2015-09-04

QUESTION 181

In a centralized call-processing solution, there are five sites connected through an IP WAN. To optimize the utilization of the IP WAN, CAC needs to be implemented. How should CAC be implemented?

A.

use a gatekeeper to control allocated bandwidth properly

B.

use locations CAC with a single location

C.

use a gatekeeper and Cisco Unified Border Element to provide CAC to sites that use a combination of SIP and MGCP gateways

D.

use a gatekeeper to only control those locations that use H.323 gateways and a Cisco Unified Border Element to control those sites that use MGCP or SIP gateways

E.

use locations CAC with five locations in addition to Hub none

&nb

sp;

Correct Answer: E

Explanation:

Incorect answer: ABCD

A location setting of Hub_None means that the locations feature does not keep track of the bandwidth that this annunciator consumes.

http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_5_1/ccmcfg/b06ctirp.html

QUESTION 182

You have two clusters with six Cisco Unified CallManager systems in each. How many ICTs must be configured to provide full server redundancy if a gatekeeper is present in the network?

A.

4

B.

6

C.

5

D.

1

Correct Answer: D

QUESTION 183

abc.com’s Bicycles has three manufacturing plants and 145 retail stores. Each of the manufacturing plants has a Cisco Unified CallManager cluster. The retail stores use a mix of Cisco Unified CallManager Express and key systems with gateways. What is the recommended trunk type to use on the Cisco Unified CallManager clusters for full intersite calling capability?

A.

gatekeeper-controlled interclustertrunks

B.

gatekeeper-controlled H.225 trunks

C.

non-gatekeeper-controlled intercluster trunks

D.

SIP trunks

body>

Correct Answer: B

QUESTION 184

What is the impact of setting an RSVP policy per location pair with a default interlocation RSVP service policy?

A.

the default interlocation RSVP service policy will be overridden

B.

an RSVP mandatory mid-call retry counter will be added to calls that encounter mid-call retry errors

C.

additional bandwidth capacity will be added to the default interlocation RSVP service policy

D.

the RSVP policy will only be associated with one type of call; for example, if it is associated with video calls, audio calls will not be impacted

Correct Answer: A

QUESTION 185

What is one difference between Cisco inline power and 802.3af PoE?

A.

Cisco inline power should only be activated for those ports that require PoE to avoid oversubscription.

B.

You must determine the total number of IP phones the switch can support with 802.3af to avoid oversubscription.

C.

You must specify which set of pins the powered device is going to accept power on for 802.3af.

D.

Cisco inline power provides a variable amount of power by using CDP.

Correct Answer: B

QUESTION 186

DRAG DROP

You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in CoS values. In this particular scenario a catalyst switch has been configured to trust IP phones. Match the proper Switchassigned CoS Value with appropriate traffic type.



Correct Answer:



QUESTION 187

A dial peer is configured with an outgoing COR list. Which two conditions must be met for calls matching this outbound dial peer to be blocked? (Choose two.)

A.

An incoming COR list must be configured on the matched inbound dial peer.

B.

An incoming COR list must be configured on the matched outbound dial peer.

C.

The outgoing COR list must be a superset of the incoming COR list.

D.

The incoming COR list and the outgoing COR list must contain the same members.

E.

The outgoing COR list must be a subset of the incoming COR list.

Correct Answer: AE

QUESTION 188

At the very minimum which settings should be set on a Cisco ip phone that is placed in a public Space like a lobby? (Choose two)

A.

Enable GARP

B.

Disable Settings button on the IP phone

C.

Disable PC Port access

D.

disable PC voice VLAN access

E.

Disable Web access on the IP phone

Correct Answer: BC

QUESTION 189

Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.)

A.

<p style="
line-height: normal; margin: 0cm 0cm 0pt; text-autospace: ; mso-layout-grid-align: none" class="MsoNormal" align="l

Show more