A Review Of Real 3102 questions

Cause all that matters here is passing the Avaya 3102 exam. Cause all that you need is a high score of 3102 Avaya Aura® Session Manager and System Manager Implementation and Maintenance Exam exam. The only one thing you need to do is downloading Ucertify 3102 exam study guides now. We will not let you down with our money-back guarantee.

Q11. Digit Conversion in Adaptation can be specified to modify "origination" type headers. 

Which three are origination / source type URIs? (Choose three.) 

A. Request-URI 

B. P-Asserted-Identity 

C. Refer-To (in REFER messages) 

D. History-info (calling portion) 

E. Contact (in 3xx response) 

Answer: BDE

Q12. On a SIP Entity that is defined as type session Manager, what should be defined? 

A. an adaptation 

B. listening ports 

C. an outbound proxy 

D. a credential name 

Answer: B

Q13. When creating a New User Profile, an administrator is asked to enter, two separate passwords for the new user. 

Which statement best describes the need for two different passwords? 

A. The Identity password is used in authenticating the user when accessing the user's management console, while the Communication Profile is used to authenticate the user when logging in on a telephone. 

B. The Communication Profile is the prime password for authenticating the user while the Identity password is a backup password used to reset the Communication Profile In cases where the prime password is forgotten. 

C. The Identity password is used when logging in to a telephone that connected to the corporate network while the Communication Profile is used while logging in with a VPN telephone or the corporate network. 

D. The Identity password is used when logging into a telephone in to a communication profile password enables further privileges and capability. 

Answer: A

Q14. What are two reasons for creating a network location? (Choose two.) 

A. Locations are used to implement Call Admission Control. 

B. The location of a caller is used to determine which Session Manager will process the request. 

C. Locations are used to limit the number of users that may register to the session manager specific physical location. 

D. Session Manager uses the termination location of a caller to determine which dial patterns to look at when routing the call. 

E. Session Manager uses the origination location of a caller to determine which dial patterns to look at when routing the call. 

Answer: AE

Q15. From which Session Manager Profile field would an administrator define the local server for failover from the core? 

A. Primary Session Manager 

B. Secondary Session Manager 

C. Origination Application Sequence 

D. Termination Application Sequence 

E. Survivability Server 

Answer: B

Q16. System Manager provides a Dashboard summary for monitoring and validating the health of each Session Manager instance. 

What information is not available from the Session Manager Dashboard? 

A. Service State 

B. Security Module status 

C. Entity Monitoring 

D. Managed Bandwidth status 

Answer: D

Q17. A new feature server has been deployed in the network. The feature server must be applied to all calls made and received by the user. A technician has been asked to make the necessary arrangements. 

After adding a SIP Entity and Entity Link, which sequence describes the next steps that should be taken? 

A. Navigate to the user's User Profile and open the Session Manager Profile. 

From the Originating Application Sequence drop down list, select the new Application Sequence. 

Repeat for the Terminating Application Sequence drop down list. 

Mark them both as being Mandatory. 

B. Define the new feature as an Application. 

Add the Application to an Application Sequence. 

Mark the Application Sequence as Mandatory. 

Add the Application Sequence to user's User Profile. 

C. Create a new Application Sequence or edit one that already exists. 

Add details of the new feature to the Application Sequence. 

Mark the new feature as being mandatory. 

Apply the Application Sequence to user's Originating and Terminating Application Sequences In 

their Session Manager Profile. 

D. Define a new Application that details the new feature. Add the new Application to an Application 

Sequence. Mark the new feature as being mandatory. Apply the Application Sequence to both 

Originating and Terminating Application Sequences in the user's Session Manager Profile. 

Answer: C

Q18. Application definition allows system administrators to define and manage individual applications, each with their own attributes? 

The definitions allow administrators to add one or such applications to which of the following? 

A. application programs 

B. application data sets C. application sequences D. application lists 

Answer: C

Q19. When performing a remote backup of system Manager data the administrator is asked for a user name and password. 

Which statement best explains why a user name and password are required? 

A. The backed-up data file is encrypted. The username and password are used in encryption process and subsequently to access the file on restoring backed up data. 

B. The backed-up data is stored on a remote server using SCP. The user name and password are used to login remote server. 

C. Because System Manager Date is being exported from the server for security and authentication purpose system Manager once again checks the administrator's credentials. 

D. All System Manager Data is backed up to common storage repository setup during installation. For system Manager to access the repository the correct user name and password must be supplied. 

Answer: B

Q20. While reviewing the Event Logs on the Session Manager, you notice an ALERT message: (OP_AFW17504) “SIP firewall white list configuration failed, retaining existing configuration.” 

Which action should you perform when you see this alert? 

A. Access the SIP firewall white list configuration and verify that the configuration is correct. 

B. Access the SIP firewall configuration and change the RULE log type to none to not have these ALERTS appear in the EVENT logs. 

C. Access the SIP firewall configuration and Load the ASM Default Configuration. 

D. Disregard these messages as they are sent to the Event Logs and do not generate alarms. 

Answer: A