Technology Standards and Protocol
For Converged Networks
Exam Questions, Answers,
I think it was tough but thanks to www.examcheats.net
. I purchased their study material and got through.
The stuff had drag and drops, exhibits and all that
is required for the exam.
Given the following network information:
1. The call server located at the corporate office is
accessible directly through the LAN by local employees.
2. Remote office are able to access the corporate server
through a managed Internet service Provider (ISP)
3. The corporate network and all endpoint have firewalls
that limit access. Only ports 22 and 443 allow traffic
traversal for the servers.
4. The firewalls are provided and managed by the ISP
and their contract is exclusive for the next three years.
5. The firewalls are NOT stateful and do NOT understand
the complexities of SIPorH.323.However, the ISP will
NOT replace them without a significant charge to the
Which two solutions can the company implement to enable
VoIP traffic to securely traverse the network? (Choose
A. Configure SIP-proxy servers on the network to intercept
and propagate the VoIP traffic through the ISP-managed
B. Install Virtual Private Network (VPN) devices at
the remote locations. These can intercept and encapsulate
VoIP traffic going to and from the call server with
tunneling using port 443.
C. Implement VPN devices at all locations with split
tunneling configured to tunnel VoIP traffic with QoS
to the call server. This moves the VoIP traffic from
the Internet and only makes it accessible on the intranet.
The ISP will need to be asked to allow the VPN tunnel
D. Recommend that the customer purchase their own SIP/H.323-Capable
firewalls fro the opposite ends of all the managed connections.
The firewalls need to be placed in front of the ISP-owned
firewalls and firewall ports need to be opened to permit
Answer: B C
Abc .com has recently migrated their network from a
dedicated Frame Relay (FR) WAN to managed full-mesh
IP Security Protocols (IPSec) Virtual Private Network
(VPN). Given the following network information:
1. All of the branch offices are now connected to the
main data center and to each other through the full-mesh
2. For branch offices with 50 to 100 users and data
connection to the managed IPSec-VPN is provided via
a cable modem at a rate of 2 Mbps.
3. The branch offices with 10 to 50 users also use cable
modems but with bandwidths of 1 Mbps to the managed
4. The individual home-office users are provided with
synchronous Digital Subscriber Line (DSL) connections
that are 256 kbps, that are tunneled to the managed
IPSec-VPN using a Customer Provided Equipment (CPE)
based IPSec-VPN device.
5. Other than the individual home-office users, the
traffic leaving the branch office locations is NOT encrypted
until it leaves the local networks and enters the IPSec-VPN
at the Internet Service Provider (ISP) backbone.
VoIPsystem tests find that there is significant jitter
on the home-office users' VoIP calls when they attempt
to download e-mail at the same time. Which two network
issues are the most plausible causes of the VoIP traffic
issue? (Choose two.)
A. The IPSec-VPNs do NOT have QoS to manage the VoIP
B. Delays introduced by the e-mail server cause the
VoIP traffic to be queued until the e-mail transfer
starts to send out a smooth flow of data.
C. Circuit bandwidths speeds are greater than the speed
at which the IPSec-VPN devices can encrypt and decrypt,
resulting in additional delay and jitter in the VoIP
D. The processor on the CPE that is terminating the
IPSec-VPN can only handle the processing of the VoIP
call or the e-mal transfer while encrypting either into
the IPSec-VPN tunnel.
E. VoIP is more difficult to secure in an IPSec-VPN
than typical IP traffic, thus the IPSec-VPN device is
taxed with the additional processing, which slows the
transmitting of the VoIP payload.
Answer: A C
Given the following network information:
1. All remote users are restricted to 56 kbps dial-up
access to the company network.
2. The Layer 1 connections between the campus buildings
consist of T3/E3 circuits to their local Internet Service
Provider (ISP), which routes their Layer 3 information
to the Internet
3. The IP Security Protocols (IPSec) Virtual Private
Network (VPN) tunnels are currently exceeding the bandwidth
of the circuits between the VPN tunnel and points.
4. The VoIP calls that are being completed between campus
buildings are noticeably degrading during hours of peak
5. All intra- and inter-office communications are using
the G.711 CODEC between the Internet Telephones and
the VoIP call servers.
6. All VoIP calls made by the remote users are using
the G.729 CODES.
7. During random times of the day, the IP-VPN tunnel
are NOT using the full bandwidth of the T3/E3 circuits,
but latency across the tunnels between campus buildings
is excessive (>=150 milliseconds.)
Which three recommendations should you make to prevent
the degradation of VoIP traffic as it traverses the
IPSec-VPN tunnels along with all other traffic? (Choose
A. Add an IP-VPN device at each campus building to handle
additional inter-office traffic.
B. Recommend a configuration that forces remote users
to use L2TP tunnels to access the network.
C. Recommend a managed backbone other than the Internet
for inter-office traffic, such as Asynchronous Transfer
Mode (ATM) or Frame Relay (FR).
D. Verify that al remote users have their Internet Telephones
configured with the G.711 CODEC.
E. Verify that all remote users have their Internet
Telephones configured with the G.711 CODEC.
F. Recommend IP-VPN termination for remote client PCs
on the Internet (aggressive mode) with DiffServ and
Answer: A B C
An organization that has Internet Telephones and VoIP
applications throughout its network is having issues
with equipment that has been recently deployed. Given
the following network information:
1. Recently a disabled firewall that has been forwarding
al traffic was discovered on the network. It is located
between the segment on which all executives are connected
and the rest of the organization's backbone.
2. Per the organization's security policy, this firewall
as immediately re-enabled to protect the executive data.
As a result, the executive network is NO longer able
to log in to the call servers.
3. The call servers and the Internet Telephones use
the SIP and the g.711 CODEC for the voice portion of
4. Upon review of the firewall policies and specifications,
it has been identified as a proxy firewall for File
Transfer Protocol (FTP) and Hypertext Transfer Protocol
(HTTP) traffic. The policies on the firewall permit
all traffic from the executive LAN into the organization's
backbone and drop all other traffic.
Which recommendation would enable the executive LAN
to make VoIP calls again, maximize network security,
and require minimal IT support?
A. Install an additional PC-based gateway device to
act as a SIP proxy for the VoIP calls.
B. Replace the proxy firewall with a stateful-inspection
firewall, which is able to understand SIP.
C. Leave the proxy firewall in place and install an
ESP/AH based-VPN (Virtual Private Network) to get the
VoIP calls to the call server.
D. Replace the proxy firewall with a router that has
packet filtering enabled. Then open up the appropriate
ports needed for communication.
When planning for the installation of a VoIP telephone
system that is going to be responsible for both basic
and enhanced emergency-service calls, which three statements
are true? (Choose three.)
A. Identification of the locations of VoIP callers is
the responsibility of the telephone-service carriers
of the VoIP callers.
B. Keeping E/911 and E/211 database updated with the
latest information in the ALI is essential for dispatching
emergency crews to the right emergency locations.
C. The ability to have VoIP callers move their own telephones
represents a potentially life-threatening issue when
you consider the importance of E/911 and E/211 call
D. If emergency station location details are NOT updated
in the Automatic Location Identifier (ALI), a Public
Service Answering Point (PSAP) may dispatch an emergency
crew to the wrong location.
Answer: B C D
Given the following VoIP system information, evaluate
the company's VoIP implementation for potential issues
or non-compliance to emergency-service requirements:
1. A company has installed a VoIP system that is able
to identify the location of a caller based on the telephone
that the caller uses to place a call.
2. The company is moving to a new office and all employees
are asked to move their own Internet Telephones to their
new desks in the new office.
3. The administrator of the VoIP telephone system moves
the VoIP gateway device form the old office to the new
office on moving day without making any changes to database
for user location identification.
4. Upon completion of the VoIP gateway move, the administrator
is out of the office due to a family emergency for three
days. During that time a few employees have engineered
their Internet Telephones to make calls from their home
office using the company VoIP gateway/switch.
What are the two liability assessments for this configuration?
A. A Public Service Answering Point (PSAP) NOT located
in the same jurisdiction as the caller could answer
all call types, but this is NOT standard operating procedure.
B. All E911/E211 calls could encounter connection issues,
but this could be corrected once the VoIP administrator
updates the user database.
C. A PSAP NOT located in the same jurisdiction as the
caller could answer emergency calls, but these calls
would receive NO delay in response the emergency.
D. All call types could be completed successfully and
in the most expedient manner, but there could be issues
with the locations and identification of E911/E211 callers.
E. All call types would NOT indicate the number the
calls originated from because the Automatic Number information
(ANI) would NOT be available. This information would
only be available to Internet Telephones that are able
to identify caller locations via E911/E211.
Answer: A B.
Abc .com has an IP WAN with multiple routes supporting
various data applications. They have added support for
VoIP to take advantage of enhanced services and bandwidth
efficiencies. The voice traffic has frequently been
distorted, and technicians suspect that the cause is
serial delay (jitter) within the routing scheme. Which
two viable approaches can the customer use in the router
setup to help reduce this issue? (Choose two.)
A. Implement Layer 2 fragmentation on the WAN links.
B. Use voice compression for packets tagged as voice.
C. Use small packets for VoIP so that less time is spent
accumulating voice samples.
D. Use large packets for VoIP so that more of a voice
sample can be sent at one time.
Answer: A C
Abc .com plans to implement VoIP within the year. You
are assigned to access the network status and recommend
changes that may be required to support VoIP. Given
the following network conditions:
1. The two core routers have eight of ten slots populated.
2. The Central Processing Unit (CPU) usage of the core
routers is at a baseline of 85%.
3. One Open Shortest Path First (OSPF) area is configured
for every two interfaces.
4. Routers are based on a distributed processing architecture.
5. Each core router maintains four LinkStateDatabases
6. New code is able to loaded to make the routers Differentiated
Services (DiffServ) capable.
Which action should you take to reduce the CPU utilization
in preparation of DiffServ queuing?
A. Add a passive standby CPU.
B. Reduce the number of OSPF areas on each router.
C. Enable the compression accelerator card on each router.
D. Do nothing the performance of the installed core
routers CANNOT be improved.