Exam Code: 300-075 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 300-075 Exam.

2016 Jun 300-075 Study Guide Questions:

Q136. Which command is needed to utilize local dial peers on an MGCP-controlled ISR during an SRST failover? 

A. ccm-manager fallback-mgcp 

B. telephony-service 

C. dialplan-pattern 

D. isdn overlap-receiving 

E. voice-translation-rule 

Answer: A 


Q137. Which device is used to connect to the H.323 gatekeeper? 

A. H.323 gateway 

B. SIP trunk 

C. H.323 trunk 

D. MGCP gateway 

Answer: C 


Q138. What user profile is used to define the settings for a user on login? 

A. Device Profile 

B. Group Profile 

C. Pool Profile 

D. Specific Profile 

Answer: A 


Q139. Which command can be used to manually send the MGCP gateway to register with the secondary Cisco Unified Communications Manager server? 

A. ccm-manager switchover-to-backup 

B. mgcp use backup 

C. ccm-manager register backup 

D. not supported 

Answer: A 


Q140. The administrator at Company X is trying to set up Extension Mobility and has done these steps: 

-Set up end users accounts for the users who need to roam 

-Set up a device profile for the type of phones users will be allowed to log in Users have reported to the administrator that they are unable to log in to the phones 

designated for Extension Mobility. Which two options are the two reasons for this issue? (Choose two.) 

A. The user device profile is not associated to the correct end user. 

B. The username must be numeric only and must match the DN. 

C. The Extension Mobility service has not been enabled under the Cisco Unified Serviceability Page. 

D. Extension Mobility has not been enabled under Enterprise Parameters. 

E. The user must ensure that their main endpoint is online and registered, otherwise they cannot log in elsewhere. 

Answer: A,C 


300-075 answers

Up to the immediate present 300-075 exam engine:

Q141. Which bandwidth amounts are correct for configuring locations? 

A. 8 kb/s for G.729, 64 kb/s for G.711, and 64 kb/s for G.722 

B. 8 kb/s for G.729, 64 kb/s for G.711, and 16 kb/s for G.722 

C. 64 kb/s for G.729, 64 kb/s for G.711, and 64 kb/s for G.722 

D. 8 kb/s for G.729, 8 kb/s for G.711, and 8 kb/s for G.722 

Answer: A 


Q142. Refer to the exhibit. 


With the Mobile Connect feature configured, when the PSTN phone calls the Enterprise user at extension 3001, the Enterprise user's mobile phone does not ring. Which CSS is responsible for ensuring that the correct partitions are accessed when calls are sent to the Enterprise user's mobile phone? 

A. the gateway CSS 

B. the Phone Device CSS 

C. the Remote Destination Profile CSS 

D. the Remote Destination Profile Rerouting CSS 

E. the Phone Line (DN)CSS 

Answer: D 

Explanation: 

Incorrect Answer: A, B, C, E 

Ensure that the gateway that is configured for routing mobile calls is assigned to the partition that belongs to the Rerouting Calling Search Space. Cisco Unified Communications Manager determines how to route calls based on the remote destination number and the Rerouting Calling Search Space. Link: http://www.cisco.com/en/US/docs/voice_ip_comm/cucmbe/admin/8_6_1/ccmfeat/fsmobmgr .html 


Q143. Refer to the exhibit. 


All HQ phones are configured to use HQ_MRGL and all BR phones are configured to use BR_MRGL. For the HQ phones always to use the hardware conference bridge as a first choice, which configuration should be implemented? 

A. Ensure that both the hardware and software conference bridges are listed in the HQ_MRG. Ensure that the instance ID for the hardware conference bridge is 0. 

B. Ensure that both the hardware and software conference bridges are listed in the HQ_MRG. The hardware conference bridge must be configured first. 

C. Assign the hardware conference bridge to HQ_MRG. Configure a second HQ_MRG_2 and assign the software conference bridge to it. Add both the HQ_MRG and HQ_MRG_2 to the HQ_MRGL and list the HQ_MRG first. 

D. Assign the hardware conference bridge to HQ_MRG. Configure a second HQ_MRG_2 and assign the software conference bridge to it. Configure an additional HQ_MRGL_2. Add the HQ_MRG to HQ_MRGL. Add HQ_MRG_2 to HQ_MRGL_2. The HQ_MRGL should be assigned to the HQ phones. The HQ_MRGL_2 should be assigned to the HQ device pool. 

Answer: C 


Q144. Which statement best describes globalized call routing in Cisco Unified Communications Manager? 

A. All incoming calling numbers on the phones are displayed as an E.164 with the + prefix. 

B. Call routing is based on numbers represented as an E.164 with the + prefix format. 

C. All called numbers sent out to the PSTN are in E.164 with the + prefix format. 

D. The CSS of all phones contain partitions assigned to route patterns that are in global format. 

E. All phone directory numbers are configured as an E.164 with the + prefix. 

Answer: B 

Explanation: 

Incorrect Answer: A, C, D, E For the destination to be represented in a global form common to all cases, we must adopt a global form of the destination number from which all local forms can be derived. The + sign is the mechanism used by the ITU's E.164 recommendation to represent any PSTN number in a global, unique way. This form is sometimes referred to as a fully qualified PSTN number. Link: http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/srnd/7x/dialplan.html#wp1153205 


Q145. Which two statements about symmetric encryption are true? (Choose two.) 

A. With symmetric encryption, the encryption key equals the decryption key. 

B. Symmetric encryption is commonly used to sign asymmetric keys. 

C. Symmetric encryption is a good choice for real-time encryption of bulk data. 

D. Symmetric encryption uses asymmetric keys. 

Answer: A,C 

Explanation: 

Incorrect Answer: B, D There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) in symmetric key As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Link: 

http://support.microsoft.com/kb/246071 


300-075 test question

Accurate 300-075 questions pool:

Q146. Refer to the exhibit. 


Which statement about the configuration between the Default and BR regions is true? 

A. Calls between the two regions can use either 64 kbps or 8 kbps. 

B. Calls between the two regions can use only the G.729 codec. 

C. Only 64 kbps will be used between the two regions because the link is "lossy". 

D. Both codecs can be used depending on the loss statistics of the link. When lossy conditions are high, the G.711 codec will be used. 

Answer: B 


Q147. Which two configurations can you perform to allow Cisco Unified Communications Manager SIP trunks to send an offer in the INVITE? (Choose two.) 

A. Enable the Media Termination Point Required option on the SIP trunk. 

B. Enable the Early Offer Support for Voice and Video Calls option on the SIP profile. 

C. Select the Display IE Delivery check box in the gateway configuration. 

D. Select the Enable Inbound FastStart check box on the Cisco Unified Communications Manager servers. 

E. Select the SRTP Allowed check box on the SIP trunk. 

F. Execute the isdn switch-type primary-ni command globally. 

Answer: A,B 


Q148. A voice-mail product that supports only the G.711 codec is installed in headquarters. 

Which action allows branch Cisco IP phones to function with voice mail while using only the G.729 codec over the WAN link to headquarters? 

A. Configure Cisco Unified Communications Manager regions. 

B. Configure transcoding within Cisco Unified Communications Manager. 

C. Configure transcoding resources in Cisco IOS and assign to the MRGL of Cisco IP phones. 

D. Configure transcoder resources in the branch Cisco IP phones. 

Answer: C 


Q149. Which two actions are performed by the Call Control Discovery service after the local Cisco Unified Communications Manager loses its TCP connection with the primary and secondary Service Advertisement Framework? (Choose two.) 

A. Calls are routed to the PSTN gateway after the Call Control Discovery Learned Pattern IP Reachable Duration parameter expires. 

B. All learned patterns are purged from the local cache after the Call Control Discovery PSTN Failover Duration parameter expires. 

C. The Service Advertisement Framework forwarder contacts all the remaining Service Advertisement Framework forwarders in the cluster. 

D. All the remaining Service Advertisement Framework forwarders are notified for their learned patterns. 

E. The Cisco Unified Communications Manager establishes a connection with the primary and secondary Service Advertisement Framework after the Learned Pattern IP Reachable Duration parameter expires. 

F. Call Control Discovery immediately redirects all the calls to the PSTN gateway based on the learned patterns. 

Answer: A,B 


Q150. Scenario 

There are two call control systems in this item. The Cisco UCM is controlling the DX650, the Cisco Jabber for Windows Client, and the 9971 Video IP Phone. The Cisco VCS is controlling the SX20, the Cisco TelePresence MCU, and the Cisco Jabber TelePresence for Windows. 

Use the exhibits to answer the following questions. 

SX20 System Information 


DX650 Configuration 


MRGL 


DP 


Locations 


AARG 


CSS 


Movi Failure 


Movi Settings 


What two issues could be causing the Cisco Jabber Video for TelePresence failure shown in the exhibit? (Choose two.) 

A. Incorrect username and password 

B. Wrong SIP domain configured. 

C. User is not associated with the device. 

D. IP or DNS name resolution issue. 

E. CSF Device is not registered. 

F. IP Phone DN not associated with the user. 

Answer: B,D