Firewall Network Security System Quiz Questions

100 Questions

Settings
Please wait...
Firewall Network Security System Quiz Questions

Advanced technology using computers have made everything simple and quick but it has also increased insecurity. Firewall network security system is where owners prevent entry on unknown users to a network. Find out more below.


Questions and Answers
  • 1. 
    What statement best describes the difference between an Adaptation and an adaptation module?
    • A. 

      An adaptation module can be used only once. An Adaptation can be used many times.

    • B. 

      An adaptation module is a container extension. An Adaptation is a database record within the Adaptations collection.

    • C. 

      An adaptation module references an Adaptation. An Adaptation does not reference an adaptation module.

    • D. 

      An adaptation module is configured by the administration. An Adaptation is pre-built and is loaded as a container extension.

  • 2. 
    Which statement best describes how a Routing Policy could be configured to be active on Saturday morning and Sunday afternoon?
    • A. 

      Create a Time Range. Select Saturday and set the start and end time for morning. Select Sunday and set start and end time for afternoon. Add Time Range to Routing Policy

    • B. 

      Create a Time Range. Select Saturday and select morning. Select Sunday and select afternoon. Add Time Range to Routing Policy

    • C. 

      Create a Time Range. Create a Routing Policy for Saturday Morning. Create a second Routing Policy for Sunday afternoon. Add both Routing Policies to the Time Range.

    • D. 

      Create a Time Range. Select Saturday and set start and end time for morning. Create another Time Range. Select Sunday and set start and end time for afternoon. Add both Time Ranges to Routing Policy.

  • 3. 
    Administrative interactions between System Manager and Session Manager are carried over _______.
    • A. 

      HTTP

    • B. 

      HTTPS

    • C. 

      SIP

    • D. 

      Secure JMX

  • 4. 
    What happens to a request that contains a Request URI which includes a domain name that is not a recognized SIP Domain?
    • A. 

      Nothing

    • B. 

      The request is rejected

    • C. 

      The request is processed as normal, including NRP routing

    • D. 

      The un-known domain is resolved and the request is proxied downstream

    • E. 

      Session Manger crashes

  • 5. 
    How does Session Manager invoke a feature on an IMS type Feature Server
    • A. 

      It adds a route header to the request, addressed to the feature server

    • B. 

      It changes the request URI of the request, and sends it to the feature server

    • C. 

      It never addresses a feature server

    • D. 

      It changes the to header of the request, and send it to the feature server SM100

  • 6. 
    Which statements about Session Manager redundancy are true? (Check all that apply.)
    • A. 

      Primary Session Manager and Secondary Session Managers are installed using the same installer

    • B. 

      Primary Session Managers and Branch Session Managers are installed using the same installer

    • C. 

      After installation Session Manager instances are configured to be either Primary Session Managers or Secondary Session Managers

  • 7. 
    In which Session Manager context do we use the terms 'ingress' and 'egress'?
    • A. 

      Authentication

    • B. 

      Name resolutions

    • C. 

      Adaptations

    • D. 

      Firewall

  • 8. 
    Which statement about adaptation modules is NOT true?
    • A. 

      An adaptation module is a pluggable component that is deployed in the Service Host container as a container extension

    • B. 

      Adaptation modules are typically designed to cater for the needs of equipment from particular vendors.

    • C. 

      Using pluggable adaptations help make Session Manager future proof

    • D. 

      Adaptation modules are deployed through the SM 100 configuration pages

  • 9. 
    What statement best describes PPM?
    • A. 

      PPM stands for Personal Profile Manager policy

    • B. 

      PPM is the process through which CM synchronized phone settings with Session Manager

    • C. 

      PPM is the repository of phone settings from which SIP stations retrieve their settings when a user logs in

    • D. 

      PPM is the process through which behaviors and settings are dynamically downloaded to the phone dependent on the specific user logging in

  • 10. 
    It is possible for SIP Entity record to represent a set of redundant network devices. How is the notion of a set of redundant devices detailed on a single SIP Entity record?
    • A. 

      The 'Redundant devices' check box in the SIP Entity record is checked

    • B. 

      The IP address of each redundant device is entered in the SIP entity record

    • C. 

      The address of the combined Entity is entered as a FQDN in the SIP Entity record

    • D. 

      It is not possible for SIP Entities to be redundant

  • 11. 
    What is the minimum number of physical servers required for a Session Manager Instance
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 12. 
    Which item of data is NOT included in a Location record?
    • A. 

      Location name

    • B. 

      IP address pattern

    • C. 

      Bandwidth allocation

    • D. 

      Time zone

  • 13. 
    What is the purpose of the P-Avaya-Transport header?
    • A. 

      It is used to carry a Free-Pass token used to authenticate the caller

    • B. 

      It is used to carry a Free-Pass token that signifies this call should not be billed

    • C. 

      It tells Avaya's Session Manager which transport protocol is to be used as the request is routed toward the destination

    • D. 

      There is no such header. The P-Avaya-Transport header does not exist

  • 14. 
    Session Manager uses two physical network adaptors. Which statement best describes the reason for the two adaptors?
    • A. 

      They both actively receive network traffic, providing an active / active model of server redundancy

    • B. 

      One is for signaling traffic and the other is for management traffic

    • C. 

      One belongs to the SM 100 and the other to the server box

    • D. 

      The primary adapter receives all network traffic, whilst the secondary is on 'hot stand bye', ready to take over if anything goes wrong with the first

  • 15. 
    Branch Session Managers have exact local copies of core Session Manager data, meaning BSM's apply the same processing and routing as would their core cousins.
    • A. 

      True

    • B. 

      False

  • 16. 
    One of three possible actions can be applied to packets that do not pass firewall checks. Which item from the list below is NOT one such action
    • A. 

      Drop packet

    • B. 

      Rate Limit

    • C. 

      Rate Block

    • D. 

      Quarantine

  • 17. 
    What statement best describes the Entity Link?
    • A. 

      An Entity Link is the network connection between Session Manger and one of its SIP Entities

    • B. 

      An Entity Link is the relationship between Session Manager and one of its SIP Entities

    • C. 

      An Entity Link is another word for a SIP Trunk or a VPN tunnel

    • D. 

      An Entity Link is another word for a SIP Entity

  • 18. 
    Which statement best describes the Rate Limit firewall action?
    • A. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop all packets from that source

    • B. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop some packets from that source

    • C. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop any packets from that source that exceed the threshold

    • D. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then add the source address to the Black list

  • 19. 
    What is the purpose of the White List firewall check?
    • A. 

      If the White list is activated, no packets are allowed through the firewall unless the source is listed on the white list

    • B. 

      If the source is listed on the White List, allow all packets through without further checks, regardless of other conditions

    • C. 

      If the source is listed on the White List, block all packets without further checks

    • D. 

      If the source is listed on the White List, mark the packet as having priority and send it to the front of the queue for processing

  • 20. 
    Session Manager provisions the required network bandwidth to each of its locations.
    • A. 

      True

    • B. 

      False

  • 21. 
    Session Manager makes significant use of collections of data stored on a database. Which statement below is NOT true?
    • A. 

      Session Manager combines data from the collections to determine routing of signaling requests

    • B. 

      Session Manager queries data from the collections to validate a SIP Entity

    • C. 

      Session Manager queries data from the collection to determine how much bandwidth is allocated to a location

    • D. 

      Session Manager queries adaptation patterns from a collection to determine how a SIP message should be adapted

  • 22. 
    Which statement about Roting Policies is true?
    • A. 

      A Routing Policy references one or more SIP Entities and one or more Time Ranges

    • B. 

      A Routing Policy references one Time Range and one or more Dial Patterns

    • C. 

      A Routing Policy references one Dial Pattern and one SIP Entity

    • D. 

      A Routing Policy references one SIP Entity and one or more Time Ranges

  • 23. 
    What statement most accurately describes the process of authenticating a user during registration?
    • A. 

      ASM checks the received Register request for a valid password. Only if it exists is the registration data written to the registry and the User Profile updated.

    • B. 

      After checking that a User Profile exists, ASM returns an error response to the initial Register request, prompting the user for log on credentials. Only when received and validated against details in the User Profile is the user authenticated.

    • C. 

      Users ensure that all requred log on credentials are included in the Register request. ASM compares the users details with those recorded in the Registry. If they match, the user is authenticated and the registration completes.

    • D. 

      A Register request must contain the user's identifier (handle or extension ID) and the actual location of the SIP phone on which he would like to make his calls. If correct, the user is authenticated and the data is written to the registry.

  • 24. 
    How many network cables are typically plugged in to a Session Manager box?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 25. 
    What item of data is NOT found on a SIP Entity record
    • A. 

      A reference to an Entity Link

    • B. 

      A time zone

    • C. 

      An IP Address or FQDN

    • D. 

      Timer B

    • E. 

      A reference to an Adaptation

  • 26. 
    On receipt of each IP packet, the software SM100 component performs a number of checks. In which order are the checks made?
    • A. 

      Black/White list, Network layer, SIP layer

    • B. 

      SIP Layer, Network layer, Black/White list

    • C. 

      Nework layer, SIP layer, Black/White list

    • D. 

      Black/White list, SIP layer, Network layer

  • 27. 
    Session Manger makes significant use of collections of data stored on a database. Which database is not supported?
    • A. 

      Postgres

    • B. 

      Oracle

    • C. 

      SQL Server

  • 28. 
    A SIP phone may have knowledge of multiple Session Mangers. Which statement best describes which Session Manager a SIP phone will send its ougoing SIP invite requests to?
    • A. 

      SIP phones send outgoing SIP invites to all the Session Mangers identified to them through PPM

    • B. 

      SIP phones send outgoing SIP invites to all Session Managers to which they have registered

    • C. 

      SIP Phones send outgoing SIP invites to the Session Manager to which they have subscribed

    • D. 

      SIP phones send outgoing SIP invites to the first Session Managers to which they have registered

  • 29. 
    The heart of the Session Manger application is a collection of ________ packaged in a SAR file.
    • A. 

      JMX extensions

    • B. 

      HTTP servlets

    • C. 

      SIP extensions

    • D. 

      SIP servlets

  • 30. 
    What is NOT a function of Call Admissions Control?
    • A. 

      Checking of Free-Pass token found in the P-Avaya-Transport header

    • B. 

      Re-routing of requests over the PSTN when the network bandwidth to a location is fully utilized

    • C. 

      One Session Manager instance requesting a portion of another Session Manager's bandwidth allocation for a location

  • 31. 
    What statement best describes the purpose for Timer B?
    • A. 

      Timer B was named after Henning Schulzrinne's youngest son

    • B. 

      Timer B determines the minimum duration for a SIP transaction, which is by default 32 seconds

    • C. 

      Timer B is typically set to 4 or 5 seconds

    • D. 

      Timer B is the time after which a request will be cancelled if a response has not yet been received

  • 32. 
    What statement best describes the process and purpose of SIP Monitoring?
    • A. 

      The SM100 firewall monitors the rate of incoming SIP messages in order to prevent DOS attacks

    • B. 

      At regular intervals, Session Manager sends OPTIONS requests to SIP Entities to check they are still able to receive and process SIP requests

    • C. 

      At regular, configurable intervals, System Manager checks the SIP Registry to make sure it is not nearing capacity

    • D. 

      Session Manager monitors the types of SIP requests it receives, in order to apply relevant processing

  • 33. 
    What manual task must be administered to establish a working relationship between primary and secondary Session Managers?
    • A. 

      Create an Entity Link between the two Session Managers

    • B. 

      Synchronize the data repositories

    • C. 

      Ensure the DNS is updated to reflect the domain names and IP addresses of the Session Managers

    • D. 

      Copy the Routing Policies from Primary to Secondary

  • 34. 
    Before data can be replicated from the System Manager to the Session Manager, the Session Manager must first
    • A. 

      Be rebooted

    • B. 

      Register with the System Manager

    • C. 

      Be defined as a Session Manager Instance

  • 35. 
    When is data replicated from the System Manager database to the Session Manager database?
    • A. 

      By default, every 60 seconds

    • B. 

      After a Session Manager instance is defined

    • C. 

      During the installation process (initDRS)

    • D. 

      Both A and C

  • 36. 
    InitDRS cannot be run manually after installation.
    • A. 

      True

    • B. 

      False

  • 37. 
    The Trust Management Password is created by navigating to
    • A. 

      InitTM

    • B. 

      System Manager >> Security >> Certificates >> Enrollment Password

    • C. 

      System Manager >> Change Password

    • D. 

      System Manager >> Session Manager >> System State Administration

  • 38. 
    Which of the following statements are true about Trust Management?
    • A. 

      Enables Session Manager to accept requests from endpoints

    • B. 

      Establishes Trust relationships between elements and applications

    • C. 

      Trust Management provides credentials to enable mutually authenticated TLS sessions between elements

    • D. 

      Allows endpoints to register with System Manager

  • 39. 
    You must run the Session Manager installer as user 'sroot'.
    • A. 

      True

    • B. 

      False

  • 40. 
    SMnetSetup is run as user 'craft'.
    • A. 

      True

    • B. 

      False

  • 41. 
    The SMnetSetup configures (select all that apply)
    • A. 

      Eth0

    • B. 

      Eth2

    • C. 

      Date/Time

    • D. 

      DNS settings

  • 42. 
    Making sure the Session Manager and System Manager either have updated DNS records or updated 'hosts' files is important because
    • A. 

      No Reason

    • B. 

      The System Manager must know the FQDN of all Session Managers, and Session Managers must know the FQDN of the System Manager in order to begin accepting calls

    • C. 

      The System Manager must know the FQDN of all Session Managers, and Session Managers must know the FQDN of the System Manager in order for Node Registration to work

    • D. 

      None of the Above

  • 43. 
    The Trust Management Password must be created before the Session Manager installer is executed.
    • A. 

      True

    • B. 

      False

  • 44. 
    Trust Management is initialized during the installation.
    • A. 

      True

    • B. 

      False

  • 45. 
    What will ./install.sh do if a Session Manager installation already exists?
    • A. 

      Upgrade the existing installation

    • B. 

      Uninstall and clean the existing installation and install a new installation

    • C. 

      It will do nothing

    • D. 

      Prompt you to upgrade or install fresh

  • 46. 
    InitDRS can be run before a Session Manager successfully registers to the System Manager.
    • A. 

      True

    • B. 

      False

  • 47. 
    Restarting Watchdsv will not reboot which of the following services?
    • A. 

      Sipas-mg

    • B. 

      Sm-mgmt

    • C. 

      Postgresql

    • D. 

      Secmod

  • 48. 
    The Session Manager installation is located under
    • A. 

      /home/root

    • B. 

      /home/craft

    • C. 

      /opt

    • D. 

      /opt/Avaya

  • 49. 
    During the initDRS process (Select all that apply.)
    • A. 

      Data is copied from the System Manager database to the Session Manager database

    • B. 

      Foreign key constraints are removed before data is copied

    • C. 

      The Session Manager reboots

    • D. 

      Foreign key constraints are replaced after data is copied

  • 50. 
    Session Manager logs can be found under
    • A. 

      /home/root

    • B. 

      /home/craft

    • C. 

      /var/log/Avaya

    • D. 

      /opt/Avaya

  • 51. 
    Which of the following commands is used to monitor the services using Watchdsvc?
    • A. 

      Swversion

    • B. 

      Swstatus

    • C. 

      Pstree

    • D. 

      Statapp

  • 52. 
    Session Manager node registration is part of which process
    • A. 

      InitTM

    • B. 

      InitDRS

    • C. 

      Session Manager Instance administration

    • D. 

      All of the above

  • 53. 
    Which statement best describes the purpose of running initTM after installation?
    • A. 

      InitTM is always used to initialize Trust Management

    • B. 

      InitTM is used if Trust Management fails to initialize during the Session Manager install

    • C. 

      InitTM is used to initialize Session Manager

    • D. 

      InitTM is never used

  • 54. 
    Which of the following commands can be used to check the Session Manager version?
    • A. 

      Statapp

    • B. 

      Version

    • C. 

      Smversion

    • D. 

      Swversion

  • 55. 
    Where in the Session Manager context, where do we see the use of certificates?
    • A. 

      To authenticate users prior to making pre-paid calls

    • B. 

      To validate new SIP Entities in the network

    • C. 

      To access keys for deciphering encrypted SIP messages

    • D. 

      To congratulate users who register with Session Manager for the first time

  • 56. 
    Which statement lists routing options in the order of priority most likely to achieve cheapest calls?
    • A. 

      Tail end hop off, Least cost routing, End to end IP, End to end PSTN

    • B. 

      Least cost routing, Tail end hop off, End to end IP, End to end PSTN

    • C. 

      End to end IP, Tail end hop off, Least cost routing, End to end PSTN

    • D. 

      End to end PSTN, Tail end hop off, Least cost routing, End to end IP

  • 57. 
    An Application can be added to multiple application sequences.
    • A. 

      True

    • B. 

      False

  • 58. 
    Which statement best describes the relationship between Session Manager and System Manager?
    • A. 

      Session Manager and System Manager are both fundamental components of Avaya Aura's next generation architecture

    • B. 

      Session Manager serves web pages through which System Manager is administered

    • C. 

      Session Manager and System Manager are both based on web application servers

    • D. 

      System Manager is Avaya Aura's common interface tool through which Session Manager is administered

  • 59. 
    What is the main purpose of communities?
    • A. 

      To provide redundancy

    • B. 

      To provide increased capacity

    • C. 

      To be an enterprise level support network

    • D. 

      To provide commonality of user experience

  • 60. 
    What task is not performed during adaptation?
    • A. 

      Dialed number format change. Eg add/remove international & city code to a local number

    • B. 

      SIP message header manipulation. Eg add/remove proprietary SIP headers

    • C. 

      SIP address resolution

    • D. 

      Conversion between long and short SIP header names.

  • 61. 
    What statement below best describes why users register with Session Manager?
    • A. 

      Registration enables calls to be made to their IP phone, thus helping Session Manager avoid costly charges on behalf of the organization

    • B. 

      Registration is an IP mechanism for clocking in and out of work

    • C. 

      Registration gives Session Manager the user's public identifier and the IP address of the phone, meaning that Session Manager knows where to route incoming calls for the user.

    • D. 

      Registration is the mechanism through which User A calls User B, via Session Manager

  • 62. 
    Which statement summarized the main benefits of Session Manager and Network Routing Policies? Session Manager, through the application of NRP _____?
    • A. 

      Minimized the cost of calls, AND integrates telephony systems of different types throughout the organization

    • B. 

      Minimized the cost of calls, AND serves to secure the organization from malicious attack

    • C. 

      Serves to secure the organization from malicious attack, AND integrates telephony systems of different types throughout the organization

    • D. 

      None of the above

  • 63. 
    System Manager knows the formats of dialed numbers expected by different SIP Entity devices and adapts the number pattern according to the designated device's requirements.
    • A. 

      True

    • B. 

      False

  • 64. 
    The next device to take over from a failed primary Session Manager in the core is typically a Branch Session Manager.
    • A. 

      True

    • B. 

      False

  • 65. 
    How many concurrent TLS connections can be supported in a Session Manager 6.0 environment?
    • A. 

      500

    • B. 

      5000

    • C. 

      50000

    • D. 

      500000

  • 66. 
    In which Session Manager context do we see the terms 'originating' and 'terminating'?
    • A. 

      'Originating' and 'terminating' apply to the half call model in which a SIP Entity translates non-SIP signaling on the branch side to SIP signaling on the core side

    • B. 

      'Originating' and 'terminating' refers to the SIP Entity in the branch and the SM100 security module respectively

    • C. 

      'Originating' and 'terminating' refers to the individual application of features, or services, on behalf of the caller and the callee

  • 67. 
    What statement best describes how signaling messages are typically secured as they traverse the network to and from Session Manager?
    • A. 

      Session Manager regularly checks the network for unauthorized SIP Entities

    • B. 

      The SM 100 card is a self-contained computer that has built-in firewall capabilities

    • C. 

      The SM 100 card removes all sensitive information (eg authorization data) from the SIP message before sending it out over the network

    • D. 

      Messages are encrypted before being sent over the network and deciphered at Session Manager by the SM 100 card. Only those with relevant keys can decipher the messages

  • 68. 
    What does SM stand for, in the context of SM100?
    • A. 

      Session Manager

    • B. 

      System Manager

    • C. 

      Security Module

    • D. 

      Security Manager

  • 69. 
    An organization has 5,000 users and wants a redundant service. What is the minimum number of Session Manager servers they need?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 70. 
    Which statement about Session Manager is NOT true?
    • A. 

      Session Manager sets up a secure network connection between itself in the data center and all branch offices of an organization

    • B. 

      Session Manager acts as a SIP registrar and location service for all SIP phones within the organization

    • C. 

      Session Manager will serve organizations that are distributed both nationally and internationally

    • D. 

      In order for Session Manager to serve a remote branch of the organization, there must be an IP link between the branch and the data center

  • 71. 
    Encrypted SIP messages cannot be intercepted whilst traversing the network
    • A. 

      True

    • B. 

      False

  • 72. 
    What device deciphers encoded SIP messages in a timely manner?
    • A. 

      Avaya S8510

    • B. 

      System Manager Accelerator card

    • C. 

      SM 100

    • D. 

      PSTN/SIP Gateway

  • 73. 
    Which statement is NOT true?
    • A. 

      Through use of SIP Entities, all communications signaling in the core of the network is SIP, meaning that common routing policies and special treatment can be applied to all calls within the whole organization, regardless of from which type of phone the call is made

    • B. 

      Session Manager applies Network Routing Policies to determine which SIP Entity a call should be routed to

    • C. 

      Calls to a non-SIP phone within the organization will be routed to Session Manager, from where it will be routed to a SIP Entity that has knowledge of how to route the call to the non-SIP end point

    • D. 

      Session Manager integrated non-SIP based telephone systems in remote branches by translating non-SIP signaling messages into SIP messages and then routing them toward the destination through the application of Network Routing Policies

  • 74. 
    What statement best describes the purpose of SAL?
    • A. 

      SAL is a simple to use mechanism through which Avaya support can gain secure, trusted access to a System Manager, without the need for a VPN connection

    • B. 

      SAL is an SNMP based process through which System Manager alerts an administrator when there are system health issues.

    • C. 

      SAL stands for Secure Authorization Link

    • D. 

      SAL is the secure access link between System Manager and Session Manager. It ensures no unauthorized parties can capture and misuse configuration data sent between the two servers.

  • 75. 
    What additional device is needed if calls are to be made to external, traditional phones?
    • A. 

      Avaya S8510

    • B. 

      System Manager Accelerator card

    • C. 

      SM 100

    • D. 

      PSTN/SIP Gateway

  • 76. 
    Redundant Session Manager instances are arranged in what relationship?
    • A. 

      Active / Standby

    • B. 

      Active / Active

    • C. 

      Standby / Standby

  • 77. 
    Acting as a Feature Server, what statement below most accurately lists the services provided by Session Manager?
    • A. 

      Call Transfer, Ad-Hoc Conferencing, Voice Mail, Black List, White List

    • B. 

      Call Transfer, Voice mail, Black List, White List, Call Forwarding

    • C. 

      Call Transfer, Ad-Hoc Conferencing, Black List, White List, Call Forwarding

    • D. 

      None of the above

  • 78. 
    Which statement best describes Session Manager's Time of Day Routing?
    • A. 

      Routing a User's incoming calls to different phones depending on the time of day

    • B. 

      Routing calls over IP or PSTN trunks depending on the time of day

    • C. 

      Applying different features to an outgoing call depending on the time of day

    • D. 

      Routing a call over specific PSTN trunks depending on the time of day

  • 79. 
    Which statement best describes Session Mangaer Geo-Redundancy?
    • A. 

      Multiple Session Manager instances in a geo-redundant arrangement in a data center

    • B. 

      Two or more Session Manager servers located in different regions

    • C. 

      A single Session Manager instance installed on geographically distributed servers

  • 80. 
    Why are Session Manager servers sometimes arranged in a redundant manner?
    • A. 

      When the servers are nearing end of life and perform less

    • B. 

      So that if one server has a problem, another can take over, maintaining the service

    • C. 

      Two servers provide more processing power than one

    • D. 

      Session Manager servers are never arranged in a redundant manner

  • 81. 
    What statement best describes the reason why Session Manager challenges register requests?
    • A. 

      To authenticate the user

    • B. 

      To authorize the user

    • C. 

      To refuse the user

    • D. 

      To reduce bandwidth

  • 82. 
    What statement describes the half-call model?
    • A. 

      Individual call initiation processing on behalf of the caller and the callee

    • B. 

      The independent flow of media from caller to callee and again from callee to caller

    • C. 

      Call durations are limited to thirty minutes

    • D. 

      Long distance call charges are typically reduced by 50%

    • E. 

      None of the above

  • 83. 
    What is the prime reason for including a Branch Session Manager
    • A. 

      Provides a basic service if the Session manager in the core of the network goes down

    • B. 

      Provides additional layer of security between the branch and the core network

    • C. 

      Provides a basic service if the IP trunk to the core network goes down

    • D. 

      Provides media stream conversion for branch devices that use non-standard codecs

  • 84. 
    An Implicit User represents ___________
    • A. 

      Any end point that does not have a defined User Profile

    • B. 

      A SIP Entity

    • C. 

      An Entity

    • D. 

      An integral User Profile

  • 85. 
    • A. 

      A SIP Entity is a trusted partner known to Session Manager. Session Manager will reject any requests received from any other source.

    • B. 

      A SIP Entity in a remote branch enables the branch to connect to Session Manager over the public internet

    • C. 

      SIP Entities act as security agents to protect against Session Manager attack, including Denial of Service

    • D. 

      SIP Entities can take a number of forms, including SIP enabled devices already in many networks such as Avaya's Communication Manager.

  • 86. 
    Session Manager can apply the same features to the originating half of the call AND to the terminating half of the call
    • A. 

      True

    • B. 

      False

  • 87. 
    Session Manager is a stand-alone solution for enterprise telephony.
    • A. 

      True

    • B. 

      False

  • 88. 
    Which system health statement is not true?
    • A. 

      System Manager monitors Session Manager's health

    • B. 

      System Manager alerts an administrator when it detects a problem

    • C. 

      System Manager provides UPS backup for Session Manager in case of electricity loss

    • D. 

      System Manager collates system information and logs to help trace problems

  • 89. 
    What key items of registration related data are included in a User Profile?
    • A. 

      Password

    • B. 

      User Name

    • C. 

      Handle / Extension ID

    • D. 

      Phone Location

  • 90. 
    How does Session Manager decide whether to apply a Network Routing Policy or SIP Location routing to an incoming SIP invite request?
    • A. 

      It checks to see if the request is coming from a registered SIP station

    • B. 

      It checks the SIP Registry to see if the called party is registered

    • C. 

      It checks to see if the caller has a User Profile

    • D. 

      It checks to see if the callee has a User Profile

  • 91. 
    Imagine a call set up between two SIP users who each are registered with different Session Manager instances. Which statement best describes the routing applied to the initial incoming INVITE at the first Session Manager? The first Session Manger...
    • A. 

      Applies a Network Routing Policy to route the INVITE downstream towards the called party to answer here

    • B. 

      Applies SIP Location routing to route the INVITE downstream towards the called party

    • C. 

      Uses the address in the Route header to proxy the INVITE downstream towards the called party

    • D. 

      Uses the address in the Request URI to proxy the INVITE downstream towards the called party

  • 92. 
    Which protocols are used to request and deliver station settings?
    • A. 

      HTTP with SIP content

    • B. 

      HTTP with text content

    • C. 

      SIP with text content

    • D. 

      SIP with SOAP content

    • E. 

      HTTP with SOAP content

  • 93. 
    In which device is the authoritative PPM data repository stored?
    • A. 

      System Platform

    • B. 

      System Manager

    • C. 

      Communication Manager

    • D. 

      Session Manager

  • 94. 
    Session Manager uses a dedicated HTTP Servlet running on an internal instance of ___________ to manage PPM requests for phone settings
    • A. 

      JBOSS

    • B. 

      Tomcat

    • C. 

      Apache

    • D. 

      Microsoft IIS

  • 95. 
    What is the purpose of the 'SMGR Login' credentials determined in the User Profile?
    • A. 

      Used by user when logging in to administer their own details online

    • B. 

      Used by user when logging in on a phone

    • C. 

      Used by administrator to login to System Manager Admin pages

    • D. 

      Used to authenticate a user when calling customer support

  • 96. 
    Session Manager determines the look and feel of a phone's display and the function of each of the phone's hotkeys.
    • A. 

      True

    • B. 

      False

  • 97. 
    In which SIP Application Server component does the Session Manager application reside?
    • A. 

      Service Director

    • B. 

      Service Host

    • C. 

      Service Manager

    • D. 

      Management Server

  • 98. 
    Administrative interactions between the browser based console pages and System Manager are carried over ...
    • A. 

      HTTP

    • B. 

      HTTPS

    • C. 

      SIP

    • D. 

      Secure JMX

  • 99. 
    Session Manager's SIP Entity address should be that of the eth0.
    • A. 

      True

    • B. 

      False

  • 100. 
    A '403 Forbidden: Invalid Domain in From Header' response from the CM can be resolved by using a _____.
    • A. 

      New Location

    • B. 

      Adaptation

    • C. 

      Routing policy

    • D. 

      Regular expression