ExamGecko
Home Home / Cisco / 350-801

Cisco 350-801 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Which type of message must an administrator configure in the SIP Trunk Security Profile for a Message Waiting Indicator light to work with a SIP integration between Cisco UCM and Cisco Unity Connection?

A.

Unsolicited NOTIFY

A.

Unsolicited NOTIFY

Answers
B.

200 ok

B.

200 ok

Answers
C.

SIP Register

C.

SIP Register

Answers
D.

TCP port 5060

D.

TCP port 5060

Answers
Suggested answer: A

The security department will audit an IT department to ensure that the proper guidelines are being followed. The reports of the call detail records show unauthorized access to PSTN. Which two actions should an administrator check to prevent the unauthorized use of the telephony system? (Choose

two.)

A.

Ensure that ad hoc conference calls are dropped if an external user is add.

A.

Ensure that ad hoc conference calls are dropped if an external user is add.

Answers
B.

Call forward settings (ALL/Busy/No Answer) are restricted to internal extensions in the network

B.

Call forward settings (ALL/Busy/No Answer) are restricted to internal extensions in the network

Answers
C.

Add an additional firewall between the Cisco UCM server and the Expressway Core server.

C.

Add an additional firewall between the Cisco UCM server and the Expressway Core server.

Answers
D.

For extension mobility, logged-out CSS is restricted to internal extensions and emergencies.

D.

For extension mobility, logged-out CSS is restricted to internal extensions and emergencies.

Answers
E.

Forced authorization code is used to recognize a dialing extension and authorize an international call.

E.

Forced authorization code is used to recognize a dialing extension and authorize an international call.

Answers
Suggested answer: B, E

Which Cisco lM and Presence service handles failover and state changes in the cluster?

A.

XCP Sync Agent

A.

XCP Sync Agent

Answers
B.

Cisco Server Recovery Manager

B.

Cisco Server Recovery Manager

Answers
C.

Cisco XCP Connection Manager

C.

Cisco XCP Connection Manager

Answers
D.

XCP router

D.

XCP router

Answers
Suggested answer: B

SIP proxies have operations defined in RFC 3261 and supporting extensions. Though no lETF RFC completely defines how SBCs must function. SBCs evolved over the years.

Which two operations demonstrate the high-level differences between SBCs and SIP proxies?

(Choose two.)

A.

Stateful proxies are context-aware and can terminate communication sessions by themselves

A.

Stateful proxies are context-aware and can terminate communication sessions by themselves

Answers
B.

SlP proxies add a Via header and optionally a Record-Route header, and the rest of the headers are left untouched

B.

SlP proxies add a Via header and optionally a Record-Route header, and the rest of the headers are left untouched

Answers
C.

SBCs can modify headers such as To, From, Contact, and Call-D.lt can introduce new headers into the SIP message

C.

SBCs can modify headers such as To, From, Contact, and Call-D.lt can introduce new headers into the SIP message

Answers
D.

SBCs are capable of interworking completely different protocols to set up, modify, and tear down communication sessions. It includes SIP, H.323,and MGCP protocols

D.

SBCs are capable of interworking completely different protocols to set up, modify, and tear down communication sessions. It includes SIP, H.323,and MGCP protocols

Answers
E.

SIP proxies are SDP-aware and can change the SDP bodies

E.

SIP proxies are SDP-aware and can change the SDP bodies

Answers
Suggested answer: B, D

Refer to the exhibit.

When a call is received on Cisco Unified Border Element. from which lP does it allow a connection?

A.

192.168.100.103

A.

192.168.100.103

Answers
B.

192.168.102.102

B.

192.168.102.102

Answers
C.

192.168.100.102

C.

192.168.100.102

Answers
D.

192.168.101.201

D.

192.168.101.201

Answers
Suggested answer: B

What are two common attributes of XMPP XML stanzas? (Choase two.)

A.

from

A.

from

Answers
B.

to

B.

to

Answers
C.

destination

C.

destination

Answers
D.

version

D.

version

Answers
E.

Source

E.

Source

Answers
Suggested answer: A, B

Which two devices are supported by the Flexible DSCP Marking and Video Promotion feature? (Choose two.)

A.

MGCP devices

A.

MGCP devices

Answers
B.

SCCP devices

B.

SCCP devices

Answers
C.

pass-through MTPs

C.

pass-through MTPs

Answers
D.

H.323 trunks

D.

H.323 trunks

Answers
E.

DX80

E.

DX80

Answers
Suggested answer: B, C

A Cisco voice gateway is configured to use a sip-kpml DTMF relay in global settings. A new SIP dial peer is configured for a third-party application that only supports an in-band DTMF relay. Which commands must an engineer run on the dial peer?

A.

dtmf-relay sip-info

A.

dtmf-relay sip-info

Answers
B.

dtmf-relay sip-notify

B.

dtmf-relay sip-notify

Answers
C.

dtmf-relay rtp-net

C.

dtmf-relay rtp-net

Answers
D.

no dtmf-relay sip-kpml

D.

no dtmf-relay sip-kpml

Answers
Suggested answer: C

What is a reason for using a Diffserv value of AF41 for video traffic?

A.

Video traffic cannot tolerate any packet loss and has a latency of 150 miliseconds

A.

Video traffic cannot tolerate any packet loss and has a latency of 150 miliseconds

Answers
B.

Video traffic can tolerate up to 10% packet loss and latency of 10 seconds

B.

Video traffic can tolerate up to 10% packet loss and latency of 10 seconds

Answers
C.

Video trafic can tolerate up to 5% packet loss and latency of 5 seconds

C.

Video trafic can tolerate up to 5% packet loss and latency of 5 seconds

Answers
D.

Video traffic can tolerate a packet loss of up to 1% and latency of 150 milliseconds

D.

Video traffic can tolerate a packet loss of up to 1% and latency of 150 milliseconds

Answers
Suggested answer: D

A collaboration engineer is configuring the QoS trust boundary for Cisco UCM voice and video conferencing. Which two trust boundary configurations are valid? (choose two)

A.

QoS trust boundaries include all the devices directly attached to the access switch ports

A.

QoS trust boundaries include all the devices directly attached to the access switch ports

Answers
B.

QoS trust boundaries can be extended to Jabber running on a PC

B.

QoS trust boundaries can be extended to Jabber running on a PC

Answers
C.

QoS trust boundaries exclude Jabber softphone running on a PC

C.

QoS trust boundaries exclude Jabber softphone running on a PC

Answers
D.

QoS trust boundaries can be extended to voice and video devices if the connected PCs are included

D.

QoS trust boundaries can be extended to voice and video devices if the connected PCs are included

Answers
E.

QoS trust boundaries can be extended to voice and video devices exclusively

E.

QoS trust boundaries can be extended to voice and video devices exclusively

Answers
Suggested answer: C, D

Explanation:

Total 460 questions
Go to page: of 46