When setting up the registration-caching parameter to enabled in the sip-interface configuration element, _____________.
You are adding peers to a Policy-Based Realm Bridging (PBRB) configuration.
Which two configuration steps, among others, are required? (Choose two.)
The Session Border Controller needs to be configured to act as a Back-to-Back User Agent (B2BUA).
How would you accomplish this?
You finished configuring a not Real Time Change (not RTC)-supported configuration element and you want to apply the change in your service.
Which two options are valid in order to accomplish this? (Choose two.)
When provisioning the redundancy-configuration, the peer name for each of the peers in a High Availability configuration must also be defined in each system’s ______________.
To ensure proper operation of a Session Border Controller High Availability (HA) pair, it is critical that both of the devices can originate legitimate traffic on media interfaces independent of the network interface IP address.
How is this type of traffic accommodated?
Which three options are valid ways to apply Header Manipulation Rules (HMRs) to your existing configuration?
How does the Session Border Controller ensure that a pinhole is kept open for persistent communication to a SIP endpoint behind a NAT device?
Which two statements are true about a realm on the Session Border Controller?
Examine the output below from the show sipd invite command:
How many 600 Busy Everywhere messages sent by the Session Border Controller in the last 140 seconds did not originate from a downstream device?