Ensurepass

 

QUESTION 181

In a centralized call-processing solution, there are five sites connected through an IP WAN. To optimize the utilization of the IP WAN, CAC needs to be implemented. How should CAC be implemented?

 

A.

use a gatekeeper to control allocated bandwidth properly

B.

use locations CAC with a single location

C.

use a gatekeeper and Cisco Unified Border Element to provide CAC to sites that use a combination of SIP and MGCP gateways

D.

use a gatekeeper to only control those locations that use H.323 gateways and a Cisco Unified Border Element to control those sites that use MGCP or SIP gateways

E.

use locations CAC with five locations in addition to Hub none

&nb
sp;

Correct Answer: E

Explanation:

Incorect answer: ABCD

A location setting of Hub_None means that the locations feature does not keep track of the bandwidth that this annunciator consumes.

http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_5_1/ccmcfg/b06ctirp.html

 

 

QUESTION 182

You have two clusters with six Cisco Unified CallManager systems in each. How many ICTs must be configured to provide full server redundancy if a gatekeeper is present in the network?

 

A.

4

B.

6

C.

5

D.

1

 

Correct Answer: D

 

 

QUESTION 183

abc.com’s Bicycles has three manufacturing plants and 145 retail stores. Each of the manufacturing plants has a Cisco Unified CallManager cluster. The retail stores use a mix of Cisco Unified CallManager Express and key systems with gateways. What is the recommended trunk type to use on the Cisco Unified CallManager clusters for full intersite calling capability?

 

A.

gatekeeper-controlled interclustertrunks

B.

gatekeeper-controlled H.225 trunks

C.

non-gatekeeper-controlled intercluster trunks

D.

SIP trunks

 

Correct Answer: B

 

 

QUESTION 184

What is the impact of setting an RSVP policy per location pair with a default interlocation RSVP service policy?

 

A.

the default interlocation RSVP service policy will be overridden

B.

an RSVP mandatory mid-call retry counter will be added to calls that encounter mid-call retry errors

C.

additional bandwidth capacity will be added to the default interlocation RSVP service policy

D.

the RSVP policy will only be associated with one type of call; for example, if it is associated with video calls, audio calls will not be impacted

 

Correct Answer: A

 

 

QUESTION 185

What is one difference between Cisco inline power and 802.3af PoE?

 

A.

Cisco inline power should only be activated for those ports that require PoE to avoid oversubscription.

B.

You must determine the total number of IP phones the switch can support with 802.3af to avoid oversubscription.

C.

You must specify which set of pins the powered device is going to accept power on for 802.3af.

D.

Cisco inline power provides a variable amount of power by using CDP.

 

Correct Answer: B

 

 

QUESTION 186

DRAG DROP

You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in CoS values. In this particular scenario a catalyst switch has been configured to trust IP phones. Match the proper Switchassigned CoS Value with appropriate traffic type.

 

clip_image001

 

Correct Answer:

clip_image002

 

 

QUESTION 187

A dial peer is configured with an outgoing COR list. Which two conditions must be met for calls matching this outbound dial peer to be blocked? (Choose two.)

 

A.

An incoming COR list must be configured on the matched inbound dial peer.

B.

An incoming COR list must be configured on the matched outbound dial peer.

C.

The outgoing COR list must be a superset of the incoming COR list.

D.

The incoming COR list and the outgoing COR list must contain the same members.

E.

The outgoing COR list must be a subset of the incoming COR list.

 

Correct Answer: AE

 

 

QUESTION 188

At the very minimum which settings should be set on a Cisco ip phone that is placed in a public Space like a lobby? (Choose two)

 

A.

Enable GARP

B.

Disable Settings button on the IP phone

C.

Disable PC Port access

D.

disable PC voice VLAN access

E.

Disable Web access on the IP phone

 

Correct Answer: BC

 

 

QUESTION 189

Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.)

 

A.

the trusted introducer uses the signed certificates of the endpoints that need to communicate

B.

the introducer digitally signs the public key of the user with the public key of the introducer to generate a signed certificate

C.

only the public key of the introducer has to be initially known and verified by all other entities

D.

pki uses only a single trusted introducer

 

Correct Answer: CD

Explanation:

Chapter 14: Understanding Cryptographic Fundamentals and PKI pg. 374 A PKI does not eliminate the need for authenticity when you exchange public keys in an asymmetric encryption environment, but it solves the scalability issues associated with that process.

A PKI uses the concept of a single, trusted introducer. Instead of securely exchanging all public keys among all devices, only the public key of the trusted introducer has to be securely distributed to all devices. This exchange is usually done by downloading the public key and then verifying it out of band.

 

 

QUESTION 190

Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)

 

A.

digest authentication

B.

https

C.

PKI

D.

TLS

 

Correct Answer: AD

Free VCE & PDF File for Cisco 642-447 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

 

Comments are closed.