Question 2. 2. (TCO2) Like many softPBX systems, Asterisk refers to each leg of a voice call as a ____. (Points : 5) Loop SIP setup line Channel Ping
Question 3. 3. (TCO3) Known as 'connectionless networking', this protocol employs a method where IP datagram are sent over a network using a 'best-effort' approach. The recipient would not know if the packets sent were received by the intended recipient. (Points : 5) UDP TCP ICMP H.323
Question 4. 4. (TCO4) These are facility connections from the phone company switch to the residential analog telephones; or the term used for delivering dial-tone to a group of phones. (Points : 5) Tip-ring Lines Trunks Call links
Question 5. 5. (TCO5) Used by hackers to see vulnerabilities and gain access, it is a systematic process that attempts to identify all of the open and available services on a TCP/IP host. (Points : 5) Firewall scan DNS scan Port scan DMZ scan
Question 6. 6. (TCO6) This is a call accounting software that is retrieved from a PBX, where the incoming and outgoing call information are logged. The logged information can contain data as date, time, extension, trunk, caller ID, and duration of call. (Points : 5) Call Database SMDR PBX log files ACD
Question 7. 7. (TCO7) Along with CTI and ACD, this is a PBX supported application where multiple phones, telephony processes, phone operators, IVR, complex dial-plan, and hunt groups, run in a confined space and take information from customers, then, facilitate a response over the phone. (Points : 5) Call Center Auto Attendant Intercom calling