methods for negotiating media streams.
  • C. A SIP transaction occurs between a client and a server.
  • D. To set up a voice session, SIP relies on protocols such as SDP and RTP.
  • E. SIP signaling can only be used for voice over IP thereby limiting its use as a general signaling protocol.

Answer: CDE

NEW QUESTION 18
Which three options are valid ways to apply Header Manipulation Rules (HMRs) to your existing configuration?

  • A. Navigate to the network-interface configuration element and configure the in- manipulationid parameter.
  • B. Navigate to the session-agent configuration element and configure the in-manipulationid parameter.
  • C. Navigate to the sip-interface configuration element and configure the in-manipulationid parameter.
  • D. Navigate to the session-agent configuration element and configure the in-manipulationid parameter.
  • E. Navigate to the session-group configuration element and configure the in-manipulationid parameter.

Answer: ABC

NEW QUESTION 19
Your Session Border Controller is configured as the source and destination for all signaling messages and media streams coming into and leaving the provider’s network.
Which two SIP functions does it provide? (Choose two.)

  • A. an IP edge router
  • B. Back-to-Back User Agent (B2BUA)
  • C. Edge proxy
  • D. Data firewall
  • E. Media gateway

Answer: BD

NEW QUESTION 20
What do you need to do to support ftp service on a media interface?

  • A. Add the IP address of the remote device to the hip-ip-list and ftp-address parameters.
  • B. Set the ftp-address parameter to enabled.
  • C. Add the IP address of the interface in the hip-ip-list and ftp-address parameters.
  • D. Set the hip-address parameter to enabled.
  • E. Add the IP address of the interface in the hip-ip-list and telnet-address parameters.

Answer: B

NEW QUESTION 21
What mechanism isused to ensure adjacent devices can redirect their Ethernet traffic to the Session Border Controller that takes over, when a Session Border Controllers fails over?

  • A. Gratuitous ARP
  • B. Reverse ARP
  • C. Proxy ARP
  • D. HSRP
  • E. BOOTP

Answer: B

NEW QUESTION 22
To ensure proper operation of a Session Border Controller HighAvailability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.
How is this type of traffic accommodated?

  • A. by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the management interfaces
  • B. by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses inthe same subnet as the IP address configured on the media interfaces
  • C. by setting the utility address and sec-gateway values to addresses in different subnets as the IP address configured on the wancom interfaces
  • D. by setting a unique address on the wancoml and wancom2 interfaces via the utilityaddress command
  • E. via the utility address parameters on the wancoml and wancom2 interfaces

Answer: A

NEW QUESTION 23
What is thedrawback of configuring Policy-Based Realm Bridging (PBRB) without the assistance of Header Manipulation Rules (HMRs)?

  • A. Topology hiding is incomplete.
  • B. The configuration requires a home realm to be defined, which can make privacy harder to achieve.
  • C. The configuration requires you to enable SIP-NAT bridging, which is complex.
  • D. The architecture is simple, and really designed for lab environments.
  • E. The performance is poor relative to other models.

Answer: C

NEW QUESTION 24
What is the effect of executing the save-config command in superuser mode?

  • A. The running configuration version is reset to 1.
  • B. The running configuration version does not increase and is equal to thesaved configuration version.
  • C. The saved configuration version increases by 1 and is higher than the running configuration version.
  • D. The running configuration version increases by 1 and is higher than the saved configuration version.
  • E. The editing configuration version increases by 1 and is higher than the saved configuration version.

Answer: C

NEW QUESTION 25
You are configuring a sip-interface configuration element. You encounter the error message: Error 409 saving configuration SipInterface.
Identify the cause of the error.

  • A. You are creating a sip-port element with the same address parameter value of another sip-port.
  • B. You are creating a sip-port element with the same port parameter value of another sip- port.
  • C. You are creating a sip-port element with the same transport-protocol parameter value of another sip-port.
  • D. You are creating a sip-interface element with the same realm-id parameter value of another sip-interface.
  • E. You are creating a sip-interface element with a different realm-id parameter value of another sip-interface.

Answer: B

NEW QUESTION 26
......

P.S. Easily pass 1Z0-404 Exam with 70 Q&As Certstest Dumps & pdf Version, Welcome to Download the Newest Certstest 1Z0-404 Dumps: https://www.certstest.com/dumps/1Z0-404/ (70 New Questions)