CT0-101 Convergence+ Certification Practice Exam Set 1

An instant messaging client that receives presence information from a presence service is called

a/an:



Options are :

  • Presentity.
  • Watcher.
  • Status Service.
  • User Agent Client.

Answer : Watcher.

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 5

According to ITU-T, which of the following is the target one-way delay for an acceptable voice

conversation?



Options are :

  • 50ms
  • 150ms
  • 250ms
  • 80ms

Answer : 150ms

The first message in SIP call setup is typically:



Options are :

  • AUTHENTICATE
  • REGISTER
  • RINGING
  • INVITE

Answer : INVITE

Which of the following elements of the SIP protocol defines the media type to be established?



Options are :

  • URI
  • Session Detail Record
  • INVITE
  • Session Description Protocol

Answer : Session Description Protocol

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 2

Which of the following encoding methods transmits consecutive ones over a T1/E1 having the opposite polarity in order to maintain the density? 


Options are :

  • ESF
  • Robbed-bit
  • B8ZS
  • AMI

Answer : AMI

Which of the following standards provide buddy list capabilities? (Select TWO)

A. Session Description Protocol (SDP)

B. T.120

C. Extensible Markup Language Instant Messaging Standard (EMLIMS)

D. SIP for Presence and Instant Messaging Leveraging Extensions (SIMPLE)

E. H. 323

F. Extensible Messaging and Presence Protocol (XMPP)



Options are :

  • C,D
  • A,B
  • E,F
  • D,F

Answer : D,F

Which of the following BEST describes the IEEE 802.3af end-span technique, when considering

an IP telephony solution is implemented in an existing network infrastructure?



Options are :

  • The end-span solution is significantly less expensive than the site-span solution.
  • The end-span technique provides power over pairs 4/5 and 7/8.
  • This technique works well for existing network infrastructures because there is no replacement of equipment necessary.
  • Ethernet switches are replaced with alternate devices that use current delivered over pairs 1/2 and 3/6.

Answer : Ethernet switches are replaced with alternate devices that use current delivered over pairs 1/2 and 3/6.

CompTIA A+ (220-1001) Test Prep, Exams and Simulations Set 3

A company plans to deploy 350 IP phones on two floors within a building. Both floors are served

by the same LAN switch. Which of the following IP subnet masks should the company use to

optimize the use of IP addresses?



Options are :

  • 23-bit mask
  • 25-bit mask
  • 24-bit mask
  • 22-bit mask

Answer : 23-bit mask

Reviewing the VoIP system call logs shows that after working hours several local number calls

enter the system and are then forwarded to long distance numbers. Which of the following is this

MOST likely an indication of?


Options are :

  • User extension set for Do Not Disturb (DND)
  • Toll fraud
  • Send All Calls
  • Call forward to the answering service

Answer : Toll fraud

Which of the following items are used to determine the network capacity needed for a 50 user

VoIP

installation?



Options are :

  • Maximum number of concurrent voice calls, Codec, User Datagram Protocol (UDP)/ Layer 2 overhead
  • Maximum number of concurrent voice calls, Codec, Jitter buffer
  • Maximum number of concurrent voice calls Codec, Latency
  • Maximum number of concurrent voice calls, Framing, Latency

Answer : Maximum number of concurrent voice calls, Codec, User Datagram Protocol (UDP)/ Layer 2 overhead

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 3

A company plans to deploy softphones to their telecommuters, so the telecommuters can connect

to their IP PBX through a VPN. There is concern about the number of User Datagram Protocol

(UDP) ports that the VoIP standards open by default for audio. Which of the following should the

company consider to limit their risk of wide open ports in the firewall? (Select TWO)

A. Encrypt the signaling and audio packets.

B. Deploy a new VPN concentrator.

C. Configure Access Control Lists.

D. Deploy a Session Border Controller (SBC).

E. Configure the IP-PBX to use a smaller range of UDP ports.



Options are :

  • A,B
  • B,C
  • C,D
  • D,E

Answer : D,E

Which of the following codecs would be MOST bandwidth efficient when implementing a VoIP

solution for 50 users over a low speed WAN link to a remote office?



Options are :

  • G. 722
  • G. 711
  • G. 729
  • G. 726

Answer : G. 729

A user tries to login with their extension number to their new IP Telephone. The registration

process failed and the telephone prompts the user with an error message. Which of the following

could be the MOST probable reason for this registration failure?



Options are :

  • The IP Telephone is configured with the wrong 802.1p and DiffServ QoS settings for RTP.
  • The DHCP server has not assigned the current IP address of the IP telephone to the gatekeeper.
  • The gatekeeper rejected the registration request, because the central Public Switched Telephone Network (PSTN) gateway is not in service.
  • The IP telephone has received the wrong gatekeeper IP address provided from the DHCP options.
  • The IP Telephone has negotiated the wrong 802.3af power class with the access switch.

Answer : The IP telephone has received the wrong gatekeeper IP address provided from the DHCP options.

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 3

A technician has been noticing a large amount of network traffic interruptions during broadcasting

that is outside the normalized data stream. It is suspected that the company is being scanned for

other open ports during transmission. Which of the following items would help in determining if

they are being attacked in this method?



Options are :

  • Intrusion Detection System (IDS)
  • Proxy Server
  • Protocol Analyzer
  • Protocol Scanner

Answer : Intrusion Detection System (IDS)

Which of the following does SIP personal mobility allow a user to do?



Options are :

  • The user can be located on any device they may have, on any network.
  • The user can switch between devices while maintaining a session.
  • The user can change the location, the device, and the access network and still keep all their services.
  • The mobile device can move between points of attachment of the same network.

Answer : The user can be located on any device they may have, on any network.

Which of the following is required in a SIP softphone deployment?



Options are :

  • Redirect server
  • User Agent
  • Registrar
  • Proxy server

Answer : User Agent

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 5

Which of the following is a benefit of the 802.11a WLAN standard?



Options are :

  • It is an IETF standard and is broadly supported by manufacturers.
  • It is out of the frequency range normally used by cordless telephones, microwave ovens, and other appliances.
  • It is in a spectrum that is licensed worldwide and has no interference.
  • It is backwards compatible to existing 802.11b WLAN equipment.

Answer : It is out of the frequency range normally used by cordless telephones, microwave ovens, and other appliances.

How many classes are defined in the Power over Ethernet (PoE) standard?



Options are :

  • 6
  • 2
  • 4
  • 5

Answer : 4

A distributor that has an early version of VoIP and IP-PBX discovered that they had lost all voice

services during a worm/virus attack on its IP network. Which of the following steps might this

distributor take to avoid such an outage in the future? (Select THREE)

A. Filter traffic to allow only voice traffic on voice VLANs.

B. Utilize VPN for all voice traffic.

C. Install a proxy server on the network.

D. Use encryption for all voice traffic.

E. Segment all the voice devices onto a separate VLAN.

F. Ensure that the IP-PBX has the latest patches.



Options are :

  • C,D,E
  • A,B,C
  • A,E,F
  • A,D,E

Answer : A,E,F

CT0-101 Convergence+ Certification Practice Exam Set 8

Which of the following is true for a mid-span IEEE 802.3af Power over Ethernet (PoE) solution?

(Select TWO)

A. The mid-span solution provides power over pairs 4/5 and 7/8 on the RJ-45 jacks.

B. The mid-span solution provides power over pairs 1/2 and 4/5 on the RJ-45 jacks.

C. The mid-span solution requires network infrastructure hardware replacement.

D. The mid-span solution does not require network infrastructure hardware replacement.



Options are :

  • B,C
  • C,D
  • D,A
  • A,B

Answer : D,A

A network administrator uses Network Address Translation (NAT) to allow domain users internet

access via a single IP address. The administrator has found that Trojan horses are being allowed

into the network through peer-to-peer (P2P) services that are allowed through open firewall port

ranges. Which of the following components should be installed FIRST to help limit this type of

reverse attack method?



Options are :

  • Proxy Filter
  • NAT Filter
  • Port redirect
  • Layer 2 Switch

Answer : Proxy Filter

Voice quality issues are reported between two remote sites that are connected via an IPSec VPN.

The technician believes that the service provider network may be the cause of voice quality

issues, and asks the service provider for packet loss, jitter, and delay statistics of the voice calls.

Which of the following makes it impossible for the service provider to meet this request?



Options are :

  • End-to-end packet loss, jitter, and delay statistics are gathered as part of the RTCP packets between endpoints.
  • End-to-end packet loss, jitter, and delay statistics are gathered as part of the Real Time Control Protocol (RTCP) packets between routers.
  • End-to-end packet loss, jitter, and delay statistics are gathered as part of the SNMP packets between routers.
  • End-to-end packet loss, jitter, and delay statistics are gathered as part of the SNMP packets between endpoints.

Answer : End-to-end packet loss, jitter, and delay statistics are gathered as part of the RTCP packets between endpoints.

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 6

A user who is traveling forgets to bring their laptop but does have access to a phone. Which of the

following technologies might enable the user to access their e-mail using a phone?



Options are :

  • T.120 Protocol
  • Text-to-Speech (TTS)
  • HTML to XML Converter
  • Text-over-IP

Answer : Text-to-Speech (TTS)

Which of the following requests are needed to enable presence status with SIP?



Options are :

  • Send and Receive
  • Subscribe and Notify
  • Notify and Remind
  • Listen and Respond

Answer : Subscribe and Notify

At which of the following locations would an external Channel Service Unit (CSU) be installed? 


Options are :

  • Between the VoIP system Public Switched Telephone Network (PSTN) module and the PSTN circuits
  • Between the VoIP system and any LAN based voicemail system for call recording
  • Between the VoIP VLAN and the Data VLAN to increase security
  • Between the VoIP system and the LAN network switch port

Answer : Between the VoIP system Public Switched Telephone Network (PSTN) module and the PSTN circuits

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 7

Which of the following IP devices sends a Registration Request (RRQ) message to a gatekeeper?

(Select THREE)

A. H. 323 Gateway

B. H. 323Multipoint Control Unit (MCU)

C. SIP softphone

D. H. 323 IP telephone

E. SIP telephone



Options are :

  • C,D,E
  • A,B,D
  • A,B,C
  • B,C,D

Answer : A,B,D

A telecommuter registering their softphone over an Internet VPN to the main sites IP PBX is

complaining of one-way audio. The technician determines that Network Address Translation (NAT)

is the cause of the issue. Which of the following should the technician consider to circumvent the

NAT traversal issue?



Options are :

  • Assign public IP addresses to the signaling cards
  • Deploy a Session Border Controller (SBC).
  • Eliminate the VPN.
  • Assign public IP addresses to the clients PC at home

Answer : Deploy a Session Border Controller (SBC).

A technician, in a large office building with 1000 users, has just changed the voice mail system.

The technician has been getting complaints thru email that the companys voice mail system is not

delivering messages to the users who are unified or traditional. Which of the following should the

technician check to verify it is working properly?



Options are :

  • Reboot the PBX to clear the backlog of voice mail messages.
  • Add additional PRIs for connectivity because the new system needs more capacity.
  • Check for trunk errors between the PBX and the voice mail system.
  • Confirm that the coverage path for voice mail is setup properly and that the user is set to unified.

Answer : Confirm that the coverage path for voice mail is setup properly and that the user is set to unified.

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 6

Which of the following cases is an automatic speech-recognition system preferable to an

Interactive Voice Response (IVR)?



Options are :

  • When integration to a CTI system is necessary
  • When alphabetic, instead of numeric, inquiries are necessary
  • When numeric, instead of alphabetic, inquiries are necessary
  • When integration to a CTI system is not necessary

Answer : When alphabetic, instead of numeric, inquiries are necessary

A technician, at a large call center with 500 agents working remotely from home, has gotten

several complaints that users cannot login to their softphone. Which of the following would the

technician check to verify that the users are not being blocked?



Options are :

  • Check the users class of service settings.
  • Verify the IP address of the gatekeeper the users are logging into.
  • Place an outbound call and check for dial tone.
  • Check the password feed from the LDAP directory.

Answer : Check the users class of service settings.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions