CT0-101 - CompTIA Convergence+ Certification Exam
Go back to
CompTIA
Example Questions
A VoIP solution is using 802.11 access points in its topology. Which of the following protocols would be used?
Orthogonal Frequency Division Multiplexing (OFDM)
A company would like to implement voice mail and fax services for all employees and would only like to spend money on hardware used for the voice mail platform. The company has a centralized e-mail server and does not have a fax server or a fax machine . Which of the following concepts should be implemented?
Unified messaging
The main benefit of selecting VoIP products that support standard protocols is that:
systems can be customized by integrating software and hardware from multiple vendors.
In a Contact Center environment, the company needs a mechanism by which they can demonstrate that every live customer service transaction during the year was accomplished according to local laws. Which of the following is the MOST appropriate application that will meet this requirement?
Call recording system
Which of the following will QoS help address?
Delay in the router
Which of the following BEST describes how voice and data traffic reac t to excessive latency?
Voice quality is degraded while data applications can request retransmissions.
Which of the following methods of transmission are BEST used to complete a video conference?
ISDN-BRI
Which of the following would be the BEST tool to use when a technician is dealing with packet loss and traffic congestion?
Network Analyzer
Which of the following is required in a SIP softphone deployment?
User Agent
Which of the following is a primary benefit of decentralized communication servers?
Failures have limited impact
A technician is rolling out IP softphones in phases to telecommuters. During the pilot and initial production deployment, no problems were noted. But after a major increase in the number of remote users, all callers begin to complain of voice quality issues, while main site users experience no issues. Which of the following should the technician investigate? (Select TWO)
Firewall port and CPU utilization
Bandwidth utilization on Internet circuit
Which of the following would be the affect of giving signaling traffic low priority over the network?
It can cause call setup delay.
Which of the following BEST defines the role of gatekeepers?
Control the set up, connection, feature operation, and disconnection of calls through the data network.
Which of the following is the correct format of a SIP URI?
SIP:[email protected]
A technician notices that the frame packet loss is above the one percent threshold and needs to correct the problem. Which of the following should the technician use as a measure to correct the problem?
Change the codec being used to decrease latency and packet loss.
Which of the following types of applications is 'screen pop' commonly associated with?
CTI
Which of the following provides the MOST cost effective solution for ensuring the confidentiality of VoIP calls?
Encryption capable IP phones
Which of the following network components operate at layer three of the OSI model?
Router
In a converged network, the Computer Supported Telephony Application (CSTA) standard operates at which of the following layers of the OSI model?
Application
According to the IETF, which of the following is the BEST functional description of a SIP phone in its ability to initiate and terminate calls?
User Agent Client (UAC) and User Agent Serve r (UAS)
How many DS-1s comprise a DS-3 circuit?
28
Which of the following types of audio codec has the largest delay?
G. 723
Which of the following protocol is used in monitoring signal delivery and has minimal control in delivery of multimedia packets?
Real Time Control Protocol (RTCP)
Which of the following is used to describe layers one - three of the OSI model, and is responsible for connectivity?
Chained layers
An 8 must be dialed at the beginning of a number for Public Switched Telephone Network (PSTN) access from the PBX. A technician wants to enable bypassing of the dial 8 code so that users can just dial numbers without first dialing the 8. Which of the following would the technician need to check before enabling this bypass to ensure the LEAST amount of problems?
That no extensions are added in a range that might be an outside number.
Which of the following BEST describes a network bott leneck?
A router that is receiving more information than it can process.
In traditional TDM equipment and Public Switched Telephone Network (PSTN) digital networking, which of the following was the first encoding method used to convert anal og station voice to digital transmission lines?
Pulse Code Modulation (PCM)
Which of the following is a layer two technology in the OSI model and provides QoS in converged networks?
802.1p
Which of the following signals is sampled 4 times in the 4:2:2 ratio and is commonly used in Serial Digital Interface (SDI) data streams and MPEG?
Luminance
How would the E164 number +19725551234 be represented as ENUM?
4.3.2.1.5.5.5.2.7.9.1.e164.arpa
A company plans to deploy softphones to their telecommuters, so the telecommuters can connect to their IP PBX through a VPN. There is concern about the number of User Datagram Protocol (UDP) ports that the VoIP standards open by default for audio. Which of the following should the company consider to limit their risk of wide open ports in the firewall? (Select TWO)
Deploy a Session Border Controller (SBC).
Configure the IP-PBX to use a smaller range of UDP ports.
Which of the following is the final step a technician should perform before starting the process of upgrading an IP PBX?
Perform a backup.
At which of the following places is intrusion detection systems (IDS) normally used?
At the edge of the network
Which of the following does signaling refer to in con verged data communications?
The transmission of encoded audio or video signals.
Which of the following is the call setup protocol used in ISDN and H. 323?
Q.931
A technician, at a large call center with 500 agents working remotely from home, has gotten several complaints that users cannot login to their softphone. Which of the following would the technician check to verify that the users are not being blocked?
Verify the IP address of the gatekeeper the users are logging into.
Which of the following must take place in order for a digital phone to communicate with an IP phone?
The phone system will have to convert the voice from TDM to IP.
Which of the following is a benefit of the 802.11a WLAN standard?
It is out of the frequency range normally used by cordless teleph ones, microwave ovens, and other appliances.
Which of the following statements are true for an H. 323 gateway? (Select TWO)
An H. 323 gateway interfaces the IP-based media channels to legacy signaling and transport technologies.
An H. 323 gateway normally provides additional functions such as echo cancellation and silence suppression.
Which of the following is the purpose of a traffic shaper?
To enable QoS across links that do not have QoS.
Which of the following is the standard for security in an enterprise wireless network?
802.11i
Which of the following encoding methods transmits consecutive ones over a T1/E1 having the opposite polarity in order to maintain the density?
AMI
Which of the following BEST describes a PBX's architecture if it has no ability to upgrade to VoIP?
TDM based
Which of the following technologies allows users to have a cell phone ring simultaneously as their desk phone does?
Twinning
Multicasting for audio and video should be used when:
video and audio should be transmitted from one location to multiple locations.
When a user tries to dial an international number the call fails to dial out of the phone system. The technician dials from another phone on the same phone system and is able to complete an international call. Which of the following is the MOST likely cause?
There is not an entry specifying international calls in t he users phone privileges.
Which of the following is necessary for a branch office to continue to make calls in the event the remote site loses WAN connectivity to the main site? (Select TWO)
Local trunks
Call processing engine
A company has serious bandwidth restrictions and is looking for a type of compression that will result in 8kbps. Which of the following types of compression BEST fit this requirement?
G. 729a
Which of the following applications allows the customer to enter a number and route the call to the next available agent while delivering a screen pop to the agent?
Interactive Voice Response (IVR)/CTI
When remotely accessing a management interface, which of the following should a technician use to securely access the network equipment?
Secure Shell (SSH)
Study Guides