1Z0-445 Oracle Communications Session Border Controller 7 Advanced Implementation Essentials

By
With
Comments Off on 1Z0-445 Oracle Communications Session Border Controller 7 Advanced Implementation Essentials

Exam Title: Oracle Communications Session Border Controller 7 Advanced Implementation Essentials (Retiring March 15, 2019)
Exam Number: 1Z0-445
Exam Price: $245.00 More on exam pricing
Format: Multiple-Choice
Duration: 120 minutes
Number of Questions: 79
Passing Score: 71%
Validated Against: This exam has been validated against version 7.

Take Recommended Training Courses

Complete one of the courses below to prepare for your exam (optional):

Oracle SBC Advanced Configuration
Oracle SBC Security Configuration

Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.

Oracle Communications Session Border Controller 7 Basic Implementation Essentials (1Z0-404)
Enterprise Communications Implementation Specialist (Guided Learning Path)
Network Session Delivery and Control Infrastructure Implementation Specialist (Guided Learning Path)
Network Session Delivery and Control Infrastructure (Acme Packet) Education
Introduction to the Oracle Communications Session Border Controller 7 Advanced Certified Implementation Specialist Exam

Advanced Routing
Describe Session Border Controller (SBC) routing options and their uses
Configure management routing options to modify default behavior
Configure Application Layer Gateway (ALG) by static-flows

Advanced Session Router
Explain traditional Class 4 networks
Explain an Open Session Routing (OSR)
Configure a Session Router (SR) as session-stateful, transaction-stateful, or transaction-stateless
Analyze traces for different SR modes noting the difference from the SBC

Advanced Header Manipulation Rules (HMR)
Explain HMR rule set basics
Explain how HMRs are constructed and processed by the SBC
Create regular expressions (Regex)
Set up Regex within HMRs
Configure new features such as Mime, ISUP rules, and system variables

Denial of Service (DoS) Protection
Explain Denial of Service attacks in different layers, and the threats against VoIP
Set up protection levels on the SBC (service, core infrastructure, the SBC)
Apply Constraints to messages to protect the core
Configure DoS protection mechanism within the SBC
Calculate parameter values for configuring DoS protection in the SBC
Configure dynamic and static access control
Test the behavior of DoS protection against various trust levels

Introduction to IP Security (IPSec)
Explain the IPSec protocol suite; protocols and components
Test the IPsec modes of operations
Configure IPsec on the SBC
Explain the principles of Internet Key Exchange (IKE)
Analyze the IKE negotiation processes
Configure IKE and verify the process on the SBC

Secure Real Time Protocol (SRTP)
Explain Real Time Protocol (RTP) and Real Time Control Protocol (RTCP)
Analyze RTP and RTCP packet structures
Explain SRTP basics including key exchange, and Cryptographic Context
Analyze SRTP and SRTCP packet Structures
Set up SRTP operations on the SBC
Set up different SRTP topologies: including three types of SRTP terminations

Advanced Dynamic Routing
Explain Domain Name Server (DNS) operation and query types
Set up DNS configuration on the SBC
Explain what is the purpose for using Electronic Numbering (ENUM)
Set up ENUM configuration on the SBC
Configure Local Routing Tables (LRT) on the SBC

Advanced Business Trunking
Explain the business trunking principles and options
Configure Session Initiation Protocol (SIP) connect, trunk group URIs, and surrogate registrations on the SBC

Advanced Media Handling
Explain media flows and how they are handled by the SBC
Describe access control options for media
Configure latching, symmetric-latching and restricted-latching
Configure Bandwidth Call Admission Control (CAC) and media traffic shaping
Use traffic policing for media
Set up Quality of Service (QoS) management and codec policing

Telecommunications and Cryptography
Describe VoIP vulnerabilities, including SIP call interception
Explain symmetric and asymmetric key cryptosystems
Describe authentication concepts: hash, digital signature
Manually calculate the Diffie-Hellman Key Exchange algorithm
Describe the need for Certification Authorities (CA) and digital certificates

Transport Layer Security (TLS)
Explain TLS protocol and the applications of TLS
Describe TLS sub-layers, TLS sessions, and TLS key exchanges
Set up the SBC to process TLS
Configure the TLS features on the SBC

Click here to view complete Q&A of 1Z0-445 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-445 Certification, Oracle 1Z0-445 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]