350-801 Practice Test Questions

275 Questions


A customer asked to integrate Unity Connection with Cisco UCM using SIP protocol Which
two features must be enabled on SIP security profiles? (Choose two)


A.

Accept presence subscription


B.

Enable application level authorization.


C.

Allow charging header


D.

Accept replaces header


E.

Accept unsolicited notification





D.
  

Accept replaces header



E.
  

Accept unsolicited notification



Refer to the exhibit.

Endpoint A calls endpoint B. What is the only audio codec that can be used for the call?


A.

G722/8000


B.

PCMA/8000


C.

Telephone-event/8000


D.

G7221/16000





D.
  

G7221/16000



An employee of company ABC just quit. The IT administrator deleted the employee’s userid
from the active directory at 10 a m. on March 4th The nightly sync occurs at 10 p.m daily.
The IT administrator wants to troubleshoot and find a way to delete the userid as soon as
possible How is this issue resolved?


A.

Wait until 10 pm on March 4th when the user is automatically removed from Cisco UCM


B.

Wait until 10 pm on March 5th when the user is automatically removed from Cisco UCM.


C.

Wait until 3:15 a.m. on March 6th for garbage collection to remove the user from Cisco
UCM.


D.

Wait until 3:15 a.m. on March 5th for garbage collection to remove the user from Cisco
UCM





C.
  

Wait until 3:15 a.m. on March 6th for garbage collection to remove the user from Cisco
UCM.



Which user group is targeted by MRA services?


A.

Call center agents who dial out to remote customers


B.

Mobile workers in a host desk environment at HQ who log in every morning at possibility
a different phone


C.

Production floor users who need wireless mobility in remote areas of the factory


D.

On-the-go mobile workforce who connect to corporate phone services using their own
mobile device





D.
  

On-the-go mobile workforce who connect to corporate phone services using their own
mobile device



Which action prevent toll fraud in Cisco Unified Communications Manager?


A.

Configure ad hoc conference restriction


B.

Implement toll fraud restriction in the Cisco IOS router


C.

Allow off-net to off-net transfers


D.

Implement route patterns in Cisco Unified CM.





A.
  

Configure ad hoc conference restriction



An engineer is designing a load balancing solution for two Cisco Unified Border routers.
The first router (cube1.abc.com) takes 60% of the calls and the second router
(cute2.abc.com) takes 40% of the calls, Assume all DNS A records have been created.
Which two SRV records are needed for a load balanced solution? (Choose two.)


A.

sip_udp.abc.com 60 IN SRV 1 40 5060 cube2.abc.com


B.

sip_udp.abc.com 60 IN SRV 3 60 5060 cube2.abc.com


C.

sip_udp.abc.com 60 IN SRV 60 1 5060 cube1.abc.com


D.

sip_udp.abc.com 60 IN SRV 2 60 5060 cube1.abc.com


E.

sip_udp.abc.com 60 IN SRV 1 60 5060 cube1.abc.com





A.
  

sip_udp.abc.com 60 IN SRV 1 40 5060 cube2.abc.com



E.
  

sip_udp.abc.com 60 IN SRV 1 60 5060 cube1.abc.com



Which description of the Mobile and Remote Access feature is true?


A.

Collaboration Edge feature that enables remote individuals to perform international calls
from Jabber with a VPN connection


B.

Collaboration Edge feature that enables remote individual to access enterprise
collaboration services via Jabber with the use of a VPN connection


C.

Collaboration Edge feature that enables remote individuals to access enterprise
collaboration services via Jabber without the use of a VPN connection


D.

Collaboration Edge feature that enables remote individuals to access all enterprise
collaboration services using a PC within the corporate environment





C.
  

Collaboration Edge feature that enables remote individuals to access enterprise
collaboration services via Jabber without the use of a VPN connection



Which DHCP option must be set up for new phones to obtain the TFTP server IP address?


A.

Option 66


B.

Option 15


C.

Option 120


D.

Option 6





A.
  

Option 66



Which configuration tells a switch port to send Cisco Discovery protocol packets that
configure an attached Cisco IP phone to trust tagged traffic that is received from a device that is connected to the access port on the Cisco IP phone?

 


A.

Option A


B.

Option B


C.

Option C


D.

Option D





B.
  

Option B



What is set when using CoS to mark an Ethernet frame?


A.

IPP bits


B.

802.1p User Priority bits


C.

IP ECN bits


D.

DCSP bits





B.
  

802.1p User Priority bits



Refer to the exhibit.

Which Codec is negotiated?


A.

G.729


B.

ILBC


C.

G.711ulaw


D.

G.728





C.
  

G.711ulaw



An engineer is notified that the Cisco TelePresence MX800 that is registered in Cisco
Unified communications Manager shows an empty panel, and the Touch 10 shows a
corresponding icon with no action when pressed. Where does the engineer go to remove the inactive custom panel?


A.

The phone configuration page in CUCM Administration


B.

The SIP Trunk security profile page in CUCM Administration


C.

The software Upgrades page in CUCM OS Administration


D.

The In-Room control Editor on the webpage of the MX800





D.
  

The In-Room control Editor on the webpage of the MX800




Page 4 out of 23 Pages
Previous