|
Question 1.
What will be the outcome of an incoming VoIP call arriving at CK2 from CK1 , given the following router configurations?
CK1 Configuration
dial-peer voice 1 pots
destination-pattern 1111
port 1/0/0
CK2 Configuration
dial-peer voice 1 pots
destination-pattern 2222
port 1/0/0
!
dial-peer voice 2 voip
destination-pattern 1111
session-target ipv4:172.16.1.1
A. The call setup will proceed by matching dial-peer 1 pots, but will have one-way audio.
B. The call setup will fail.
C. The call setup will proceed and audio path will be established by matching the inbound call to
the default dial peer.
D. The call setup will proceed, but will have no audio path.
Answer: C
Question 2.
Which preference key word assigns top precedence to a dial peer in a hunt-group?
A. 0
B. priority
C. 1
D. high
Answer: A
Question 3.
What are two basic parameters needed to setup a dial peer connected to the PSTN?
(Choose two)
A. voice port
B. signaling type
C. interface bandwidth
D. destination pattern
Answer: A, D
Explanation:
Depending on the call leg, a call is routed using one of the two types of dial peers:
POTS—Dial peer that defines the characteristics of a traditional telephony network connection.
POTS dial peers map a dialed string to a specific voice port on the local router, normally the voice port connecting the router to the local PSTN, PBX, or telephone.
Voice-network—Dial peer that defines the characteristics of a packet network connection. Voicenetwork dial peers map a dialed string to a remote network device, such as the destination router that is connected to the remote telephony device.
The following examples show basic configurations for POTS and VoIP dial peers:
dial-peer voice 1 pots
destination-pattern 555....
port 1/0:1
dial-peer voice 2 voip
destination-pattern 555....
session target ipv4:192.168.1.1
Question 4.
You have set up Call Admission Control for a customer between their headquarters and manufacturing facility over their Frame Relay WAN. You are using the G.726r16 codec with a 40 byte sample, CRTP without CRC, and 90 kbps configured as the maximum bandwidth for CAC to use.
What will happen when 7 calls try to call the remote office?
A. All the calls will go through without any quality issues.
B. Only 4 calls will go through and the remainder will get a reorder tone.
C. Six calls will go through, and the seventh call will be placed on hold until bandwidth is
available.
D. Three calls will cross the Frame Relay WAN link, and four will use the PSTN with AAR.
Answer: B
Question 5.
You have designed a complex dial plan using digit manipulation. Given the following snippet of your configuration file, what action would you expect to result when a call beginning with the digits "5501" is received?
destination-pattern 5501... ...
prefix
port 1/0/0
A. A nine digit number beginning with 5501 will be forwarded.
B. A ten digit number beginning with 5501 will be forwarded.
C. A nine digit number beginning with 5501612 will be forwarded.
D. A ten digit number beginning with 5501612 will be forwarded.
Answer: B
Explanation:
Destination Pattern
The destination pattern associates a dialed string with a specific telephony device. It is configured in a dial peer by using the destination-pattern command. If the dialed string matches the destination pattern, the call is routed according to the voice port in POTS dial peers, or the session target in voice-network dial peers. For outbound voice-network dial peers, the destination pattern may also determine the dialed digits that the router collects and then forwards to the remote telephony interface, such as a PBX, a telephone, or the PSTN. You must configure a destination pattern for each POTS and voice-network dial peer that you define on the router.
The destination pattern can be either a complete telephone number or a partial telephone number with wildcard digits, represented by a period (.) character. Each "." represents a wildcard for an individual digit that the originating router expects to match. For example, if the destination pattern for a dial peer is defined as "555....", then any dialed string beginning with 555, plus at least four additional digits, matches this dial peer.
Question 6.
Which statement represents the definition of an MGCP endpoint?
A. The interconnection between packet and traditional telephone networks.
B. Any analog telephony device (PBX, switch, ect).
C. IP hones
D. The gatekeepers in a VoIP network.
Answer: A
Explanation:
A typical MGCP gateway environment connects on one side with a public switched telephone network (PSTN), and on the other side with an IP network. Specialized call agent applications control the flow of media data across the distributed environment. Call agents determine the route that data follows as it flows through the system. Multiple call agents can control call processing and data transfer. These call agents use a separate protocol to synchronize with each other and to send coherent commands to modules under their control.
MGCP assumes a connection model where the basic constructs are endpoints and connections. Endpoints are sources or sinks of data and could be physical or virtual.
Examples of physical endpoints are:
* An interface on a gateway that terminates a trunk connected to a PSTN switch (e.g., Class 5, Class 4, etc.). A gateway that terminates trunks is called a trunk gateway.
* An interface on a gateway that terminates analog POTS connection to a phone, key system, PBX, etc. A gateway that terminates residential POTS lines (to phones) is called a residential gateway.
An example of a virtual endpoint is an audio source in an audio- content server. Creation of physical endpoints requires hardware installation, while creation of virtual endpoints can be done by software.
Question 7.
Standard PCM encodes voice at which sampling rate?
A. 16 kbps
B. 32 kbps
C. 64 kbps
D. 128 kbs
Answer: C
Question 8.
You are using class-based weighted fair queuing (CBWFQ) to manage queues in your network. Voice quality has been inconsistent over lower speed WAN links and users have been complaining. You have decided to configure low latency queuing (LLQ) on the lower speed links to help improve voice quality in the network.
Which three of the following steps should you take to implement LLQ in the network?
(Choose three)
A. Ensure voice traffic is marked with a value EF in the DSCP.
B. Assign voice traffic control protocol traffic to its own queue with a DSCP value of AF31.
C. Assign all voice traffic to the priority queue in LLQ.
D. Assign all non time-sensitive, nonvoice traffic to a default queue with a DSCP value of 0.
E. Ensure voice traffic is given a minimum of 20% of available bandwidth through policing.
F. Ensure that all nonvoice traffic does not exceed more than 75% of available bandwidth.
Answer: A, B, D
Question 9.
Which gateway interface connects to the standard station port of a PBX?
A. FXS
B. E&M
C. POTS
D. FXO
Answer: D
Question 10.
Use the exhibit to answer the following questions.
When a call is placed from extension 1001 to 555-2212, which outbound dial peer is matched?
A. dial-peer voice 5 voip
destination-pattern 55[1-5]5[01][0-4].
B. dial-peer voice 1 voip
destination-pattern 55[0-1]0[1-3]..
C. dial-peer voice 2 voip
destination-pattern .!5551978
D. dial-peer voice 4 voip
destination-pattern 55[153][19]...[19][19][1]
E. dial-peer voice 3 voip
destination-pattern .T
Answer: E
|
Question 1. You work as DBA at ITCertKeys.com. You administer two Windows Server 2003 computers named ITCertKeysA and ITCertKeysB. You install SQL Server 2005 on both ITCertKeysA and ITCertKeysB to host a new company database. ITCertKeysA hosts a read-write copy of the company database in which all changes are made. ITCertKeysB subscribes to a publication on ITCertKeysA and is only used for reporting. A Windows domain administrator provides you with a domain user account named SQLSRV to use as the security context for the SQL Server services. A password policy of 42 days exists in the Default Domain Group Policy object (GPO). You install the database on ITCertKeysA and ITCertKeysB and configure replication. Everything works fine for six weeks, but then all SQL Server services fail. You need to correct the problem. What should you do? A. Ask the Windows domain administrator to grant the Log on as service right to the SQLSRV domain user account. B. Configure the SQLSRV domain user account with a new strong password. Configure the new password in the properties of each SQL Server service that failed. C. Create a local user account on ITCertKeysA named ITCertKeysA and a local user account on ITCertKeysB named ITCertKeysB. Configure ITCertKeysA and ITCertKeysB to run under the context of the appropriate local user account. D. Ask the Windows domain administrator to grant the SQLSRV domain user account membership in the Domain Admins group. Answer: B Explanation: The Default Domain Group Policy object requires that passwords are changed every 42 days. In order to correct this problem you have to change the password in the Active Directory AND configure the new password on both you SQL Servers to the newly changed password. Question 2. You are a database administrator of two SQL Server 2005 computers named ITCertKeysA and ITCertKeysB. You have a Microsoft .NET application that has been modified so that it now accesses a database on ITCertKeysB in addition to ITCertKeys A. You do not want the user application to connect directly to ITCertKeysB. You need to enable the data retrieval from ITCertKeysB while maintaining the ability to assign different permissions to different users who use the .NET application. What should you do? A. Change the .NET application to define a new server connection to ITCertKeysB. B. Configure a linked server on ITCertKeysA to point to ITCertKeysB. C. Change the stored procedures called by the .NET application to include the OPENXML command. D. Configure a linked server on ITCertKeysB to point to ITCertKeysA. Answer: B Explanation: SQL Server lets you access external data sources from your local Transact-SQL code. You need to define a linked server for each external data source you want to access and then configure the security context under which your distributed queries will run. After you create a linked server, you can use the Transact-SQL OPENQUERY function to execute your distributed queries. Question 3. You are a database administrator for ITCertKeys.com. Your company uses a different company's application that is based on SQL Server 2005 Standard Edition. The application executes a query that uses an index query hint. The index query hint is not suitable for your environment, but you cannot modify the query. You need to force the application to use a different query execution plan. What should you do? A. Create a plan guide for the query. B. Clear the procedure cache. C. Create a new covering index on the columns that the query uses. D. Update the statistics for all of the indexes that the query uses. Answer: A Over the past few years, Microsoft SQL Server has increased its presence in the industry and has reduced its TCO. This reduced TCO is a direct result, primarily, of the numerous self-tuning mechanisms built into Microsoft(r) SQL Server. These mechanisms automatically perform tasks that would otherwise have to be performed by experienced database administrators. One such mechanism is the cost-based optimizer (CBO) that is used to dynamically generate query execution plans. The CBO probes several system-wide resource states and employs many complex, heuristical algorithms to generate the best possible plan for a given query and the underlying table and index structures. This mechanism works well for the vast majority of user queries, but there are times when experienced users need to force a particular query plan, based on some prior knowledge or insights into future uses. Question 4. You are a database administrator for ITCertKeys.com. Your SQL Server 2005 computer contains one user database that holds sales transaction information. Users report that the queries and stored procedures that they use every day are taking progressively longer to execute. You also notice that the amount of free disk space on the SQL Server computer is decreasing. You need to create a maintenance plan to correct the performance and storage problems. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. In the SQL Server Maintenance Plan Wizard, use the Check Database Integrity option. B. In the SQL Server Maintenance Plan Wizard, use the Reorganize Index option. C. In the SQL Server Maintenance Plan Wizard, use the Shrink Database option. D. In the SQL Server Maintenance Plan Wizard, use the Clean Up History option. E. In the SQL Server Maintenance Plan Wizard, use the Execute SQL Server Agent Job option. Answer: B, C Explanation: When you indexes are not heavily fragmented you can reorganize indexes, which uses few system resources and runs automatically online. In SQL Server 2005, certain operations such as large delete operations or -one-time data loads might leave database files larger than they need to be. SQL Server 2005 enables a DBA to shrink each file within a database to remove unused pages and regain disk space. Question 5. You are a database administrator for ITCertKeys.com. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use? A. DBCC INDEXDEFRAG B. SELECT * FROM sys.dm_db_index_physical_stats C. SELECT * FROM sys.indexes D. DBCC DBREINDEX Answer: B Explanation: The index_physical_stats function takes five parameters: database_id, object_id, index_id, partition_id, and mode. This function returns row size and fragmentation information. Question 6. You work as DBA at ITCertKeys.com. You administer two SQL Server 2005 computers named ITCertKeysA and ITCertKeysB. ITCertKeysA and ITCertKeysB contain a copy of a database named Sales. The database is replicated between ITCertKeysA and ITCertKeysB by using transactional replication. A full backup of each database is performed every night. Transaction log backups are performed every hour. Replication latency is typically less than two minutes. One afternoon, the Sales database on ITCertKeysA becomes corrupted. You are unable to repair the database. The Sales database on ITCertKeysB is unaffected. You need to return the Sales database on ITCertKeysA to normal operation as quickly as possible. You must ensure a minimum loss of data and minimal impact to users of either server. What should you do? A. Perform a full database backup on ITCertKeysB. Restore the backup to ITCertKeysA. B. Restore the most recent full database backup and all transaction logs made since the full backup was made. C. Restore only the most recent transaction log backup. D. Detach the Sales database on ITCertKeysB. Copy the database file to ITCertKeysA, and attach the database on both servers. Answer: A Explanation: Detaching the database will not apply to the minimal impact on users as it will be offline during copy. Restoring only the latest transaction log will not give you a working database and restoring last full backup and all transaction logs after that will not apply to the restore normal operations as quickly as possible part of the requirements. Question 7. You are a database administrator for ITCertKeys.com. The company runs a popular database-driven Web site against a SQL Server 2005 computer named ITCertKeysB. You need to ensure a quick response time and appropriate audit trail in the event that ITCertKeysB experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Configure the new performance alert to start a SQL Server Profiler trace. B. Create a new performance alert to monitor the Current Bandwidth counter. C. Configure the new performance alert to start a Network Monitor capture. D. Create a new performance alert to monitor the Bytes Total/sec counter. Answer: C, D Explanation: Using alerts, System Monitor tracks specific events and notifies you of these events as requested. An alert log can monitor the current performance of selected counters and instances for objects in SQL Server. When a counter exceeds a given value, the log records the date and time of the event. An event can also generate a network alert. Characteristic for a typical DoS attack is a large number of Bytes/sec. Characteristic for a DDoS attack is also a large number of Bytes/sec but also a large number of connections made from a large number of hosts. Question 8. You are a database administrator for ITCertKeys.com. One of the databases on a SQL Server 2005 computer contains a stored procedure. Users run this stored procedure to import data into a table. The stored procedure needs to use the TRUNCATE TABLE command before importing new data into the table. However, the users who run the stored procedure do not have permission to truncate the table. You need to provide a way for the stored procedure to truncate the table before it imports new data. What should you do? A. Configure the stored procedure to use the EXECUTE AS command. B. Configure the stored procedure to be owned by the same database user as the table. C. Assign the users DELETE permission in the table. D. Add the users to the db_datawriter fixed database role. Answer: A Explanation: In SQL Server 2005 you can implicitly define the execution context of the following user-defined modules: functions (except inline table-valued functions), procedures, queues, and triggers. By specifying the context in which the module is executed, you can control which user account the SQL Server 2005 Database Engine uses to validate permissions on objects that are referenced by the module. This provides additional flexibility and control in managing permissions across the object chain that exists between user-defined modules and the objects referenced by those modules. Permissions must be granted to users only on the module itself, without having to grant them explicit permissions on the referenced objects. Only the user that the module is running as must have permissions on the objects accessed by the module. Syntax: Functions (except inline table-valued functions), Stored Procedures, and DML Triggers { EXEC | EXECUTE } AS { CALLER | SELF | OWNER | 'user_name' } Question 9. You are a database administrator for ITCertKeys.com. You have separate SQL Server 2005 development and production environments. You use the Business Intelligence Development Studio to create a SQL Server Integration Services (SSIS) package in your development environment. Then, you use the SSIS package to import data into your development environment from one of your company's trading partners. You need to deploy the SSIS package to your production environment. Your production environment uses different table names than your development environment. What should you do? A. Save the SQL Server Integration Services (SSIS) package to a file. Copy the file to the production server. Configure the SSIS package on the production server to use the new file. B. Back up the master database and restore it to the production server. Rename the appropriate tables inside the master database. C. Create a SQL Server Integration Services (SSIS) package configuration. Build a deployment utility. Copy the deployment folder for your SSIS project to your production server. Execute the manifest file. D. Back up the msdb database and restore it to the production server. Rename the appropriate tables inside the msdb database. Answer: C Explanation: You have to use a SSIS package to accomplish this but you can not use the package built for your development environment as the table names differ. Question 10. You are a database administrator for ITCertKeys.com. You notice that one of the data files on a SQL Server 2005 computer is corrupted. You need to restore the database from the most recent set of backups. You want to perform this task as quickly as possible, with a minimum loss of data. What should you do first? A. Restore the most recent transaction log backup. B. Restore the most recent full database backup. C. Perform a full database backup. D. Perform a transaction log backup. Answer: D Explanation: In order to restore from the most recent set of backups, you have to first ensure that you can restore all transactions that have occurred between the time of the backup and the time when the database went corrupt. In order to accomplish this you should backup the transaction log.
|
Help me with Dumps Plzzz. thanks
|
Nice collection with answers visit itcertkeys.com thanks buddy
|
Urgent Requred lastest dumps thanks buddy
|
I Need Dumps plz help thanks
|
Help Please! need dumps thanks buddy
|
Need Dump, Please help thanks buddy
|
looking for a dump thanks buddy
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.