How does the administrator stop the conference from continuing?
A company hosts a conference call with no local users. How does the administrator stop the conference from continuing?A . modifies the Drop Ad Hoc Conference service parameter B. modifies the Block OffNet to OffNet Transfer service parameter C. removes the transcoder D. changes the codecs that are supported on...
Which action prevents toll fraud in Cisco UCM?
Which action prevents toll fraud in Cisco UCM?A . Implement route patterns in Cisco UCM. B. Implement toll fraud restriction in the Cisco IOS router. C. Allow off-net to off-net transfers. D. Configure ad hoc conference restriction.View AnswerAnswer: D
Which codec is used?
Refer to the exhibit. An engineer configures a VoIP dial peer on a Cisco gateway. Which codec is used?A . G711alaw B. No codec is used (missing codec command) C. G.711ulaw D. G729r8View AnswerAnswer: D
What is the method that needs to be followed?
A company deploys centralized cisco ucm architecture for a hub location and two remote sites. * The company has only one ITSP connection at the hub connection, and ITSP supports only G.711 calls * Remote site A has a 1-Gbps fiber connection to the hub connection and calls to and...
Which Cisco lM and Presence service handles failover and state changes in the cluster?
Which Cisco lM and Presence service handles failover and state changes in the cluster?A . XCP Sync Agent B. Cisco Server Recovery Manager C. Cisco XCP Connection Manager D. XCP routerView AnswerAnswer: B
What describes the outcome when the trust boundary is defined at the Cisco IP phone?
What describes the outcome when the trust boundary is defined at the Cisco IP phone?A . Packets or Ethernet frames are remarked at the distribution layer switch. B. Packets or Ethernet frames are not remarked at the access layer switch. C. Packets or Ethernet frames are not remarked by the...
Why isn’t an end user s PC device in a QoS trust boundary included?
Why isn’t an end user s PC device in a QoS trust boundary included?A . The end user could incorrectly tag their traffic to bypass firewalls. B. The end user may incorrectly tag their traffic to be prioritized over other network traffic. C. There is no reason not to include...
Which two operations demonstrate the high-level differences between SBCs and SIP proxies?
SIP proxies have operations defined in RFC 3261 and supporting extensions. Though no lETF RFC completely defines how SBCs must function. SBCs evolved over the years. Which two operations demonstrate the high-level differences between SBCs and SIP proxies? (Choose two.)A . Stateful proxies are context-aware and can terminate communication sessions...
What is the cause of this issue and how should it be resolved?
Refer to the exhibit. An administrator is attempting to register a SIP phone to a Cisco UCM but the registration is failing. The IP address of the SIP Phone is 10.117.34.222 and the IP address of the Cisco UCM is 10.0.101.10. Pings from the SIP phone to the Cisco UCM...
Which components are required to enable Cisco Mobile and Remote Access for the users?
A company wants to provide remote users with access to its on-premises Cisco collaboration features. Which components are required to enable Cisco Mobile and Remote Access for the users?A . Cisco Expressway-E, Cisco IM and Presence Server, and Cisco Video Communication Server B. Cisco Unified Border Element, Cisco IM and...