Technology Standards and Protocol
For Converged Networks
Exam Questions, Answers,
I think it was tough but thanks to www.examcheets.com
. I purchased their study material and got through.
The stuff had drag and drops, exhibits and all that
is required for the exam.
Given the following network information:
1. The call server located at the corporate office
is accessible directly through the LAN by local employees.
2. Remote office are able to access the corporate
server through a managed Internet service Provider
3. The corporate network and all endpoint have firewalls
that limit access. Only ports 22 and 443 allow traffic
traversal for the servers.
4. The firewalls are provided and managed by the ISP
and their contract is exclusive for the next three
5. The firewalls are NOT stateful and do NOT understand
the complexities of SIPorH.323.However, the ISP will
NOT replace them without a significant charge to the
Which two solutions can the company implement to enable
VoIP traffic to securely traverse the network? (Choose
A. Configure SIP-proxy servers on the network to intercept
and propagate the VoIP traffic through the ISP-managed
B. Install Virtual Private Network (VPN) devices at
the remote locations. These can intercept and encapsulate
VoIP traffic going to and from the call server with
tunneling using port 443.
C. Implement VPN devices at all locations with split
tunneling configured to tunnel VoIP traffic with QoS
to the call server. This moves the VoIP traffic from
the Internet and only makes it accessible on the intranet.
The ISP will need to be asked to allow the VPN tunnel
D. Recommend that the customer purchase their own
SIP/H.323-Capable firewalls fro the opposite ends
of all the managed connections. The firewalls need
to be placed in front of the ISP-owned firewalls and
firewall ports need to be opened to permit VoIP traffic.
Answer: B C
Abc .com has recently migrated their network from
a dedicated Frame Relay (FR) WAN to managed full-mesh
IP Security Protocols (IPSec) Virtual Private Network
(VPN). Given the following network information:
1. All of the branch offices are now connected to
the main data center and to each other through the
2. For branch offices with 50 to 100 users and data
connection to the managed IPSec-VPN is provided via
a cable modem at a rate of 2 Mbps.
3. The branch offices with 10 to 50 users also use
cable modems but with bandwidths of 1 Mbps to the
4. The individual home-office users are provided with
synchronous Digital Subscriber Line (DSL) connections
that are 256 kbps, that are tunneled to the managed
IPSec-VPN using a Customer Provided Equipment (CPE)
based IPSec-VPN device.
5. Other than the individual home-office users, the
traffic leaving the branch office locations is NOT
encrypted until it leaves the local networks and enters
the IPSec-VPN at the Internet Service Provider (ISP)
VoIPsystem tests find that there is significant jitter
on the home-office users' VoIP calls when they attempt
to download e-mail at the same time. Which two network
issues are the most plausible causes of the VoIP traffic
issue? (Choose two.)
A. The IPSec-VPNs do NOT have QoS to manage the VoIP
B. Delays introduced by the e-mail server cause the
VoIP traffic to be queued until the e-mail transfer
starts to send out a smooth flow of data.
C. Circuit bandwidths speeds are greater than the
speed at which the IPSec-VPN devices can encrypt and
decrypt, resulting in additional delay and jitter
in the VoIP communications.
D. The processor on the CPE that is terminating the
IPSec-VPN can only handle the processing of the VoIP
call or the e-mal transfer while encrypting either
into the IPSec-VPN tunnel.
E. VoIP is more difficult to secure in an IPSec-VPN
than typical IP traffic, thus the IPSec-VPN device
is taxed with the additional processing, which slows
the transmitting of the VoIP payload.
Answer: A C
Given the following network information:
1. All remote users are restricted to 56 kbps dial-up
access to the company network.
2. The Layer 1 connections between the campus buildings
consist of T3/E3 circuits to their local Internet
Service Provider (ISP), which routes their Layer 3
information to the Internet
3. The IP Security Protocols (IPSec) Virtual Private
Network (VPN) tunnels are currently exceeding the
bandwidth of the circuits between the VPN tunnel and
4. The VoIP calls that are being completed between
campus buildings are noticeably degrading during hours
of peak bandwidth usage.
5. All intra- and inter-office communications are
using the G.711 CODEC between the Internet Telephones
and the VoIP call servers.
6. All VoIP calls made by the remote users are using
the G.729 CODES.
7. During random times of the day, the IP-VPN tunnel
are NOT using the full bandwidth of the T3/E3 circuits,
but latency across the tunnels between campus buildings
is excessive (>=150 milliseconds.)
Which three recommendations should you make to prevent
the degradation of VoIP traffic as it traverses the
IPSec-VPN tunnels along with all other traffic? (Choose
A. Add an IP-VPN device at each campus building to
handle additional inter-office traffic.
B. Recommend a configuration that forces remote users
to use L2TP tunnels to access the network.
C. Recommend a managed backbone other than the Internet
for inter-office traffic, such as Asynchronous Transfer
Mode (ATM) or Frame Relay (FR).
D. Verify that al remote users have their Internet
Telephones configured with the G.711 CODEC.
E. Verify that all remote users have their Internet
Telephones configured with the G.711 CODEC.
F. Recommend IP-VPN termination for remote client
PCs on the Internet (aggressive mode) with DiffServ
Answer: A B C
An organization that has Internet Telephones and VoIP
applications throughout its network is having issues
with equipment that has been recently deployed. Given
the following network information:
1. Recently a disabled firewall that has been forwarding
al traffic was discovered on the network. It is located
between the segment on which all executives are connected
and the rest of the organization's backbone.
2. Per the organization's security policy, this firewall
as immediately re-enabled to protect the executive
data. As a result, the executive network is NO longer
able to log in to the call servers.
3. The call servers and the Internet Telephones use
the SIP and the g.711 CODEC for the voice portion
of the connection.
4. Upon review of the firewall policies and specifications,
it has been identified as a proxy firewall for File
Transfer Protocol (FTP) and Hypertext Transfer Protocol
(HTTP) traffic. The policies on the firewall permit
all traffic from the executive LAN into the organization's
backbone and drop all other traffic.
Which recommendation would enable the executive LAN
to make VoIP calls again, maximize network security,
and require minimal IT support?
A. Install an additional PC-based gateway device to
act as a SIP proxy for the VoIP calls.
B. Replace the proxy firewall with a stateful-inspection
firewall, which is able to understand SIP.
C. Leave the proxy firewall in place and install an
ESP/AH based-VPN (Virtual Private Network) to get
the VoIP calls to the call server.
D. Replace the proxy firewall with a router that has
packet filtering enabled. Then open up the appropriate
ports needed for communication.
When planning for the installation of a VoIP telephone
system that is going to be responsible for both basic
and enhanced emergency-service calls, which three
statements are true? (Choose three.)
A. Identification of the locations of VoIP callers
is the responsibility of the telephone-service carriers
of the VoIP callers.
B. Keeping E/911 and E/211 database updated with the
latest information in the ALI is essential for dispatching
emergency crews to the right emergency locations.
C. The ability to have VoIP callers move their own
telephones represents a potentially life-threatening
issue when you consider the importance of E/911 and
E/211 call processing.
D. If emergency station location details are NOT updated
in the Automatic Location Identifier (ALI), a Public
Service Answering Point (PSAP) may dispatch an emergency
crew to the wrong location.
Answer: B C D
Given the following VoIP system information, evaluate
the company's VoIP implementation for potential issues
or non-compliance to emergency-service requirements:
1. A company has installed a VoIP system that is able
to identify the location of a caller based on the
telephone that the caller uses to place a call.
2. The company is moving to a new office and all employees
are asked to move their own Internet Telephones to
their new desks in the new office.
3. The administrator of the VoIP telephone system
moves the VoIP gateway device form the old office
to the new office on moving day without making any
changes to database for user location identification.
4. Upon completion of the VoIP gateway move, the administrator
is out of the office due to a family emergency for
three days. During that time a few employees have
engineered their Internet Telephones to make calls
from their home office using the company VoIP gateway/switch.
What are the two liability assessments for this configuration?
A. A Public Service Answering Point (PSAP) NOT located
in the same jurisdiction as the caller could answer
all call types, but this is NOT standard operating
B. All E911/E211 calls could encounter connection
issues, but this could be corrected once the VoIP
administrator updates the user database.
C. A PSAP NOT located in the same jurisdiction as
the caller could answer emergency calls, but these
calls would receive NO delay in response the emergency.
D. All call types could be completed successfully
and in the most expedient manner, but there could
be issues with the locations and identification of
E. All call types would NOT indicate the number the
calls originated from because the Automatic Number
information (ANI) would NOT be available. This information
would only be available to Internet Telephones that
are able to identify caller locations via E911/E211.
Answer: A B.
Abc .com has an IP WAN with multiple routes supporting
various data applications. They have added support
for VoIP to take advantage of enhanced services and
bandwidth efficiencies. The voice traffic has frequently
been distorted, and technicians suspect that the cause
is serial delay (jitter) within the routing scheme.
Which two viable approaches can the customer use in
the router setup to help reduce this issue? (Choose
A. Implement Layer 2 fragmentation on the WAN links.
B. Use voice compression for packets tagged as voice.
C. Use small packets for VoIP so that less time is
spent accumulating voice samples.
D. Use large packets for VoIP so that more of a voice
sample can be sent at one time.
Answer: A C
Abc .com plans to implement VoIP within the year.
You are assigned to access the network status and
recommend changes that may be required to support
VoIP. Given the following network conditions:
1. The two core routers have eight of ten slots populated.
2. The Central Processing Unit (CPU) usage of the
core routers is at a baseline of 85%.
3. One Open Shortest Path First (OSPF) area is configured
for every two interfaces.
4. Routers are based on a distributed processing architecture.
5. Each core router maintains four LinkStateDatabases
6. New code is able to loaded to make the routers
Differentiated Services (DiffServ) capable.
Which action should you take to reduce the CPU utilization
in preparation of DiffServ queuing?
A. Add a passive standby CPU.
B. Reduce the number of OSPF areas on each router.
C. Enable the compression accelerator card on each
D. Do nothing the performance of the installed core
routers CANNOT be improved.