EnsurepassQUESTION 188 Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)   A.      digest authentication B.      https C.      PKI D.      TLS   Answer: A,D      QUESTION 189 At the very minimum which settings should be set on a Cisco ip phone that is placed in a public Space like a lobby? (Choose Read more [...]
EnsurepassQUESTION 177 DRAG DROP You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in CoS values. In this particular scenario a catalyst switch has been configured to trust IP phones. Match the proper Switchassigned CoS Value with appropriate traffic type. Answer:       QUESTION 178 What is the impact of setting an RSVP policy per location pair with a default interlocation RSVP service policy?   A.      the default interlocation Read more [...]
EnsurepassQUESTION 175 How many backup sessions can be active at one time in the Disaster Recovery System?   A.      two, one automatic incremental and one scheduled automatic full backup B.      one, either automatic or manual C.      two, one automatic and one manual backup D.      three, one scheduled automatic incremental, one scheduled automatic full backup and one manual backup   Read more [...]
EnsurepassQUESTION 170 DRAG DROP You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in trunk types. Match the proper trunk type with appropriate use. Answer:       QUESTION 171 How does the Cisco Unified CallManager use RSVP?   A.      it uses RSVP reservations to request double the bandwidth so calls can flow in both directions B.      it uses the RSVP-configured bandwidth between sites as a Read more [...]
EnsurepassQUESTION 163 For phone hardening tasks, which two statements are accurate? (Choose two.)   A.      By default, Cisco Unified CallManager disables the PC port on all Cisco IP phones that have a PC port. It is possible to enable the PC Port setting in the Phone Configuration window of Cisco Unified CallManager Administration. B.      Disabling PC voice VLAN access will cause packets received from the PC port that uses the voice VLAN Read more [...]
EnsurepassQUESTION 153 What are three goals of subscriber?   A.      Writebale databse B.      Place the data to COR C.      Provides call forwarding D. Place the data to CDR D.      Provides call processing E.       Provides Admin Rights F.       Read only database   Answer: D,E,G      QUESTION 154 What Read more [...]
EnsurepassQUESTION 144 Which new traffic type has been added between Cisco Unified CallManager 5.0 servers?   A.      management channel traffic B.      call processing traffic C.      licensing message traffic D.      database traffic   Answer: C      QUESTION 145 Which two steps must a user take to use a prepared stock quote XML application on an IP phone? (Choose Read more [...]
EnsurepassQUESTION 137 When creating your own CSV file to be used by Cisco Unified Communications Manager BAT, which three rules do you need to follow? (Choose three.)   A.      Do not enter blank lines; otherwise, errors occur during the insert transaction. B.      Edit the Excel macro for each separate Unified Communications Manager BAT transaction. C.      Use a separate line for each data record. D.      Read more [...]
EnsurepassQUESTION 127 Which two steps are required to configure LDAP authentication? (Choose two.)   A.      Add a Cisco Unified Communications Manager directory user and assign administrator access rights to the user in the LDAP directory. B.      Activate Cisco Dir Sync service. C.      Configure a synchronization schedule. D.      Configure the LDAP server type in Cisco Unified Communications Read more [...]
EnsurepassQUESTION 117 Which three of these are considered to be Cisco Unified Communications Manager feature services? (Choose three.)   A.      Cisco CallManager B.      Cisco CDP C.      Cisco DB Replicator D.      Cisco CallManager Admin services E.       Cisco TFTP F.       Cisco DirSync services   Answer: A,E,F  Read more [...]
EnsurepassQUESTION 114 Which of the following actions will prevent devices from being able to initiate conferences?   A.      Exclude the conference media resource partitions from the CSS. B.      Exclude the conference media resources from all MRGs C.      Place all conference media resources in MRGs and exclude these MRGs from the MRGL D.      Remove the default MRGL from the device pool. Read more [...]