Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CTP TT0-201 Exam - Cheat-Test.com

Free TT0-201 Sample Questions:

1. Which of the following is a concern when implementing IPsec for SIP-based voice calls behind a firewall that implements Network Address Translation (NAT)?
A.IPsec doesn't natively support SIP.
B.Encryption causes increased overhead.
C.You must implement tunnel mode using the AH security protocol.
D.You must implement transport mode using the AH security protocol.
Answer: B

2. Which of the following describes how the host portion of IPv4 and IPv6 addresses are created?
A.All IPv4 and Ipv6 host addresses are determined by ICANN.
B.All IPv4 and IPv6 host addresses are based on the host's MAC address.
C.The host portion of an IPv4 address is determined by ICANN. The host portion of an IPv6 address is determined according to the multicast address.
D.The host portion of an IPv4 address is determined arbitrarily according to the value of the subnet mask. The host portion of an IPv6 address is determined from the host's MAC address.
Answer: D

3. You have been given the following in CIDR notation: 152.2.100.1/25. How many subnets can you create, and how many IP addresses can each subnet have?
A.55 subnets, with 1024 addresses per subnet
B.126 subnets, with 512 addresses per subnet
C.128 subnets, with 126 addresses per subnet
D.1024 subnets, with 55 addresses per subnet
Answer: C

4. You have decided to use the following range of IP addresses:
172.16.0.0/24
Which of the following will allow you to avoid deploying NAT traversal workarounds?
A.Deploy a STUN server.
B.Deploy a Session Border Controller (SBC).
C.Use registered IP addresses for all devices.
D.Use the default subnet mask for your IP address range.
Answer: C

5. You have implemented DiffServ to describe a collection of service policies that determine how your network equipment will classify and condition voice data in a traffic flow scheme. What is the accepted name for this group?
A.Class
B.Group
C.VLAN
D.Domain
Answer: D

6. You have been asked to recommend an appropriate network bandwidth for a medium to large business. This business will use it for their IP phones, as well as their data connection. Which of the following would you recommend?
A.DS0
B.DS1
C.ISDN BRI
D.ISDN PRI
Answer: D

7. You are helping design an SIP implementation for an existing network. Which of the following is the most important element to verify?
A.Whether or not the company uses fire-grade cabling.
B.Whether or not the company has implemented QoS.
C.Whether or not the company Web server supports SSL.
D.Whether or not the company layer 2 switches have fault tolerance in place.
Answer: B

8. Your customer has asked you to enable fax messages to be delivered to her computer so she can read it in her e-mail. Which protocol should you implement on your convergence device?
A.T.30
B.T.34
C.T.37
D.T.38
Answer: C

9. Which protocol does is generally used to establish calls in SIP implementations?
A.TCP
B.UDP
C.RTP
D.H.225
Answer: B

10. Which of the following connects the Foreign Exchange Station (FXS) portion of an Analog Telephone Adapter (ATA) to an analog phone?
A.USB connector.
B.RJ-11 connector.
C.RJ-45 connector.
D.RS-232 connector.
Answer: B

11. In which of the following layers of the OSI/RM would you find the Session Initiation Protocol (SIP)?
A.Network
B.Physical
C.Session
D.Application
Answer: D

12. Which of the following devices operates at Layer 2 of the OSI/RM and is considered the ideal device for creating a new broadcast domain for a voice device?
A.Hub
B.Bridge
C.Router
D.Switch
Answer: D

13. The Session Initiation Protocol (SIP) the ASCII text standard to format its messages. The H.323 protocol uses ASN.1 binary code. Which layer of the OSI/RM is responsible for translating, processing and reading ASN.1 and ASCII messages?
A.Network
B.Session
C.Physical
D.Presentation
Answer: D

14. When data is sent down to the Session layer of the OSI/RM the PDU consists of which encapsulated components?
A.Physical header, Network header, Data
B. Data, Application header, Presentation header
C.Network header, Data Link header, Physical header
D.Application header, Presentation header, Transport header
Answer: B

15. Which of the following is the correct ordering of protocol data units, starting from Layer 1 of the OSI/RM to Layer 7?
A.Packet, data, frame, bits
B.Bits, frame, data, packet
C.Data, segment, packet, frame
D.Frame, packet, segment, data
Answer: D

16. Which of the following best describes what occurs to a protocol data unit as information passes from layer 1 to layer 7?
A.Each layer reads all remaining protocol data units and adds information specific to that layer.
B. Each layer reads all remaining protocol data units and determines how to route the packet.
C.As data units are passed up the protocol stack, each layer removes information relevant to the function of that layer.
D.As data units are passed down the protocol stack, each layer adds information appropriate to the function of that layer.
Answer: C

17. Which of the following must be used by both an 802.11i Wi-fi card and a IP-enabled PBX network adapter?
A.A Virtual LAN Identifier (VID).
B.A Secure Set Identifier (SSID) entry.
C.A Media Access Control (MAC) address.
D.A Canonical Format Indicator (CFI) entry.
Answer: C

18. Consider the following image of a Media Access Control (MAC) address:QV12116bY$X%&,*+
Which of the following describes the portion designated by letter A?
A.The 48 bit ID code, known as the Mac-48.
B.The 48 bit ID code, known as the EUI-48.
C.The 24 bit vendor code, known as the Organizationally Unique Identifier (OUI)
D.The 64 bit interface serial number, known as the known as the Organizationally Unique Identifier (OUI).
Answer: C

19. Which of the following is most likely to be used to identify a device to be called in a hunt group?
A.A Virtual LAN Identifier (VID).
B.A Secure Set Identifier (SSID) entry.
C.A Canonical Format Indicator (CFI) entry.
D.A Media Access Control (MAC) address.
Answer: D

20. When a technician connects a North American T-1 trunk to a European E-1 trunk using a conversion device, which of the following will result?
A.No less than 80% of the T-1 can be used.
B.No more than 80% of the E-1 trunk can be used.
C.No connection can be made between E-1 and T-1.
D.The connection will fail, because E-1 uses out-of-band transmission, and T-1 lines use in-band transmission.
Answer: B

21. Which of the following is an accurate statement concerning ISDN, E-carrier and T-carriers?
A.Each uses out-of-band signaling.
B.None was originally designed for supporting data transmissions.
C.Each has native QoS capabilities that allow you to prioritize data streams.
D.None has native QoS capabilities that allow you to prioritize data streams.
Answer: D

22. Which of the following describes an E-1 line used for voice data?
A.It uses in band signaling.
B.It provides 30 64-Kbps channels.
C.It provides 24 64kbps data channels.
D.It provides a connection speed of 1.544 Kbps.
Answer: B

23. Which of the following devices makes decisions based on MAC addresses, and is considered the most appropriate device to use when limiting broadcast domains for devices that will process voice data?
A.Bridge
B.Layer 2 switch
C.Layer 3 switch
D.Session Border Controller
Answer: B

24. Which of the following devices inspects incoming packets, makes dynamic routing decisions based on the source and destination IP addresses, and is considered the most appropriate device to use when forwarding packets between networks?
A.Repeater
B.Gateway
C.Layer 2 switch
D.Layer 3 switch
Answer: D

25. Which of the following devices contains functionality that often introduces significant problems for SIP-based voice connections, and often requires a workaround?
A.Firewall
B.Layer 2 switch
C.Layer 3 switch
D.Session Border Controller (SBC)
Answer: A

26. You have been asked to implement an IPsec VPN for voice calls. These calls will pass from one corporate firewall to another. Both firewalls use Network Address Translation (NAT). Which form of IPsec will you implement?
A.Tunnel mode using the AH security protocol.
B.Transport mode using the AH security protocol.
C.Tunnel mode using the ESP security protocol.
D.Transport mode using the ESP security protocol.
Answer: C

27. Which of the following best describes IPsec Tunnel Mode?
A.Tunnel mode does not support the encryption of data packets.
B.It encapsulates network traffic inside of an IP packet for delivery to a remote network.
C.Only the header of the packet is encrypted. The rest of the packet, including the data, is not encrypted.
D.Tunnel mode does not support the ability to traverse NAT implementations, unless you use additional software or hardware solutions.
Answer: B

28. Which of the following would be a valid SRV entry that allows queries to the SIP device named
support.ctpcertified.com to be redirected with the priority of 10, a weight of 40, to the system named support.aspcompany.com on port 5060?
A.support.ctpcertified.com. 10 40 5060 support.aspcompany.com.
B.support.aspcompany.com. 5060 40 10 support.ctpcertified.com.
C.sip:support@ctpcertified.com. 86400 IN SRV support.aspcompany.com. 10 40 5060
D._sip_support.ctpcertified.com. 86400 IN SRV 10 40 5060 support.aspcompany.com.
Answer: D

29. What type of NAT takes a private IP address and translates it into a registered IP address?
A.Dynamic
B.Full cone
C.Symmetric
D.Overlapping
Answer: A

30. You are using a server that processes UDP packets in a VoIP solution. You are also using Network Address Translation (NAT). Consider the following:
1. The host performing NAT maps all requests from an internal IP address and port to that same external IP address and port.
2. Any external host can send a packet to the internal host to the external address that has just been mapped.
What type of NAT is being used?
A.Symmetric
B.Full cone
C.Restricted cone
D.Port restricted cone
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved