Download of 300 075 pdf free practice questions materials and faq for Cisco certification for IT specialist, Real Success Guaranteed with Updated 300 075 pdf pdf dumps vce Materials. 100% PASS Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) exam Today!
Q101. To preserve analog calls in an MGCP switchback event, which three commands must be configured in the MGCP fallback router? (Choose three.)
C. voice service voip
F. no h225 timeout keepalive
Incorrect Answer: B, D, E these additional command for call preservation when using MGCP fallback: voice service voip h323 no h225 timeout keepalive Reference. CCNP Voice CIPT2 642-457 Quick Reference, 2nd Edition
Q102. Which action configures the registration of transcoder resources?
A. Cisco IOS software registers transcoder resources with SIP.
B. Cisco IOS software registers transcoder resources with SCCP.
C. Cisco IOS software registers transcoder resources with H.323.
D. Cisco IOS software does not register transcoder resources.
Q103. Which Cisco IOS command is used for internal SAF Clients to check SAF learned routes?
A. show eigrp address-family ipv4 saf
B. show voice saf routes
C. show voice saf detail
D. show eigrp service-family ipv4 saf
E. show voice saf dndb all
Incorrect Answer: A, B, C, D Router# show voice saf dnDb all Total no. of patterns in db/max allowed : 1/6000 Patterns classified under dialplans (private/global) : 0/1 Informational/Error stats -Patterns w/ invalid expr detected while add : 0 Patterns duplicated under the same instance : 0 Patterns rejected overall due to max capacity : 0 Attempts to delete a pattern which is invalid : 0
Last successful DB update @ 2009:12:14 15:42:45:967 Link:
Q104. In the case of a VCS cluster, which configuration element is recommended for endpoint H.323 registration?
A. DNS SRV records pointing to the VCS cluster name
B. static IP addresses
C. hostname of the VCS cluster configuration master
D. hostname of the VCS cluster member peer
Q105. Which two statements about symmetric encryption are true? (Choose two.)
A. With symmetric encryption, the encryption key equals the decryption key.
B. Symmetric encryption is commonly used to sign asymmetric keys.
C. Symmetric encryption is a good choice for real-time encryption of bulk data.
D. Symmetric encryption uses asymmetric keys.
Incorrect Answer: B, D There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) in symmetric key As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Link:
Q106. Which functionality does ILS use to link all hub clusters in an ILS network?
C. ILS updates
Q107. Refer to the following exhibits.
Users in the U.S dial Germany by calling 9011 49 followed by the remaining digits. What would be the most suitable configuration for Connection X?
A. Configure a SIP trunk to 10.140.1.1 and a SIP route pattern +49T in Cisco Unified Communications Manager.
B. Configure a SIP trunk to the Cisco Unified Border Element and route pattern +49T in Cisco Unified Communications Manager.
C. configure a SIP trunk to the Cisco Unified Border Element. Configure a translation pattern for 9011.49T using DDI Predot prefix + and CSS to point to a route pattern partition \+! which uses the SIP trunk.
D. Configure a SIP trunk to the ITSP. Configure a translation pattern for 9011.49T using DDI predot prefix + and CSS to point to a route pattern partition \+! which uses the SIP trunk.
Incorrect Answer: A, B, D SIP trunks for public switched telephone network (PSTN) access are an important new access method for business collaboration. Service providers throughout the world offer SIP trunking as an alternative to traditional TDM (T1/E1) connections. A discard digits instruction (DDI) removes a portion of the dialed digit string before passing the number on to the adjacent system. A DDI must remove portions of the digit string, for example, when an external access code is needed to route the call to the PSTN, but the PSTN switch does not expect that access code.
Q108. Which three of the following are steps in configuring MGCP Fallback and Cisco Unified SRST? (Choose three)
A. Define the SRST reference for phones in the Device Pool configuration
B. Enable and configure the MGCP fallback and Cisco Unified SRST features on the IOS gateways.
C. Implement a simplified SRST dial plan on the remote-site-gateways to ensure connectivity for remote-site phones in SRST mode.
D. Enable SIP trunking between both remote and hub sites to provide mesh coverage.
E. Define the SRST reference in the configuration on the IP Phones.
F. Enable and configure the MGCP fallback on the IOS gateway but not Cisco Unified SRST since it is enabled automatically.
Q109. During device failover to the secondary Cisco Unified Communications Manager server, how does the phone recognize that the primary server is back?
A. The secondary server keeps sending keepalive message to the primary server and when it succeeds, it unregisters the phones to force them to register to the primary.
B. When the primary server goes online, it sends out an "ALIVE" message via broadcast so that the phones re-register.
C. The phones never re-register with the primary server until the active (secondary) one goes down.
D. The phone sends keepalive messages to the primary server frequently and when it succeeds, the phone re-registers with it.
Q110. Which two statements regarding you configuring a traversal server and traversal client relationship are true? (Choose two.)
A. VCS supports only the H.460.18/19 protocol for H.323 traversal calls.
B. VCS supports either the Assent or the H.460.18/19 protocol for H.323 traversal calls.
C. VCS supports either the Assent or the H.460.18/19 protocol for SIP traversal calls.
D. If the Assent protocol is configured, a TCP/TLS connection is established from the traversal client to the traversal server for SIP signaling.
E. A VCS Expressway located in the public network or DMZ acts as the firewall traversal client.