Which two steps complete the configuration of the SIP trunk security profile?
Refer to exhibit. A collaboration engineer is configuring the Cisco UCM IM and Presence Service. Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)A . Check the box to enable application-level authorization.B . Check the box to allow charging header.C . Check the box to...
Which action in the Cisco Unity Connection restriction table resolves this issue?
A company has an excessive number of call transfers to local and long-distance PSTN from Cisco Unity Connection voicemail. Which action in the Cisco Unity Connection restriction table resolves this issue?A . Block PSTN patterns on Default Transfer. Default Outdial. and Default System Transfer.B . Implement password complexity on voicemail...
Which configuration on the voice mailbox makes this change?
A Cisco Unity Connection Administrator must set a voice mailbox so that it is accessed from a secondary device. Which configuration on the voice mailbox makes this change?A . Attempt Forward routing ruleB . Mobile UserC . Alternate ExtensionsD . Alternate NamesView AnswerAnswer: C
Which external DNS SRV record must be present for Mobile and Remote Access?
Which external DNS SRV record must be present for Mobile and Remote Access?A . _cisco-uds.Jcp.example.comB . _collab-edge._tls.example.comC . _collab-edge._tcp.example.comD . _cisco-uds._tls.example.comView AnswerAnswer: B
Which action accomplishes this task?
An administrator configures the voicemail feature in a Cisco collaboration deployment. The user mailboxes must be configured when the Cisco Unity Connection server is configured. Which action accomplishes this task?A . Configure a SIP integration with Cisco UCM to sync users.B . Configure an SCCP integration with Cisco UCM.C ....
Which two commands accomplish this task?
The IP phones al a customer site do not pick an IP address from the DHCP An engineer must temporarily disable LLDP on all ports of the switch to leave only CDP. Which two commands accomplish this task? (Choose two.)A . Switch# copy running-config startup-configB . Switch(config)# no lldp runC...
What must be done for this call to succeed?
Refer to exhibit. This INVITE is sent to an endpoint that only supports G.729. What must be done for this call to succeed?A . Add a transcoder that supports G.711ulaw and G.729.B . Nothing; both sides support G.729.C . Add a media termination point that supports G.711ulaw and G.729.D ....
What describes the outcome when the trust boundary is defined at the Cisco IP phone?
What describes the outcome when the trust boundary is defined at the Cisco IP phone?A . Packets or Ethernet frames are remarked at the distribution layer switch.B . Packets or Ethernet frames are not remarked at the access layer switch.C . Packets or Ethernet frames are not remarked by the...
Which solution should the engineer apply to resolve this issue?
Refer to the exhibit. An administrator must fix the SRV records to ensure that server1. sample.com is always contacted first from the three servers. Which solution should the engineer apply to resolve this issue?A . Priority = 100, Weight = 90B . Priority = 10, Weight = 5C . Priority...
Which two features must be enabled on SIP security profiles?
A customer asked to integrate Unity Connection with Cisco UCM using SIP protocol. Which two features must be enabled on SIP security profiles? (Choose two.)A . accept presence subscriptionB . allow changing headerC . accept unsolicited notificationD . enable application-level authorizationE . accept replaces headerView AnswerAnswer: C, E