Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1z0-404 Exam Dumps - Oracle Communications Session Border Controller 7 Basic Implementation Essentials

Go to page:
Question # 4

What is the first thing you should do when you want the Session Border Controller to detect that an endpoint is behind a NAT/firewall device?

A.

Navigate to the sip-port configuration element and set the nat-traversal parameter to disabled.

B.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to never.

C.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to always.

D.

Navigate to the sip-port configuration element and set the nat-traversal parameter to enabled.

E.

Navigate to the sip-interface configuration element and set the nat-traversal parameter to detect.

Full Access
Question # 5

In which two ways can you remove support for telnet from a media interface? (Choose two.)

A.

Navigate to the network-interface configuration element and run the delete-hip-ip command.

B.

Navigate to the phy-interface configuration element and run the remove-hip-ip command.

C.

Navigate to the network-interface configuration element and run the remove-telnet-ip command.

D.

Navigate to the network-interface configuration element and run the remove-hip-ip command.

E.

Navigate to the phy-interface configuration element and run the remove-telnet-ip command.

Full Access
Question # 6

When provisioning the redundancy-configuration, the peer name for each of the peers in a High Availability configuration must also be defined in each system’s ______________.

A.

hostname parameter under the sip-config configuration element

B.

hostname parameter under the account-config configuration element

C.

hostname parameter under the bootparam configuration branch

D.

target name parameter under the bootparam configuration branch

E.

hostname parameter under the system-config configuration element

Full Access
Question # 7

You finished configuring a not Real Time Change (not RTC)-supported configuration element and you want to apply the change in your service.

Which two options are valid in order to accomplish this? (Choose two.)

A.

From user mode, execute the save-config and activate-config commands.

B.

From configuration mode, execute the save-config, activate-config, and reboot commands.

C.

From superuser mode, execute the save-config and activate-config and reboot commands.

D.

From superuser mode, execute the save-config and activate-config commands.

E.

From superuser mode, execute the save-config, activate-config, and reboot force commands.

Full Access
Question # 8

Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.

How would you accomplish this?

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

B.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.

E.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.

Full Access
Go to page: