1Z0-445 Oracle Communications Session Border Controller 7 Advanced Implementation Essentials
Exam Title: Oracle Communications Session Border Controller 7 Advanced Implementation Essentials (Retiring March 15, 2019)
Exam Number: 1Z0-445
Exam Price: $245.00 More on exam pricing
Format: Multiple-Choice
Duration: 120 minutes
Number of Questions: 79
Passing Score: 71%
Validated Against: This exam has been validated against version 7.
Take Recommended Training Courses
Complete one of the courses below to prepare for your exam (optional):
Oracle SBC Advanced Configuration
Oracle SBC Security Configuration
Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.
Oracle Communications Session Border Controller 7 Basic Implementation Essentials (1Z0-404)
Enterprise Communications Implementation Specialist (Guided Learning Path)
Network Session Delivery and Control Infrastructure Implementation Specialist (Guided Learning Path)
Network Session Delivery and Control Infrastructure (Acme Packet) Education
Introduction to the Oracle Communications Session Border Controller 7 Advanced Certified Implementation Specialist Exam
Advanced Routing
Describe Session Border Controller (SBC) routing options and their uses
Configure management routing options to modify default behavior
Configure Application Layer Gateway (ALG) by static-flows
Advanced Session Router
Explain traditional Class 4 networks
Explain an Open Session Routing (OSR)
Configure a Session Router (SR) as session-stateful, transaction-stateful, or transaction-stateless
Analyze traces for different SR modes noting the difference from the SBC
Advanced Header Manipulation Rules (HMR)
Explain HMR rule set basics
Explain how HMRs are constructed and processed by the SBC
Create regular expressions (Regex)
Set up Regex within HMRs
Configure new features such as Mime, ISUP rules, and system variables
Denial of Service (DoS) Protection
Explain Denial of Service attacks in different layers, and the threats against VoIP
Set up protection levels on the SBC (service, core infrastructure, the SBC)
Apply Constraints to messages to protect the core
Configure DoS protection mechanism within the SBC
Calculate parameter values for configuring DoS protection in the SBC
Configure dynamic and static access control
Test the behavior of DoS protection against various trust levels
Introduction to IP Security (IPSec)
Explain the IPSec protocol suite; protocols and components
Test the IPsec modes of operations
Configure IPsec on the SBC
Explain the principles of Internet Key Exchange (IKE)
Analyze the IKE negotiation processes
Configure IKE and verify the process on the SBC
Secure Real Time Protocol (SRTP)
Explain Real Time Protocol (RTP) and Real Time Control Protocol (RTCP)
Analyze RTP and RTCP packet structures
Explain SRTP basics including key exchange, and Cryptographic Context
Analyze SRTP and SRTCP packet Structures
Set up SRTP operations on the SBC
Set up different SRTP topologies: including three types of SRTP terminations
Advanced Dynamic Routing
Explain Domain Name Server (DNS) operation and query types
Set up DNS configuration on the SBC
Explain what is the purpose for using Electronic Numbering (ENUM)
Set up ENUM configuration on the SBC
Configure Local Routing Tables (LRT) on the SBC
Advanced Business Trunking
Explain the business trunking principles and options
Configure Session Initiation Protocol (SIP) connect, trunk group URIs, and surrogate registrations on the SBC
Advanced Media Handling
Explain media flows and how they are handled by the SBC
Describe access control options for media
Configure latching, symmetric-latching and restricted-latching
Configure Bandwidth Call Admission Control (CAC) and media traffic shaping
Use traffic policing for media
Set up Quality of Service (QoS) management and codec policing
Telecommunications and Cryptography
Describe VoIP vulnerabilities, including SIP call interception
Explain symmetric and asymmetric key cryptosystems
Describe authentication concepts: hash, digital signature
Manually calculate the Diffie-Hellman Key Exchange algorithm
Describe the need for Certification Authorities (CA) and digital certificates
Transport Layer Security (TLS)
Explain TLS protocol and the applications of TLS
Describe TLS sub-layers, TLS sessions, and TLS key exchanges
Set up the SBC to process TLS
Configure the TLS features on the SBC
Click here to view complete Q&A of 1Z0-445 exam
Certkingdom Review, Certkingdom PDF Torrents
Best Oracle 1Z0-445 Certification, Oracle 1Z0-445 Training at certkingdom.com
Comments |0|
Tagged with: Certkingdom 1Z0-445 free pdf download, Certkingdom 1Z0-445 Torrents, Certkingdom PDF 1Z0-445, Exam 1Z0-445 ebooks, Exam 1Z0-445 labs, Exam 1Z0-445 online training, Exam 1Z0-445 PDF, Exam 1Z0-445 Q&A, Exam 1Z0-445 Study Guide, Exam 1Z0-445 testing engine, Exam 1Z0-445 videos