The SIP user identity includes a SIP URL and a TEL URL, either of which can uniquely identify a SIP user. The user ID needs to be configured to be consistent on the MDU and IMS.

The SIP user identity includes a SIP URL and a TEL URL, either of which can uniquely identify a SIP user. The user ID needs to be configured to be consistent on the MDU and IMS.A . TrueB . FalseView AnswerAnswer: A

September 20, 2018 No Comments READ MORE +

Which of the following are key technologies for VoIP? (Multiple Choice)

Which of the following are key technologies for VoIP? (Multiple Choice)A . Signaling TechnologyB . Real-time transmission technologyC . Network Transmission TechnologyD . Media TechnologyView AnswerAnswer: ABCD

September 18, 2018 No Comments READ MORE +

When configuring multicast services, the authentication mode is no-auth when adding multicast users. If 10 programs are configured on the MA5600 (the upper device can provide these programs), then the multicast user can watch how many programs?

When configuring multicast services, the authentication mode is no-auth when adding multicast users. If 10 programs are configured on the MA5600 (the upper device can provide these programs), then the multicast user can watch how many programs?A . 10B . 5C . 0D . 8View AnswerAnswer: A

September 17, 2018 No Comments READ MORE +

In GPON network, multiple service flows can be configured under one gemport. Which of the following statements is incorrect?

In GPON network, multiple service flows can be configured under one gemport. Which of the following statements is incorrect?A . Service flows differentiated according to Ethertype, service flows that can be configured with SPPPoE (EtherType = 8863/8864) and IPoE (EtherType !=8863/8364) under a gemportB . Dividing multiple services according to...

September 13, 2018 No Comments READ MORE +

Is the following description correct?

Is the following description correct? The MA5600 only supports IGMP-proxy and does not support IGMP-snooping.A . TrueB . FalseView AnswerAnswer: B

September 10, 2018 No Comments READ MORE +

If multicast services are only deployed in private private networks, which multicast address segment should be preferred when planning?

If multicast services are only deployed in private private networks, which multicast address segment should be preferred when planning?A . 224.0.0.0/8B . 225.0.0.0/8C . 232.0.0.0/8D . 239.0.0.0/8View AnswerAnswer: D

September 6, 2018 No Comments READ MORE +

In general, the higher the encoding bit rate, the higher the complexity of the algorithm, the longer the processing delay of the encoding, and the lowering of the speech quality.

In general, the higher the encoding bit rate, the higher the complexity of the algorithm, the longer the processing delay of the encoding, and the lowering of the speech quality.A . TrueB . FalseView AnswerAnswer: A

September 4, 2018 No Comments READ MORE +

Of the commands defined by the H.248 protocol, which of the following commands can be sent by the MG or the MGC?

Of the commands defined by the H.248 protocol, which of the following commands can be sent by the MG or the MGC?A . NotifyB . ADDC . MODIFYD . ServiceChangeView AnswerAnswer: D

September 1, 2018 No Comments READ MORE +

How many kinds of acceptance test project are classified by MA5600T Acceptance Test Manual? (Multiple Choice)

How many kinds of acceptance test project are classified by MA5600T Acceptance Test Manual? (Multiple Choice)A . Basic packageB . Advanced packageC . Expansion Pack AD . Expansion Pack BView AnswerAnswer: ACD

August 25, 2018 No Comments READ MORE +

In the UA5000 chassis of the high-density PVM host, what command must be used to configure the chassis connection?

In the UA5000 chassis of the high-density PVM host, what command must be used to configure the chassis connection?A . frame connectB . frame linkC . link addD . frame addView AnswerAnswer: A

August 23, 2018 No Comments READ MORE +