What is the pre-requisite starting point for configuring Session Broker Controller (SBC) SIP trunking?
A. SBC already installed and Registered
B. SBC already installed and Provisioned
C. SBC already installed and Commissioned
D. SBC already installed (wizard run)
What is the pre requisite starting point for implementing SBC Remote Worker?
A. When Avaya SBCE has been installed and registered
B. When Avaya SBCE has been installed and commissioned
C. When Avaya SBCE + Advanced Feature Set has been installed and registered
D. When Avaya SBCE + Advanced Feature Set has been installed and commission
For Enterprise SBC customers integrated with Communication Manager or Communication Server 1000, which remote access connection model do they use?
A. SSL VPN
B. Secure Access Link (SAL)
C. Modem
D. No remote access / alarming
You have been asked to create and apply a Time of Day (ToD) domain policy to secure a SIP trunk.
What is the correct order of the policy application sequence?
A. Packet examined, destination evaluated, ToD evaluated, policy applied
B. Packet examined, ToD evaluated, flow determined, policy applied
C. Packet examined, ToD evaluated, policy applied, routing applied
D. packet examined, flow determined, policy applied, ToD evaluated
Which statement describes the best practice regarding the security features for the Avaya SBC Remote Worker configuration?
A. Only signaling is fully encrypted.
B. Only media is fully encrypted.
C. Both signaling and media are fully encrypted.
D. Neither signaling nor media are fully encrypted.
Which Installation type should you choose for a standalone (all-in one) configuration?
A. EMS + UC-Sec
B. EMS
C. UC-Sec
D. NTP + UC-Sec
You have successfully installed the Session Broker Controller Enterprise (SBCE) and want to log in to the
CLI.
Which port and protocol must you use for CLI access?
A. SCP, port 80
B. SSH, port 222
C. SSH, port 22
D. TLS, port 5060
How do you view SBC Call Trace information?
A. SBC GUI: Diagnostics, Protocol tab
B. SBC CLI
C. EMS GUI: Log Viewer, option = logs
D. EMS GUI: Logs > System Logs, Class = Trace
Which file is a manually created backup?
A. ...6.2.0.Qnn.zip
B. ...snapshot.zip
C. ...6.2.0.Qnn.xls
D. ...backup.zip
What is an example of an availability attack?
A. Eavesdropping
B. Identify spoofing
C. Man-in-the-middle
D. Denial of service