CT0-101 Convergence+ Certification Practice Exam Set 3

When remotely accessing a management interface, which of the following should a technician use

to securely access the network equipment?



Options are :

  • Secure Shell (SSH)
  • Telnet
  • SFTP
  • Service Control Point (SCP)

Answer : Secure Shell (SSH)

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 8

The B channels of a ISDN BRI can be bonded to provide:



Options are :

  • 256 Kbps.
  • 128 Kbps.
  • 64 Kbps.
  • 384 Kbps.

Answer : 128 Kbps.

Which of the following is the MOST common reason an enterprise would deploy Session Border

Controllers (SBC)?



Options are :

  • An SBC provides greater security than a normal firewall.
  • An SBC provides enterprise wide virus protection for VoIP systems.
  • An SBC provides accounting/billing information for sessions traversing the network.
  • An SBC provides a solution to a VoIP Network Address Translation (NAT)/firewall problem.

Answer : An SBC provides a solution to a VoIP Network Address Translation (NAT)/firewall problem.

An H. 323 phone registers to a gatekeeper across a VPN. This phone has worked in the past but

now fails to register with the gatekeeper. All other H. 323 phones in remote locations work fine.

What would be the BEST troubleshooting action to take next?



Options are :

  • Make certain the VPN is 3DES and not DES.
  • Find out what has changed on the remote side of the network.
  • Rebuild the VPN on the remote side VPN device.
  • Remove everything from the remote side of the network and add everything back one by one.

Answer : Find out what has changed on the remote side of the network.

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 1

Between which of the following points should an Intrusion Detection System (IDS) be installed to

monitor traffic to and from the VoIP system?



Options are :

  • between the VoIP system and the Public Switched Telephone Network (PSTN) circuits
  • between the VoIP system and the voicemail server
  • between the VoIP system and the first network access point
  • between the VoIP system and the network backbone

Answer : between the VoIP system and the first network access point

True video streaming uses which of the following processes? (Select TWO)

A. Signal conversion to TCP packets for transmission.

B. Signal conversion to IP packets for transmission.

C. Matching the signal rate between the source and destination.

D. Compressing the signal to decrease the encoding process time.

E. Using image storage space on the local hard drive to increase transmission rates.




Options are :

  • B,C
  • D,E
  • A,B
  • A,D
  • C,D

Answer : B,C

A technician is troubleshooting a SIP video unit that is being used for a video conference. Which of

the following ports would a technician have to ensure were open on the firewall?



Options are :

  • Port 1503
  • Port 5190
  • Port 1720
  • Port 5060

Answer : Port 5060

CD0-001 CDIA+ Certification Practice Exam Set 8

The ITU-T recommends that delay of voice traffic end-to-end be kept below:



Options are :

  • 150ms.
  • 50ms.
  • 350ms.
  • 450ms.

Answer : 150ms.

A VoIP user is complaining of a one way talk path when calling a branch office that is connected

via a VPN over the internet. After confirming the problem exists by placing test calls from the main

site to the VPN user, and by pinging the VPN user, which of the following should the technician do

next?



Options are :

  • Check the router configuration
  • Inspect the IP PBX configuration
  • Test the T-1 circuits
  • Check the VPN/Firewall configuration

Answer : Check the VPN/Firewall configuration

The phone system is getting a dial tone from some analog trunks that are coming off of a

multiplexer.

Every time the trunks are terminated into the phone system, phantom calls are generated. Which

of the following is the MOST likely cause of the problem?



Options are :

  • The call route table in the phone system is not setup correctly. The table needs to be checked for duplication errors.
  • There is too much voltage on the trunks. The trunks voltage needs to be checked and adjusted to the phone systems specifications.
  • There is too much capacitance on the trunks. The trunks capacitance needs to be checked and adjusted to the phone systems specifications.
  • The call route table in the phone system is not setup. The table needs to be created and double checked for errors.

Answer : There is too much voltage on the trunks. The trunks voltage needs to be checked and adjusted to the phone systems specifications.

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 6

Which of the following is the key design requirement when designing an Interactive Voice

Response (IVR)?

A.



Options are :

  • The network performance required to deliver timely screen pops.
  • The number of concurrent active ports.
  • The caller's Automatic Number Identification (ANI).
  • The protocol used to communicate with backend database.

Answer : The number of concurrent active ports.

Which of the following standards defines the use of Power over Ethernet (PoE) in a converged

network?



Options are :

  • 802.3af
  • 802.1ad
  • 802.1q
  • 802.11n

Answer : 802.3af

Which of the following WAN service protocols are BEST suited for converged

applications/networks?



Options are :

  • Point to Point Protocol (PPP)
  • Multi-Protocol Label Switching (MPLS)
  • Frame Relay
  • X.25

Answer : Multi-Protocol Label Switching (MPLS)

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 3

Which of the following channels carries the setup message for ISDN PRI E1/T1?



Options are :

  • The 23 B channels
  • Channel zero
  • The D channel
  • The B channel

Answer : The D channel

A company has a contact center with thousands of distributed agents, skill-based routing, multiple

hunt groups, CTI and desktop screen pops. The Chief Executive Officer (CEO) wants to allow

clients to exit the music-on-hold queue while waiting for an agent and leave a message to be

called back later. Which of the following components are needed to change the configuration?

(Select TWO)

A. CTI

B. PBX

C. Public Switched Telephone Network (PSTN)

D. Automatic Call Distribution (ACD)

E. Voicemail



Options are :

  • C,D
  • B,C
  • D,E
  • A,B

Answer : D,E

How much AC power does Power over Ethernet (PoE) provide, according to the IEEE standard?




Options are :

  • 24 volts
  • 48 volts
  • 12 volts
  • 56 volts

Answer : 48 volts

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 16

Which of the following standards defines the interoperability of VLANs?



Options are :

  • 802.1p
  • 802.11n
  • 802.1q
  • 802.3af

Answer : 802.1q

Which of the following lists MOST accurately depicts the advantages gained by deploying dual

mode WiFi/Cellular phones in an enterprise?



Options are :

  • Enhanced email capabilities, voicemail enhancements, and increased productivity.
  • Instant messaging, better end user satisfaction, and less expensive phones.
  • Mobility, reduced operating costs, and increased productivity.
  • Better voice quality, less complexity, and increased features.

Answer : Mobility, reduced operating costs, and increased productivity.

In order to connect a mobile SIP user with an incoming session, a SIP server will operate in which

of the following modes? (Select TWO)

A. Redirect

B. Presence

C. Forking

D. Proxy




Options are :

  • A,B
  • D,A
  • C,D
  • B,C

Answer : D,A

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 6

Users complain when retrieving voicemails using a VoIP system that the playback message

breaks up. Which of the following is the MOST likely cause?



Options are :

  • The voicemail anti-virus is not running with the latest signatures for VoIP viruses.
  • The voicemail anti-virus is not running.
  • The voicemail anti-virus is updating its virus signatures.
  • The voicemail anti-virus is set to scan on access.

Answer : The voicemail anti-virus is set to scan on access.

Two companies want to connect VoIP systems across an unsecured network. Both companies

use private IP numbering in their internal networks and Network Address Translation (NAT) to

public addresses for external internet connectivity. Which of the following IPSec VPN options is

BEST suited to this deployment?



Options are :

  • AH Tunnel Mode
  • AH Transport Mode
  • ESP Transport Mode
  • ESP Tunnel Mode

Answer : ESP Tunnel Mode

Which of the following is the recommended maximum packet loss allowed in a network

assessment and still achieve Toll quality VoIP calls?



Options are :

  • Zero percent
  • 3 percent
  • one percent
  • 6 percent

Answer : one percent

Comptia Certification Collection

Which of the following is the ITU-T standard that addresses secure authentication, integrity and

privacy in H. 323?



Options are :

  • H. 246
  • H. 245
  • H. 225
  • H. 235

Answer : H. 235

In traditional TDM equipment and Public Switched Telephone Network (PSTN) digital networking,

which of the following was the first encoding method used to convert analog station voice to digital

transmission lines?



Options are :

  • Pulse Code Modulation (PCM)
  • Code Excited Linear Prediction (CELP)
  • Algebraic Code Excited Linear Prediction (ACELP)
  • Adaptive Differential Pulse Code Modulation (ADPCM)

Answer : Pulse Code Modulation (PCM)

Which of the following is a primary application of IP Multicast?



Options are :

  • Video on Demand
  • Television over IP
  • Audio conferencing
  • Peer-to-peer

Answer : Television over IP

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 2

When using SIP how many RTP connections are built for passing the media between IP

endpoints?



Options are :

  • two, one full duplex for media and one for passing Dual Tone Multi-Frequency (DTMF) tones
  • two, one full duplex for media and one control data
  • one, full duplex between endpoints
  • two, one for transmit and one for receive

Answer : two, one full duplex for media and one for passing Dual Tone Multi-Frequency (DTMF) tones

Which of the following methods is the BEST way to secure the delivery of SIP traffic on a

converged

network?




Options are :

  • Passing SIP traffic through a proxy first and then through a NAT filter.
  • Passing SIP traffic through a Network Address Translation (NAT) filter first and then through a proxy server.
  • Passing SIP traffic through a proxy first and then through an Application Layer Gateway (ALG) firewall.
  • Passing SIP traffic through an edge router firewall first and then through a software firewall.

Answer : Passing SIP traffic through a proxy first and then through an Application Layer Gateway (ALG) firewall.

Which of the following items are useful when troubleshooting an analog trunk circuit?



Options are :

  • Frequency meter
  • Oscilloscope
  • T-BERD
  • Micro-Henry meter
  • Volt-Ohm meter

Answer : Volt-Ohm meter

CD0-001 CDIA+ Certification Practice Exam Set 7

Which of the following BEST demonstrates a SIP URI?



Options are :

Answer : sip:[email protected]

A company has a contact center with thousands of distributed agents, skill-based routing, multiple

hunt groups, CTI and desktop screen pops. The managers want to reduce the number of repetitive

calls that require agent interaction. The technician is asked to investigate options for self-service.

Which of the following components should be added to the system to enable self-service?



Options are :

  • Call Management Service (CMS)
  • Network Pre-Route
  • Customer Relationship Management
  • Interactive Voice Response (IVR)

Answer : Interactive Voice Response (IVR)

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions