Which action prevent toll fraud in Cisco Unified Communications Manager?
A.
Configure ad hoc conference restriction
B.
Implement toll fraud restriction in the Cisco IOS router
C.
Allow off-net to off-net transfers
D.
Implement route patterns in Cisco Unified CM.
Configure ad hoc conference restriction
An engineer is designing a load balancing solution for two Cisco Unified Border routers.
The first router (cube1.abc.com) takes 60% of the calls and the second router
(cute2.abc.com) takes 40% of the calls, Assume all DNS A records have been created.
Which two SRV records are needed for a load balanced solution? (Choose two.)
A.
sip_udp.abc.com 60 IN SRV 1 40 5060 cube2.abc.com
B.
sip_udp.abc.com 60 IN SRV 3 60 5060 cube2.abc.com
C.
sip_udp.abc.com 60 IN SRV 60 1 5060 cube1.abc.com
D.
sip_udp.abc.com 60 IN SRV 2 60 5060 cube1.abc.com
E.
sip_udp.abc.com 60 IN SRV 1 60 5060 cube1.abc.com
sip_udp.abc.com 60 IN SRV 1 40 5060 cube2.abc.com
sip_udp.abc.com 60 IN SRV 1 60 5060 cube1.abc.com
Which description of the Mobile and Remote Access feature is true?
A.
Collaboration Edge feature that enables remote individuals to perform international calls
from Jabber with a VPN connection
B.
Collaboration Edge feature that enables remote individual to access enterprise
collaboration services via Jabber with the use of a VPN connection
C.
Collaboration Edge feature that enables remote individuals to access enterprise
collaboration services via Jabber without the use of a VPN connection
D.
Collaboration Edge feature that enables remote individuals to access all enterprise
collaboration services using a PC within the corporate environment
Collaboration Edge feature that enables remote individuals to access enterprise
collaboration services via Jabber without the use of a VPN connection
Which DHCP option must be set up for new phones to obtain the TFTP server IP address?
A.
Option 66
B.
Option 15
C.
Option 120
D.
Option 6
Option 66
Which configuration tells a switch port to send Cisco Discovery protocol packets that
configure an attached Cisco IP phone to trust tagged traffic that is received from a device that is connected to the access port on the Cisco IP phone?
A.
Option A
B.
Option B
C.
Option C
D.
Option D
Option B
Page 9 out of 55 Pages |
Previous |