What is the lowest number of users supported in a template and the highest number of users in a template?
When designing the capacity for a Cisco UCM 12.x cluster, an engineer must decide which VMware template will be used for each node. What is the lowest number of users supported in a template and the highest number of users in a template?A . 750 and 15.000 usersB . 750...
Why isn’t an end user s PC device in a QoS trust boundary included?
Why isn’t an end user s PC device in a QoS trust boundary included?A . The end user could incorrectly tag their traffic to bypass firewalls.B . The end user may incorrectly tag their traffic to be prioritized over other network traffic.C . There is no reason not to include...
What is the purpose of Mobile and Remote Access (MRA) in the Cisco UCM architecture?
What is the purpose of Mobile and Remote Access (MRA) in the Cisco UCM architecture?A . MRA is used to access Webex cloud services only if authenticated with on-premises LDAP service.B . MRA is used to make secure PSTN calls by Cisco UCM only while on-premises authentication.C . MRA is...
How are E.164 called-party numbers normalized on a globalized call-routing environment in Cisco UCM?
How are E.164 called-party numbers normalized on a globalized call-routing environment in Cisco UCM?A . Call ingress must be normalized before the call being routed.B . Normalization is not required.C . Normalization is achieved by stripping or translating the called numbers to internally used directory numbers.D . Normalization is achieved...
Which two steps complete the configuration of the SIP trunk security profile?
Refer to exhibit. A collaboration engineer is configuring the Cisco UCM IM and Presence Service. Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)A . Check the box to enable application-level authorization.B . Check the box to allow charging header.C . Check the box to...
Which codec is used?
Refer to exhibit. An engineer configures a VoIP dial peer on a Cisco gateway. Which codec is used?A . G711alawB . No codec is used (missing codec command)C . G.711ulawD . G729r8View AnswerAnswer: D
Which two media resources are allocated to normalize packetization rates through transrating?
Endpoint A is attempting to call endpoint B. Endpoint A only supports G.711ulaw with a packetization rate of 20 ms, and endpoint B supports packetization rate of 30 ms for G.711ulaw. Which two media resources are allocated to normalize packetization rates through transrating? (Choose two.)A . software MTP on Cisco...
According to the QoS Baseline Model, drag and drop the applications from the left onto the Per-Hop Behavior values on the right
DRAG DROP According to the QoS Baseline Model, drag and drop the applications from the left onto the Per-Hop Behavior values on the right. View AnswerAnswer:
Which action prevents this type of toll fraud in the Cisco UCM?
An administrator needs to help a remote employee make a free call to an international destination. The administrator calls the employee, then conferences in the international party. The administrator drops the call, and the employee and the international party continue their conversation. Which action prevents this type of toll fraud...
Which action in the Cisco Unity Connection restriction table resolves this issue?
A company has an excessive number of call transfers to local and long-distance PSTN from Cisco Unity Connection voicemail. Which action in the Cisco Unity Connection restriction table resolves this issue?A . Block PSTN patterns on Default Transfer. Default Outdial. and Default System Transfer.B . Implement password complexity on voicemail...