Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What happens to voice packets from a Cisco 8845 IP phone in the QoS trust boundary?

A.

The voice packets are not trusted, and the access layer switch reclassifies the packets.

B.

The voice packets are classified by the phone, and the classification is accepted

C.

The voice and access layer switch negotiate the classification of packets

D.

Cisco UCM determines how the voice packers are classified.

Refer to the exhibit. Cisco Unified element is attempting to establish a call with Subcribers1, but the call fails. Cisco Unified Border Element then retries the same call with Subcribers2, and the call proceeds normally.

Which action resolves the issue?

A.

Verify that the correct calling search space is selected for the inbound Calls section

B.

Verify that the run on all active United CM Nodes checkbox is enabled

C.

Verify that the Significant Digits field for inbound Calls is set to All.

D.

Verify that the PSTN Access checkbox is enabled.

Which mark is used when the Attendant Console Client application and the Cisco TSP send their traffic?

A.

Best Effort (DSCP=0)

B.

AF23(DSCP=22)

C.

Expedited ForwafOng (DSCP=U)

D.

AF11 (DSCP=10)

Refer to the exhibit. Users at a company located In New York cannot place calls. The New York gateway is configured with a T1 ISDN PRI card with 24 channels. The engineer runs the show isdn status command and receives output. Which action must the engineer take to resolve the issue?

A.

Change the switch type on the ISDN card to primary-5ess.

B.

Increase the number of timeslots in the controller t1 interface.

C.

Change the card type from T1 to E1.

D.

Issue the no shut command Into the controller t1 interface.

What are two access management mechanisms in Cisco Webex Control Hub? (Choose two.)

A.

multifactor authentication

B.

Active Directory synchronization

C.

attribute-based access control

D.

single sign-on with Google

E.

Client ID/Client Secret

To provide high-quality voice and take advantage of the full voice feature set, which two access layer switches provide support?

A.

Use multiple egress queues to provide priority queuing of RTP voice packet streams and the ability to classify or reclassify traffic and establish a network trust boundary.

B.

Use 802, 1Q trunking and 802.1p for proper treatment of Layer 2 CoS packet marking on ports with phones connected.

C.

Implement IP RTP header compression on the serial Interface to reduce the bandwidth required per voice call on point-to-point links.

D.

Deploy RSVP to improve VoIP QoS only where it can have a positive impact on quality and functionality where there is limited bandwidth and frequent network congestion.

E.

Map audio and video streams of video calls (AF41 and AF42) to a class-based queue with weighted random early detection.

Refer to the exhibit. An administrator must fix the SRV records to ensure that server1. sample.com is always contacted first from the three servers. Which solution should the engineer apply to resolve this issue?

A.

Priority = 100, Weight = 90

B.

Priority = 10, Weight = 5

C.

Priority = 10, Weight = 10

D.

Priority = 5, Weight = 70

Which endpoint feature is supported using Mobile and Remote Access through Cisco Expressway?

A.

SSO

B.

H.323 registration proxy to Cisco Unified Communications Manager

C.

MGCP gateway registration

D.

SRST

Which command in the MGCP gateway configuration defines the secondary Cisco UCM server?

A.

ccm-manager redundant-host

B.

ccm-manager fallback-mgcp

C.

mgcpapp

D.

mgcp call-agent

What are two features of Cisco Expressway that the customer gets if Expressway-C and Expressway-E are deployed?(Choose two.)

A.

highly secure real-traversal technology to extend organizational reach.

B.

additional visibility of the edge traffic in an organization.

C.

complete endpoint registration and monitoring capabilities for devices that are local and remote.

D.

session-based access to comprehensive collaboration for remote workers, without the need for a separate VPN client.

E.

utilization and adoption metrics of all remotely connected devices.