Convergence Technologies Professional 2007
Answers, Braindumps (TT0-201)
www.exams.ws and www.examcheets.com .
What is the name of the record in a DNS server that
is used to translate E.164 numbers into URIs (addresses)
that can be used by a variety of data applications?
Question No: 2
Which of the following is often the most likely cause
of static electricity problems with convergence equipment?
B. Improper grounding.
Question No: 3
When calculating bandwidth consumption, which of the
following factors should you consider?
A. Codec, Ethernet overhead, and silence suppression.
B. QoS settings, codec, and compression.
C. Codec, Mean Opinion Score (MOS), and Ethernet overhead.
D. Maximum Transmission Unit (MTU), Ethernet overhead,
and QoS settings.
Question No: 4
Which of the following best describes the IPv4 and IPv6
A. In IPv4, each of the four fields is separated by
a period. In an IPv6 address, each of the eight fields
is separated by a colon.
B. In IPv4, the 32-bit fields are separated by a period.
In an IPv6 address, each of the 16-bit fields is separated
by a colon.
C. In IPv4, the subnet mask fields are separated by
a dash. In an IPv6 address, each of the ten fields is
separated by a colon.
D. In IPv4, each of the four fields is separated by
a period. In an IPv6 address, each of the seven fields
is separated by a colon.
Question No: 5
Which of the following will best help you determine
the presence of bottlenecks in a switched LAN?
A. Create a traffic baseline.
B. Enable VLAN hopping.
C. Create an Acceptable Use Policy (AUP).
D. Disable frame tagging.
Question No: 6
Which of the following is based on the Extensible Authentication
Protocol (EAP), usually uses a RADIUS server, can be
used to authenticate wireless voice and video users,
but does not specify encryption of data?
A. 802.1 x
B. A gatekeeper.
C. A gateway.
Question No: 7
You have just installed a wireless access point that
you plan to use for voice and video calls. Which of
the following is an essential setting to put in place
so that you can prioritize multiple traffic streams?
A. Multiple SSID entries.
B. MAC address filtering.
C. Larger MTU settings.
D. Multiple default gateways.
Question No: 8
Which of the following best describes IPsec Tunnel Mode?
A. Tunnel mode does not support the ability to traverse
NAT implementations, unless you use additional software
or hardware solutions.
B. Only the header of the packet is encrypted. The rest
of the packet, including the data, is not encrypted.
C. It encapsulates network traffic inside of an IP packet
for delivery to a remote network.
D. Tunnel mode does not support the encryption of data
Question No: 9
Which of the following accurately describes the H.323
A. It was originally designed for multimedia applications.
B. It was originally designed to be a lightweight, customizable
C. It has native QoS support.
D. It has native encryption support.
Question No: 10
Which of the following are common elements of a Call
Detail Record (CDR)?
A. Amount billed for each call, IP address of calling
host, QoS results.
B. Caller, duration, and amount billed for each call.
C. IP address of calling host, duration, and Mean Opinion
D. Conversation time, QoS results, and caller.
Question No: 11
Which of the following does an Analog Telephone Adapter
(ATA) use to connect directly to a network?
A. A crossover cable.
B. Foreign Exchange Station (FXS).
C. RJ-11 connector.
D. RJ-45 connector.
Question No: 12
Given the host IP address of 126.96.36.199 and subnet
mask of 255.255.255.192, what is the network number
for the attached network?
Question No: 13
Where is a jitter buffer typically implemented?
A. At the transmitting end of the voice connection.
B. At the network layer 3 switch.
C. At the receiving end of the voice connection.
D. At the network layer 2 switch.
Question No: 14
Customers have called complaining that their VoIP call
quality has suffered. Your routers are responsible for
concentrating multiple E1 and E4 lines. You suspect
a problem with your routers. Which of the following
will most likely help you determine the specific cause
of the problem?
A. Determining number of packets sent out of sequence.
B. Determining frequency of routing table updates.
C. Checking CPU usage statistics.
D. Checking the Access Control List (ACL) of the primary