Which two steps complete the configuration of the SIP trunk security profile?

Refer to exhibit. A collaboration engineer is configuring the Cisco UCM IM and Presence Service. Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)A . Check the box to enable application-level authorization.B . Check the box to allow charging header.C . Check the box to...

March 23, 2024 No Comments READ MORE +

Which action in the Cisco Unity Connection restriction table resolves this issue?

A company has an excessive number of call transfers to local and long-distance PSTN from Cisco Unity Connection voicemail. Which action in the Cisco Unity Connection restriction table resolves this issue?A . Block PSTN patterns on Default Transfer. Default Outdial. and Default System Transfer.B . Implement password complexity on voicemail...

March 23, 2024 No Comments READ MORE +

Which configuration on the voice mailbox makes this change?

A Cisco Unity Connection Administrator must set a voice mailbox so that it is accessed from a secondary device. Which configuration on the voice mailbox makes this change?A . Attempt Forward routing ruleB . Mobile UserC . Alternate ExtensionsD . Alternate NamesView AnswerAnswer: C

March 23, 2024 No Comments READ MORE +

Which external DNS SRV record must be present for Mobile and Remote Access?

Which external DNS SRV record must be present for Mobile and Remote Access?A . _cisco-uds.Jcp.example.comB . _collab-edge._tls.example.comC . _collab-edge._tcp.example.comD . _cisco-uds._tls.example.comView AnswerAnswer: B

March 23, 2024 No Comments READ MORE +

Which action accomplishes this task?

An administrator configures the voicemail feature in a Cisco collaboration deployment. The user mailboxes must be configured when the Cisco Unity Connection server is configured. Which action accomplishes this task?A . Configure a SIP integration with Cisco UCM to sync users.B . Configure an SCCP integration with Cisco UCM.C ....

March 23, 2024 No Comments READ MORE +

Which two commands accomplish this task?

The IP phones al a customer site do not pick an IP address from the DHCP An engineer must temporarily disable LLDP on all ports of the switch to leave only CDP. Which two commands accomplish this task? (Choose two.)A . Switch# copy running-config startup-configB . Switch(config)# no lldp runC...

March 22, 2024 No Comments READ MORE +

What must be done for this call to succeed?

Refer to exhibit. This INVITE is sent to an endpoint that only supports G.729. What must be done for this call to succeed?A . Add a transcoder that supports G.711ulaw and G.729.B . Nothing; both sides support G.729.C . Add a media termination point that supports G.711ulaw and G.729.D ....

March 22, 2024 No Comments READ MORE +

What describes the outcome when the trust boundary is defined at the Cisco IP phone?

What describes the outcome when the trust boundary is defined at the Cisco IP phone?A . Packets or Ethernet frames are remarked at the distribution layer switch.B . Packets or Ethernet frames are not remarked at the access layer switch.C . Packets or Ethernet frames are not remarked by the...

March 22, 2024 No Comments READ MORE +

Which solution should the engineer apply to resolve this issue?

Refer to the exhibit. An administrator must fix the SRV records to ensure that server1. sample.com is always contacted first from the three servers. Which solution should the engineer apply to resolve this issue?A . Priority = 100, Weight = 90B . Priority = 10, Weight = 5C . Priority...

March 22, 2024 No Comments READ MORE +

Which two features must be enabled on SIP security profiles?

A customer asked to integrate Unity Connection with Cisco UCM using SIP protocol. Which two features must be enabled on SIP security profiles? (Choose two.)A . accept presence subscriptionB . allow changing headerC . accept unsolicited notificationD . enable application-level authorizationE . accept replaces headerView AnswerAnswer: C, E

March 22, 2024 No Comments READ MORE +