1z0-404
Free trial
Verified
Question 1
What configuration step is required for booting the Session Border Controller from an external FTP server?
- A: Navigate to the bootparams configuration branch and set the host inet field to the IP address of the external BOOTP Server from which the Session Border Controller can boot.
- B: Navigate to the system configuration branch and set the ip address field of the wancom1 management interface.
- C: Navigate to the bootparams configuration branch and set the ip address field of the destination SIP device with which the Session Border Controller needs to interact.
- D: Navigate to the system configuration branch and set the ip address field of the wancom0 management interface.
- E: Navigate to the bootparams configuration branch, set the host inet or Host IP, FTP username, and FTP password for the external FTP Server in
Question 2
You are configuring access rules in a Session Border Controller Peering architecture.
Which two configuration steps are required to allow access only from User Agents (UAs) configured as session agents? (Choose two.)
- A: Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.
- B: Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).
- C: Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).
- D: Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.
- E: Navigate to the sip-port configuration element and set the allow-anonymous parameter to address-prefix.
Question 3
When setting up the registration-caching parameter to enabled in the sip-interface configuration element, _____________.
- A: the Session Border Controller will never use the SIP-NAT mechanism for routing
- B: the Session Border Controller will not use the registration cache for routing
- C: all endpoints in the realm will be cached when registered
- D: only endpoints behind NAT in the realm will be cached when registered
- E: the Session Border Controller will never use the local-policy mechanism for routing
Question 4
What is the effect of executing the save-config command in superuser mode?
- A: The running configuration version is reset to 1.
- B: The running configuration version does not increase and is equal to the saved configuration version.
- C: The saved configuration version increases by 1 and is higher than the running configuration version.
- D: The running configuration version increases by 1 and is higher than the saved configuration version.
- E: The editing configuration version increases by 1 and is higher than the saved configuration version.
Question 5
You are configuring a network interface to enable the Session Border Controller to use the interface for signaling and media.
Identify two valid configuration steps for supporting VLAN 12 (Choose two.)
- A: Navigate to the network-interface configuration element and set the sub-port-id parameter to 12.
- B: Navigate to the network-interface configuration element and set the sub-port-id parameter to 0.
- C: Navigate to the phy-interface configuration element and configure the hip-id parameter.
- D: Navigate to the phy-interface configuration element and configure the pri-utility-address parameter.
- E: Navigate to the network-interface configuration element and configure the name parameter.
Question 6
You are examining a SIP packet. There is no final response to the ACK method.
What is the reason for this?
- A: The ACK method was defined only in RFC 2543 and it has been deprecated.
- B: The ACK method is part of the INVITE transaction.
- C: The ACK method is an exception in RFC 3261.
- D: The ACK method is an optional SIP method.
- E: The ACK method was replaced with the CANCEL method in RFC 3261.
Question 7
View the Exhibit.
Which statement is true about this output of the show health command?
- A: The two nodes have different health scores.
- B: The training1 peer is the standby node.
- C: The switchover berpd force command was executed to do a manual failover.
- D: The training6 peer is the active node.
- E: The training6 peer will wait 1050 ms before considering the training1 peer out of service.
Question 8
Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.
How would you accomplish this?
- A: Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.
- B: Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.
- C: Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.
- D: Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.
- E: Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.
Question 9
From which Session Border Controller node in a high availability (HA) pair, could a network administrator trigger a system switchover manually by issuing the notify berpd force command?
- A: Secondary only
- B: Active node that no longer has a heartbeat
- C: Standby only
- D: Active only
- E: Standby or Active
Question 10
Examine the output below from the show sipd invite command:
How many 600 Busy Everywhere messages sent by the Session Border Controller in the last 140 seconds did not originate from a downstream device?
- A: 157
- B: 13
- C: 4
- D: 161
- E: 0
Question 11
You are configuring access rules in a Session Border Controller Peering architecture.
Which configuration step is required to allow access from any User Agent (UA)?
- A: Navigate to the sip-port configuration element and set the allow-anonymous parameter to all.
- B: Navigate to the realm-config configuration element and set the addr-prefix parameter to the IP subnet of your trusted User Agent (UA).
- C: Navigate to the sip-port configuration element and set the allow-anonymous parameter to address-prefix.
- D: Navigate to the session-agent configuration element and set the ip-address parameter to the IP subnet of your trusted User Agent (UA).
- E: Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.
Question 12
Which statement is true when SNMP access is enabled to the Session Border Controller?
- A: The default community strings are acme and packet.
- B: The default community strings are public and private.
- C: Community strings are in passive mode.
- D: There are no default community strings.
- E: Only one trap receiver can be configured.
Question 13
Which configuration step is required to route a SIP call based on the value of the SIP INVITE Request-URI?
- A: Navigate to the policy-attribute configuration element and configure the from-address parameter to match the Request-URI value.
- B: Navigate to the policy-attribute configuration element and configure the to-address parameter to match the Request-URI value.
- C: Navigate to the local-policy configuration element and configure the from-address parameter to match the Request-URI value.
- D: Navigate to the local-policy configuration element and configure the to-address parameter to match the Request-URI value.
- E: Navigate to the local-policy configuration element and configure the destination-address parameter to match the Request-URI value.
That’s the end of your free questions
You’ve reached the preview limit for 1z0-404Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!