You used the no command to delete a configuration element.
Whichstatement is true?
A. The deletion is lost on immediate reboot.
B. The deletion is reflected when viewing the running configuration.
C. The deletion takes effect immediately in the saved configuration.
D. The deletion always requires a reboot to take effect.
E. The deletion requires auto-save enabled.
Upon issuing the done command, you getan Error 409.
Which two options explain this error? (Choose two.)
A. You are trying to create an element with a unique identifier that already exists.
B. The configuration element you are creating is corrupted.
C. The element you are trying to save doesnot exist.
D. There is an internal server error.
E. You are trying to create a second instance of a single-instance configuration element.
Which statement is true when SNMP access is enabled to the Session Border Controller?
A. The default community strings are acme and packet.
B. The default community stringsare public and private.
C. Community strings are in passive mode.
D. There are no default community strings.
E. Only one trap receiver can be configured.
What should you do to enable physical interface redundancy?
A. Navigate to the system-config configuration element and set the phy-redundancy parameter to enabled.
B. Navigate to the network-interface configuration element and set thephy-redundancy parameter to enabled.
C. Navigate to the network-interface configuration element and set the link-redundancy- state parameter to enabled.
D. Navigate to the system-config configuration element and set the link-redundancy-state parameter toenabled.
E. Run the superuser command enable phy-redundancy.
Which action triggers the 180 Ringing response in a User Agent Client (UAC)?
A. the subscription to a SIP presence service
B. the generation of a remote ring-back tone
C. the generation of a local ring-back tone
D. the establishment of a SIP session
E. the termination of a SIP session
You wantto configure the maximum duration in seconds of any session in the Session Border Controller.
How would you accomplish this?
A. Navigate to the media-manager configuration element and configure the max-signaling- bandwidth parameter.
B. Navigate to the media-manager configuration element and configure the flow-time-limit parameter.
C. Navigate to the sip-config configuration element and configure the operation-mode parameter.
D. Navigate to the sip-config configuration element and configure theflow-time-limit parameter.
E. Navigate to the media-manager configuration element and configure the latching parameter.
What configuration step is required for booting the SessionBorder Controller from an external FTP server?
A. Navigate to the bootparams configuration branch and set the host inet field to the IP address of the external BOOTP Server from which the Session Border Controller can boot.
B. Navigate to the system configuration branch and set the ip address field of the wancom1 management interface.
C. Navigate to the bootparams configuration branch and set the ip address field of the destination SIP device with which the Session Border Controller needs to interact.
D. Navigate to the system configuration branch and set the ip address field of the wancom0 management interface.
E. Navigate to the bootparams configuration branch, set the host inet or Host IP, FTP username, and FTP password for the external FTP Server in which the image file resides.
The Session Border Controller is not routing calls to a specific SIP endpoint from the backbone realm to the access realm in an Access-Backbone architecture.
How can you troubleshoot this routing issue?
A. by running the notify berpd force command
B. by running the show sipd endpoint-ip
C. by checking the sip-manipulation configuration element used for routing from the backbone realm to the access realm
D. by checking the registration-cache configuration element used for routing from the access realm to the backbone realm
E. by checking the local-policy configuration element used for routing from the access realm to the backbone realm
Which statement is true about Session Border Controller architectures andrealm bridging?
A. The Hosted NAT Traversal (HNT) architecture focuses on the border point between two different service provider networks, both in the home realm.
B. The Hosted IP architecture focuses on the border point between one enterprise network realm and one service provider network realm.
C. The Access-backbone architecture focuses on the border point between two backbone realms.
D. The Peering architecture focuses on the border point between two different service provider networks and theirrealms.
E. The Gateway architecture Focuses on the border point between one enterprise network realm and one service provider network realm.
You were working with the Session Border Controller in configuration mode and you forgot toclose your session. Your colleague who connected after you left says that he cannot enter into configuration mode.
Why is your colleague not able to configure the Session Border Controller?
A. The Session Border Controller does not allow more than one configuration session within 24 hours.
B. The Session Border Controller does not support Telnet/SSH timeouts.
C. The Session Border Controller supports only one simultaneous configuration session, and the Telnet/ SSH timeouts are set to 0.
D. The Session Border Controller supports only 10 simultaneous configuration sessions.
E. The Session Border Controller supports only five simultaneous Telnet/SSH sessions.