Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1z0-404 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-404 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Oracle Communications Session Border Controller 7 Basic Implementation Essentials
  • Last Update: Sep 12, 2025
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-404 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-404 Practice Exam Questions with Answers Oracle Communications Session Border Controller 7 Basic Implementation Essentials Certification

Question # 6

Which SIP headers in an incoming SIP message to the Session Border Controller are used by a local-policy configuration element for routing?

A.

From and To headers

B.

From header and Request-URI

C.

Call-Id header

D.

Contact header

E.

Via and To headers.

Full Access
Question # 7

What is the effect of executing the save-config command in superuser mode?

A.

The running configuration version is reset to 1.

B.

The running configuration version does not increase and is equal to the saved configuration version.

C.

The saved configuration version increases by 1 and is higher than the running configuration version.

D.

The running configuration version increases by 1 and is higher than the saved configuration version.

E.

The editing configuration version increases by 1 and is higher than the saved configuration version.

Full Access
Question # 8

In which two ways can you remove support for telnet from a media interface? (Choose two.)

A.

Navigate to the network-interface configuration element and run the delete-hip-ip command.

B.

Navigate to the phy-interface configuration element and run the remove-hip-ip command.

C.

Navigate to the network-interface configuration element and run the remove-telnet-ip command.

D.

Navigate to the network-interface configuration element and run the remove-hip-ip command.

E.

Navigate to the phy-interface configuration element and run the remove-telnet-ip command.

Full Access
Question # 9

What does the Session Border Controller do when the Adaptive Hosted NAT (HNT) feature is enabled?

A.

It sends a periodic re-register command to each endpoint behind a NAT.

B.

It creates a binding for the Address of Record (AOR) of an endpoint that is behind a NAT.

C.

It creates a binding for the Address of Record (AOR) of an endpoint that is NOT behind a NAT.

D.

It sends SIP OPTIONS at increasing intervals to test if an endpoint behind a NAT device is still reachable.

E.

It sends ICMP PNGs to dynamically learn the binding time of an endpoint behind a NAT device.

Full Access
Question # 10

What configuration step is required for booting the Session Border Controller from an external FTP server?

A.

Navigate to the bootparams configuration branch and set the host inet field to the IP address of the external BOOTP Server from which the Session Border Controller can boot.

B.

Navigate to the system configuration branch and set the ip address field of the wancom1 management interface.

C.

Navigate to the bootparams configuration branch and set the ip address field of the destination SIP device with which the Session Border Controller needs to interact.

D.

Navigate to the system configuration branch and set the ip address field of the wancom0 management interface.

E.

Navigate to the bootparams configuration branch, set the host inet or Host IP, FTP username, and FTP password for the external FTP Server in which the image file resides.

Full Access
Question # 11

How does the SIP registrar server maintain the registered user’s information in its database?

A.

by querying a DNS server

B.

by querying an ENUM server

C.

by creating a registration cache entry, which is an association between a layer 3 IP address and the User Agent (UA) Via address

D.

by creating a location record, which is an association between the Call-ID and the User Agent (UA) Contact address

E.

by creating a binding, which is an association between a globally unique SIP URI and the User Agent (UA) Contact address

Full Access
Question # 12

Which configuration step is required to route a SIP call based on the value of the SIP INVITE Request-URI?

A.

Navigate to the policy-attribute configuration element and configure the from-address parameter to match the Request-URI value.

B.

Navigate to the policy-attribute configuration element and configure the to-address parameter to match the Request-URI value.

C.

Navigate to the local-policy configuration element and configure the from-address parameter to match the Request-URI value.

D.

Navigate to the local-policy configuration element and configure the to-address parameter to match the Request-URI value.

E.

Navigate to the local-policy configuration element and configure the destination-address parameter to match the Request-URI value.

Full Access
Question # 13

What is used by the standby Session Border Controller to send ARP requests via the media interface in a High Availability (HA) architecture?

A.

the IP utility address and its virtual MAC address

B.

the virtual IP address and its hardcoded MAC address

C.

the IP utility address and its hardcoded MAC address

D.

the virtual IP address and its virtual MAC address

E.

the IP utility address and the MAC utility address

Full Access
Question # 14

What two problems do Network Address Translations (NATs) introduce into VoIP networks? (Choose two.)

A.

There are no major concerns with NATs.

B.

NATs block unsolicited incoming signaling and media.

C.

NATs block unsolicited incoming signaling but allow incoming media.

D.

NATs pinholes expire after a configurable time.

E.

NATs devices can be overloaded by incoming registrations.

Full Access
Question # 15

The Session Border Controller needs to be configured to act as a Back-to-Back User Agent (B2BUA).

How would you accomplish this?

A.

Navigate to the sip-config configuration element and set the operation-mode to stateless.

B.

Navigate to the sip-config configuration element and set the operation-mode to dialog.

C.

Navigate to the sip-config configuration element and set the operation-mode to stateful.

D.

Navigate to the session-router configuration element and set the operation-mode to dialog.

E.

Navigate to the session-router configuration element and set the operation-mode to none.

Full Access
Question # 16

Your Session Border Controller is configured as the source and destination for all signaling messages and media streams coming into and leaving the provider’s network.

Which two SIP functions does it provide? (Choose two.)

A.

an IP edge router

B.

Back-to-Back User Agent (B2BUA)

C.

Edge proxy

D.

Data firewall

E.

Media gateway

Full Access
Question # 17

What should you do to enable physical interface redundancy?

A.

Navigate to the system-config configuration element and set the phy-redundancy parameter to enabled.

B.

Navigate to the network-interface configuration element and set the phy-redundancy parameter to enabled.

C.

Navigate to the network-interface configuration element and set the link-redundancy-state parameter to enabled.

D.

Navigate to the system-config configuration element and set the link-redundancy-state parameter to enabled.

E.

Run the superuser command enable phy-redundancy.

Full Access
Question # 18

Where are passwords and licensing information stored?

A.

Non-Volatile Random Access Memory (NVRAM)

B.

Content Addressable Memory (CAM)

C.

RAM memory

D.

Synchronous Dynamic Random Access Memory (SDRAM)

E.

Boot Flash

Full Access
Question # 19

Your customer would like to allow call attempts only from User Agents (UAs) who have previously registered through the Session Border Controller or who are configured as session agents.

How would you accomplish this?

A.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to agents-only.

B.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to prev-registered.

C.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to realm-prefix.

D.

Navigate to the sip-port configuration element and set the allow-anonymous parameter to registered.

E.

Navigate to the session-agent configuration element and set the allow-anonymous parameter to 403-forbidden.

Full Access
Question # 20

To ensure proper operation of a Session Border Controller High Availability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.

How is this type of traffic accommodated?

A.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the management interfaces

B.

by setting the pri-utility-addr, sec-utility-addr, and sec-gateway values to addresses in the same subnet as the IP address configured on the media interfaces

C.

by setting the utility address and sec-gateway values to addresses in different subnets as the IP address configured on the wancom interfaces

D.

by setting a unique address on the wancoml and wancom2 interfaces via the utility address command

E.

via the utility address parameters on the wancoml and wancom2 interfaces

Full Access
Question # 21

You configured the Session Agent Group (SAG) element. You want the Session Agent to be selected in the order in which they are listed in the destination list, with each agent selected in turn, one per session.

How would you accomplish this?

A.

Navigate to the session-agent configuration element and set the strategy parameter to sequential.

B.

Navigate to the session-agent configuration element and set the strategy parameter to propdist.

C.

Navigate to the session-agent configuration element and set the strategy parameter to hunt.

D.

Navigate to the session-agent configuration element and set the strategy parameter to roundrobin.

E.

Navigate to the session-agent configuration element and set the strategy parameter to leastbusy.

Full Access