ExamGecko
Home Home / Cisco / 350-801

Cisco 350-801 Practice Test - Questions Answers, Page 45

Question list
Search
Search

An engineer wants to manually deploy a CISCO Webex DX80 Video endpoint to a remote user. Which type of provisioning is configured on the endpoint?

A.

Cisco Unified Border Element

A.

Cisco Unified Border Element

Answers
B.

Cisco Unity Connection

B.

Cisco Unity Connection

Answers
C.

Cisco Meeting Server

C.

Cisco Meeting Server

Answers
D.

Edge

D.

Edge

Answers
Suggested answer: D

Explanation:

The Cisco Webex DX80 Video endpoint can be provisioned in two ways:

Automatically, using the Cisco Unified Communications Manager (CUCM) or Cisco Video Communication Server (VCS)

Manually, using the Edge provisioning mode

The Edge provisioning mode is used when the endpoint is not connected to the CUCM or VCS. In this mode, the endpoint is configured with the necessary settings, such as the IP address, SIP/H.323 parameters, and time and date.

The Cisco Unified Border Element (Cisco UBE) is a network element that provides security and call control for IP telephony networks. The Cisco Unity Connection is a unified messaging system that provides voicemail, email, and fax services. The Cisco Meeting Server is a video conferencing system

that provides high-quality video and audio conferencing.

How is bandwidth allocated to traffic flows in a flow-based WFQ solution?

A.

All the bandwidth is divided based on the QoS marking of the packets.

A.

All the bandwidth is divided based on the QoS marking of the packets.

Answers
B.

Each type of traffic flow has equal bandwidth.

B.

Each type of traffic flow has equal bandwidth.

Answers
C.

Bandwidth is divided among traffic flows. Voice has priority.

C.

Bandwidth is divided among traffic flows. Voice has priority.

Answers
D.

Voice has priority and the other types of traffic share the remaining bandwidth.

D.

Voice has priority and the other types of traffic share the remaining bandwidth.

Answers
Suggested answer: D

Explanation:

In a flow-based WFQ solution, bandwidth is allocated to traffic flows based on the following criteria:

The priority of the traffic flow

The amount of bandwidth that is available

The number of traffic flows that are competing for bandwidth

Voice traffic is typically given a higher priority than other types of traffic, such as data traffic. This is because voice traffic is more sensitive to latency and jitter than data traffic.

When there is not enough bandwidth to accommodate all of the traffic flows, the WFQ algorithm will prioritize the traffic flows based on their priority. The traffic flows with the highest priority will be given the most bandwidth, and the traffic flows with the lowest priority will be given the least

bandwidth.

If there is still not enough bandwidth to accommodate all of the traffic flows, the WFQ algorithm will start to drop packets. The packets that are dropped will be the packets from the traffic flows with the lowest priority.

An administrator must configure the Local Route Group feature on Cisco UCM. Which step will enable this feature?

A.

For each route group, check the box for the Local Route Group feature.

A.

For each route group, check the box for the Local Route Group feature.

Answers
B.

For each route pattern, select the Local Route Group as the destination.

B.

For each route pattern, select the Local Route Group as the destination.

Answers
C.

For each device pool, configure a route group to use as a Local Route Group for that device pool

C.

For each device pool, configure a route group to use as a Local Route Group for that device pool

Answers
D.

For each route list, configure a route group to use as a Local Route Group.

D.

For each route list, configure a route group to use as a Local Route Group.

Answers
Suggested answer: C

Explanation:

The Local Route Group feature allows you to use a route group as the destination for calls that are placed from a device pool. The route group that you use as the destination for calls from a device pool is called the Local Route Group for that device pool.

To configure the Local Route Group feature, you must first create a route group. You can then configure the Local Route Group feature for a device pool by selecting the route group that you want to use as the Local Route Group for that device pool.

An engineer encounters third-party devices that do not support Cisco Discovery Protocol. What must be configured on the network to allow device discovery?

A.

LLDP

A.

LLDP

Answers
B.

TFTP

B.

TFTP

Answers
C.

LACP

C.

LACP

Answers
D.

SNMP

D.

SNMP

Answers
Suggested answer: A

Explanation:

LLDP (Link Layer Discovery Protocol) is a vendor-neutral network discovery protocol that is used to discover the topology of a network. LLDP is similar to CDP (Cisco Discovery Protocol), but it is not proprietary to Cisco. LLDP is supported by a wide range of network devices, including switches,

routers, and firewalls.

To configure LLDP on a network, you must enable LLDP on the devices that you want to discover. You can then use a network management tool, such as Cisco Network Assistant, to view the topology of the network.

The other options are incorrect. TFTP (Trivial File Transfer Protocol) is a network protocol that is used to transfer files between devices. LACP (Link Aggregation Control Protocol) is a network protocol that is used to aggregate multiple network links into a single logical link. SNMP (Simple Network

Management Protocol) is a network protocol that is used to manage network devices.

Which call flow matches traffic from a Mobile and Remote Access registered endpoint to central call control?

A.

Endpoint>Expressway-C>Expressway-E>Cisco UCM

A.

Endpoint>Expressway-C>Expressway-E>Cisco UCM

Answers
B.

Endpoint>Expressway-E>Expressway-C> Cisco UCM

B.

Endpoint>Expressway-E>Expressway-C> Cisco UCM

Answers
C.

Endpoint>Expressway-E> Cisco UCM

C.

Endpoint>Expressway-E> Cisco UCM

Answers
D.

Endpoint>Expressway-C> Cisco UCM

D.

Endpoint>Expressway-C> Cisco UCM

Answers
Suggested answer: A

Explanation:

The call flow for a Mobile and Remote Access registered endpoint to central call control is as follows:

The endpoint registers with the Expressway-C.

The Expressway-C forwards the registration request to the Expressway-E.

The Expressway-E forwards the registration request to the Cisco UCM.

The Cisco UCM registers the endpoint.

When the endpoint places a call, the call flow is as follows:

The endpoint sends the call request to the Expressway-C.

The Expressway-C forwards the call request to the Expressway-E.

The Expressway-E forwards the call request to the Cisco UCM.

The Cisco UCM places the call.

The Expressway-C and Expressway-E are used to provide secure access to the Cisco UCM for

endpoints that are not located on the corporate network. The Expressway-C is located on the

corporate network, and the Expressway-E is located in the DMZ.

An administrator installs a new Cisco TelePresence video endpoint and receives this error:"AOR is not permitted by Allow/Deny list. Which action should be taken to resolve this problem?

A.

Reboot the VCS server and attempt reregistration.

A.

Reboot the VCS server and attempt reregistration.

Answers
B.

Change the SIP trunk configuration.

B.

Change the SIP trunk configuration.

Answers
C.

Correct the restriction policy settings.

C.

Correct the restriction policy settings.

Answers
D.

Upload a new policy in VCS.

D.

Upload a new policy in VCS.

Answers
Suggested answer: C

Explanation:

The error message "AOR is not permitted by Allow/Deny list" indicates that the endpoint is not allowed to register with the VCS server because it is not on the Allow List or it is on the Deny List. To resolve this problem, you must correct the restriction policy settings.

Which two configuration elements are part of the Cisco UCM toll-fraud prevention?(Choose two.)

A.

feature control policy

A.

feature control policy

Answers
B.

partition

B.

partition

Answers
C.

SIP trunk security profile

C.

SIP trunk security profile

Answers
D.

SUBSCRIBE Calling Search Space

D.

SUBSCRIBE Calling Search Space

Answers
E.

Calling Search Space

E.

Calling Search Space

Answers
Suggested answer: A, E

Explanation:

The following are the configuration elements that are part of the Cisco UCM toll-fraud prevention:

Feature control policy - This policy controls the features that are available to users. For example, you can use this policy to prevent users from making international calls.

Calling Search Space - This space defines the numbers that users can call. For example, you can use this space to prevent users from calling premium-rate numbers.

Refer to the exhibit.


A call is falling to establish between two SIP Devices The called device answers with these SOP Which

SOP parameter causes issue?

A.

The calling device did not offer a ptime value

A.

The calling device did not offer a ptime value

Answers
B.

The media stream is set to send only

B.

The media stream is set to send only

Answers
C.

The payload for G.711ulaw must be 18.

C.

The payload for G.711ulaw must be 18.

Answers
D.

The RTP port is set to 0.

D.

The RTP port is set to 0.

Answers
Suggested answer: D

Explanation:

The RTP port is used to send and receive media packets during a call. If the RTP port is set to 0, the called device will not be able to send or receive media packets, and the call will fail.

The other options are not correct because:

A. The calling device did not offer a ptime value: The ptime value is used to specify the amount of time between each media packet. If the calling device does not offer a ptime value, the called device will use the default value of 20 milliseconds.

B. The media stream is set to sendonly: The media stream is set to sendonly when the called device is only able to send media packets, and not receive them. This is not a problem, and the call will still

succeed.

C. The payload for G.711ulaw must be 18: The payload for G.711ulaw is the type of media packet

that is used. The payload must be set to 18 for G.711ulaw, but this is not a problem, and the call will

still succeed.

Which wildcard must an engineer configure to match a whole domain in SIP route patterns?

A.

*

A.

*

Answers
B.

@

B.

@

Answers
C.

!

C.

!

Answers
D.

.

D.

.

Answers
Suggested answer: A

Explanation:

The asterisk (*) wildcard is used to match any sequence of characters, including an empty sequence.

Therefore, it can be used to match any domain name in a SIP Route Pattern.

The other options are not correct because:

B. @: The @ symbol is used to separate the user name from the domain name in an email address.

C. !: The ! symbol is used to negate a character class.

D. .: The . symbol is used to match any single character.

An administrator is asked to implement toll fraud prevention in Cisco UCM, specifically to restrict offnet to off-net call transfers. How is this implemented?

A.

Enforce ad-hoc conference restrictions.

A.

Enforce ad-hoc conference restrictions.

Answers
B.

Set the appropriate service parameter.

B.

Set the appropriate service parameter.

Answers
C.

Implement time-of-day routing.

C.

Implement time-of-day routing.

Answers
D.

Use the correct route filters.

D.

Use the correct route filters.

Answers
Suggested answer: B

Explanation:

To restrict off-net to off-net call transfers, an administrator can set the "Block Offnet to Offnet Transfer" service parameter to "On". This will prevent users from transferring calls from one external number to another external number.

The other options are not correct because:

A. Enforce ad-hoc conference restrictions: This will prevent users from creating ad-hoc conferences, but it will not prevent them from transferring calls.

C. Implement time-of-day routing: This will allow calls to be routed to different destinations based on the time of day, but it will not prevent users from transferring calls.

D. Use the correct route filters: This will allow calls to be filtered based on the destination, but it will not prevent users from transferring calls.

Total 460 questions
Go to page: of 46