ExamGecko
Home Home / Cisco / 350-801

Cisco 350-801 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A customer reports that the Cisco UCM toll-fraud prevention does not work correctly, and the customer is receiving charges for unapproved international calls as a result. Which two configuration changes resolve the issues? (Choose two.)

A.

Use Cisco Unified Border Element to debug the calls.

A.

Use Cisco Unified Border Element to debug the calls.

Answers
B.

Disable call forwarding on the phone.

B.

Disable call forwarding on the phone.

Answers
C.

Make the calls route through a firewall.

C.

Make the calls route through a firewall.

Answers
D.

Mark patterns as off-net or on net.

D.

Mark patterns as off-net or on net.

Answers
E.

Modify the Block OffNet to OffNet Transfer service parameter.

E.

Modify the Block OffNet to OffNet Transfer service parameter.

Answers
Suggested answer: D, E

An administrator configures international calling on a Cisco UCM cluster and wants to minimize the number of route patterns that are needed. Which route pattern enables the administrator to match variable-length numbers?

A.

9.011@

A.

9.011@

Answers
B.

9.011#

B.

9.011#

Answers
C.

9.011*

C.

9.011*

Answers
D.

9.011!

D.

9.011!

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/srnd/collab12/collab12/dialplan.html

A Cisco UCM administrator sets up new route patterns to support phones in four different locations, all with local gateways. The administrator wants to use the same route pattern for all four locations.

How must the system be configured to achieve this goal?

A.

Use transforms in the route groups.

A.

Use transforms in the route groups.

Answers
B.

Use standard local route groups.

B.

Use standard local route groups.

Answers
C.

Add a CSS to each local gateway.

C.

Add a CSS to each local gateway.

Answers
D.

Use CSS alternate routing rules.

D.

Use CSS alternate routing rules.

Answers
Suggested answer: B

What are the last two bits of a DS field in DiffServe Byte used for?

A.

AFxy

A.

AFxy

Answers
B.

ECN

B.

ECN

Answers
C.

INC

C.

INC

Answers
D.

RMI

D.

RMI

Answers
Suggested answer: B

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_dfsrv/configuration/15-mt/qos-dfsrv-15-mt-book/qos-dfsrv.html

What are two QoS requirements for VoIP traffic? (Choose two.)

A.

Loss must be no more than 1 percent.

A.

Loss must be no more than 1 percent.

Answers
B.

Voice traffic must be marked to DSCP AF41.

B.

Voice traffic must be marked to DSCP AF41.

Answers
C.

One-way latency must be no more than 200 ms.

C.

One-way latency must be no more than 200 ms.

Answers
D.

Voice traffic must be marked to DSCP EF.

D.

Voice traffic must be marked to DSCP EF.

Answers
E.

Average one-way jitter is greater than 50 ms.

E.

Average one-way jitter is greater than 50 ms.

Answers
Suggested answer: A, D

What is an indicator of network congestion in VoIP communications?

A.

jitter increase due to variable delay

A.

jitter increase due to variable delay

Answers
B.

video loss due to video frame corruption

B.

video loss due to video frame corruption

Answers
C.

gaps in the voice due to packet loss

C.

gaps in the voice due to packet loss

Answers
D.

discards in the interface of routers and switches

D.

discards in the interface of routers and switches

Answers
Suggested answer: A

An engineer configures a SIP trunk for MWI between a Cisco UCM cluster and Cisco Unity Connection. The Cisco UCM cluster fails to receive the SIP notify messages. Which two SIP trunk settings resolve this issue? (Choose two.)

A.

transmit security status

A.

transmit security status

Answers
B.

accept unsolicited notification

B.

accept unsolicited notification

Answers
C.

allow charging header

C.

allow charging header

Answers
D.

accept out-of-band notification

D.

accept out-of-band notification

Answers
E.

accept out-of-dialog refer

E.

accept out-of-dialog refer

Answers
Suggested answer: B, E

What are the predefined call handlers in Cisco Unity Connection?

A.

opening greeting, operator, and goodbye

A.

opening greeting, operator, and goodbye

Answers
B.

opening greeting, welcome, and default system

B.

opening greeting, welcome, and default system

Answers
C.

greetings, operator, and closed

C.

greetings, operator, and closed

Answers
D.

caller input, greetings, and transfer

D.

caller input, greetings, and transfer

Answers
Suggested answer: A

Explanation:

Reference:

https://www.cisco.com/en/US/docs/voice_ip_comm/connection/1x/administration/guide/acm030.html

An administrator configures the voicemail feature in a Cisco collaboration deployment. The user mailboxes must be configured when the Cisco Unity Connection server is configured. Which action accomplishes this task?

A.

Configure an SCCP integration with Cisco UCM.

A.

Configure an SCCP integration with Cisco UCM.

Answers
B.

Configure a SIP integration with Cisco UCM to sync users.

B.

Configure a SIP integration with Cisco UCM to sync users.

Answers
C.

Configure an AXL server to access the Cisco UCM users.

C.

Configure an AXL server to access the Cisco UCM users.

Answers
D.

Configure an active directory to sync the users who will have a voicemail box.

D.

Configure an active directory to sync the users who will have a voicemail box.

Answers
Suggested answer: B

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/unity_exp/rel3_1/administration/guide/voicemail/3VMpara.html

A company has an excessive number of call transfers to local and long-distance PSTN from Cisco Unity Connection voicemail. Which action in the Cisco Unity Connection restriction table resolves this issue?

A.

Block PSTN patterns on Default Transfer, Default Outdial, and Default System Transfer.

A.

Block PSTN patterns on Default Transfer, Default Outdial, and Default System Transfer.

Answers
B.

Implement password complexity on voicemail boxes to prevent accounts from being compromised.

B.

Implement password complexity on voicemail boxes to prevent accounts from being compromised.

Answers
C.

Create a custom restriction table *********** and block it.

C.

Create a custom restriction table *********** and block it.

Answers
D.

Create a custom restriction table ??????????? and block it.

D.

Create a custom restriction table ??????????? and block it.

Answers
Suggested answer: A
Total 460 questions
Go to page: of 46