The SIP user identity includes a SIP URL and a TEL URL, either of which can uniquely identify a SIP user. The user ID needs to be configured to be consistent on the MDU and IMS.
The SIP user identity includes a SIP URL and a TEL URL, either of which can uniquely identify a SIP user. The user ID needs to be configured to be consistent on the MDU and IMS.A . TrueB . FalseView AnswerAnswer: A
Which of the following are key technologies for VoIP? (Multiple Choice)
Which of the following are key technologies for VoIP? (Multiple Choice)A . Signaling TechnologyB . Real-time transmission technologyC . Network Transmission TechnologyD . Media TechnologyView AnswerAnswer: ABCD
When configuring multicast services, the authentication mode is no-auth when adding multicast users. If 10 programs are configured on the MA5600 (the upper device can provide these programs), then the multicast user can watch how many programs?
When configuring multicast services, the authentication mode is no-auth when adding multicast users. If 10 programs are configured on the MA5600 (the upper device can provide these programs), then the multicast user can watch how many programs?A . 10B . 5C . 0D . 8View AnswerAnswer: A
In GPON network, multiple service flows can be configured under one gemport. Which of the following statements is incorrect?
In GPON network, multiple service flows can be configured under one gemport. Which of the following statements is incorrect?A . Service flows differentiated according to Ethertype, service flows that can be configured with SPPPoE (EtherType = 8863/8864) and IPoE (EtherType !=8863/8364) under a gemportB . Dividing multiple services according to...
Is the following description correct?
Is the following description correct? The MA5600 only supports IGMP-proxy and does not support IGMP-snooping.A . TrueB . FalseView AnswerAnswer: B
If multicast services are only deployed in private private networks, which multicast address segment should be preferred when planning?
If multicast services are only deployed in private private networks, which multicast address segment should be preferred when planning?A . 224.0.0.0/8B . 225.0.0.0/8C . 232.0.0.0/8D . 239.0.0.0/8View AnswerAnswer: D
In general, the higher the encoding bit rate, the higher the complexity of the algorithm, the longer the processing delay of the encoding, and the lowering of the speech quality.
In general, the higher the encoding bit rate, the higher the complexity of the algorithm, the longer the processing delay of the encoding, and the lowering of the speech quality.A . TrueB . FalseView AnswerAnswer: A
Of the commands defined by the H.248 protocol, which of the following commands can be sent by the MG or the MGC?
Of the commands defined by the H.248 protocol, which of the following commands can be sent by the MG or the MGC?A . NotifyB . ADDC . MODIFYD . ServiceChangeView AnswerAnswer: D
How many kinds of acceptance test project are classified by MA5600T Acceptance Test Manual? (Multiple Choice)
How many kinds of acceptance test project are classified by MA5600T Acceptance Test Manual? (Multiple Choice)A . Basic packageB . Advanced packageC . Expansion Pack AD . Expansion Pack BView AnswerAnswer: ACD
In the UA5000 chassis of the high-density PVM host, what command must be used to configure the chassis connection?
In the UA5000 chassis of the high-density PVM host, what command must be used to configure the chassis connection?A . frame connectB . frame linkC . link addD . frame addView AnswerAnswer: A