List of questions
Related questions
Question 284 - 350-801 discussion
Refer to the exhibit.
A collaboration engineer is configuring the Cisco UCM IM and Presence Service. Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)
A.
Check the box to accept replaces header.
B.
Check the box to allow charging header.
C.
Check the box to enable application-level authorization.
D.
Check the box to transmit security status.
E.
Check the box to accept unsolicited notification.
Your answer:
0 comments
Sorted by
Leave a comment first