Exam4Training

Which two steps complete the configuration of the SIP trunk security profile?

Refer to the exhibit.

A collaboration engineer is configuring the Cisco UCM IM and Presence Service.

Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)
A . Check the box to accept replaces header.
B . Check the box to allow charging header.
C . Check the box to enable application-level authorization.
D . Check the box to transmit security status.
E . Check the box to accept unsolicited notification.

Answer: AE

Latest 350-801 Dumps Valid Version with 103 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version