QUESTION 31
What is the Received Interfaced that is defined in Call Server Flow administration?
A. It is an external interface that rebroadcasts outbound traffic
B. It is an external interface that receives inbound traffic.
C. It is an internal interface that rebroadcasts outbound traffic.
D. It is an internal interface that receives inbound traffic.
Answer: D
QUESTION 32
What do Server Profiles define?
A. The connection and transport parameters from the SBC to the service provider and to the SAL gateway.
B. The connection and transport parameters from the SBC to the service provider and to the call
C. The signaling and media parameters f.om the SBC to the call server and to the NTP server
D. The signaling and media parameters from the SBC to the service provider and the call server
Answer: B
QUESTION 33
To which two entities does a Server Profile apply?
A. The Dell server and HP server
B. The trunk server and call server
C. The NTP server and DNS server
D. The call server and TFTP server
Answer: B
QUESTION 34
Which of the SBC administrative accounts has the least system access and privileges?
A. Supervisor
B. Admin
C. Manager
D. System
Answer: A
QUESTION 35
What call procedure ensures that the SBC is configured properly for SIP trunking?
A. Ensure that the trunk server and call server both provide dial tone.
B. Make an external-to-internal test call only.
C. Make an internal-to-external test call only.
D. Make both internal-to-external and external-to-internal test calls.
Answer: D
QUESTION 36
For Enterprise SBC customers integrated with Communication Manager or Communication Server 1000, which remote access connection model do they use?
A. SSL VPN
B. Secure Access Link (SAL)
C. Modem
D. No remote access / alarming
Answer: B
QUESTION 37
What are the three essential elements of a SIP trunk?
A. SIP service provider, SBC, call server (IP-PBX)
B. SBC, media gateway, call server (IP-PBX)
C. SIP service provider, SBC, media gateway
D. SBC, media gateway, trunk server
Answer: A
QUESTION 38
You have been asked to create and apply a Time of Day (ToD) domain policy to secure a SIP trunk. What is the correct order of the policy application sequence?
A. Packet examined, destination evaluated, ToD evaluated, policy applied
B. Packet examined, ToD evaluated, flow determined, policy applied
C. Packet examined, ToD evaluated, policy applied, routing applied
D. packet examined, flow determined, policy applied, ToD evaluated
Answer: B
QUESTION 39
Which statement describes the best practice regarding the security features for the Avaya SBC Remote Worker configuration?
A. Only signaling is fully encrypted.
B. Only media is fully encrypted.
C. Both signaling and media are fully encrypted.
D. Neither signaling nor media are fully encrypted.
Answer: C
QUESTION 40
To alter how the enterprise network appears to the outside world, which type of SBC administration will change the SIP message parameters?
A. Server Flow
B. Server Profile
C. Signaling Interfaces
D. Topology Hiding
Answer: D
…go to http://www.lead2pass.com/3107.html to download the full version Q&As.