Question 1. 1. (TCO1) The Central Office is the place: (Points : 5) Where the operator makes connections.
Where all ISDN capabilities begin.
Where calls from subscribers are routed.
To connect the ADSL lines.
Question 2. 2. (TCO2) Like many softPBX systems, Asterisk refers to each leg of a voice call as a ____. (Points : 5) Loop
SIP setup line
Question 3. 3. (TCO3) Known as 'connectionless networking', this protocol employs a method where IP datagram are sent over a network using a 'best-effort' approach. The recipient would not know if the packets sent were received by the intended recipient. (Points : 5) UDP
Question 4. 4. (TCO4) These are facility connections from the phone company switch to the residential analog telephones; or the term used for delivering dial-tone to a group of phones. (Points : 5) Tip-ring
Question 5. 5. (TCO5) Used by hackers to see vulnerabilities and gain access, it is a systematic process that attempts to identify all of the open and available services on a TCP/IP host. (Points : 5) Firewall scan
Question 6. 6. (TCO6) This is a call accounting software that is retrieved from a PBX, where the incoming and outgoing call information are logged. The logged information can contain data as date, time, extension, trunk, caller ID, and duration of call. (Points : 5) Call Database
PBX log files
Question 7. 7. (TCO7) Along with CTI and ACD, this is a PBX supported application where multiple phones, telephony processes, phone operators, IVR, complex dial-plan, and hunt groups, run in a confined space and take information from customers, then, facilitate a response over the phone. (Points : 5) Call Center
Question 8. 8. (TCO10) This was the first VoIP standard, ratified by ITU-T in 1996, that addressed having real time communications for video and voice in an unreliable packet network, and applied for PBX-styled signaling that supports packet-based networks. (Points : 5) SNMP
Question 9. 9. (TCO11) This layer organizes and synchronizes dialogues between presentation entities in the OSI 7-Layer Communications Model, (Points : 5) Data Link Layer
Address of Destination
Question 10. 10. (TCO12) In Ethernet transmission, this is the result when two nodes transmit at the same time, which leads to data loss, re-transmission, delay, or latency. (Points : 5) Error control
Multiple Station Access
Essay Questions (20 points each)
Question 1. 1. (TCO3) Name and explain the three most important factors that you must protect when Securing a VoIP Network. (Points : 20) When securing a VOIP network there are several factors that should be considered, the most important being: Protocols – once the protocol that will be used has been determined, then all other associated VOIP protocols should be turned off to reduce the surface area of any potential risk. Management – the VOIP devices themselves all have underlying software which needs to be kept up to date along with the conventional network devices to limit any risk. Separation – VOIP and the internal network should be separated to allow for QoS and also to ensure that security software does not dynamically interfere with the VOIP traffic. Question 2. 2. (TCO4) What makes coaxial cable popular among broadband applications to customer premises? Discuss its advantages. (Points : 20) Price is a main factor as it is cheap to manufacture, and cheap to install. Over short distances they offer good bandwidth and easy modification as well as capacity. They are...
Please join StudyMode to read the full document