Which two statements about endpoint registration authentication are true? (Choose two.)
A.
When a subzone is set for "Treat as Authenticated", the endpoint must have the correct authentications configured
B.
Authentication credentials can be stored in the local database of the Expressway
C.
Expressways and endpoints do not need to be synchronized with identical NTP timestamps
D.
The endpoint and Expressway must be configured and synchronized with an NTP server delivering an identical time stamp
E.
SIP endpoints always need authentication credentials
Answer:
ae
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 2
Which Cisco Spark hybrid call service integrates Cisco Spark with an existing Cisco call-control platform, which makes it possible for users to make and receive calls on their Cisco device or Spark application using the same dialing procedure as with on-premises registered endpoints?
A.
Call Service Connect
B.
Hybrid Call Connect
C.
Hybrid Call Service
D.
Call Service Aware
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
as the domain. Which option accomplishes this task?
A.
Set the restriction policy to "None" and include the expression \[emailprotected] in the allow list
B.
Set the restriction policy to "Allow" and include the expression *@cisco.com in the allow list
C.
Set the restriction policy to "Allow" and include the expression \[emailprotected] in the allow list
D.
Set the restriction policy to "Deny" and include the expression .*@.* in the allow list
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Which statement about setting up a call bridge cluster for a resilient and scalable Cisco Meeting Server deployment is true?
A.
Call bridges only connect to the master database
B.
Only one call bridge should be configured per domain in a database cluster
C.
Call bridges can read/write to any database in a cluster at any time
D.
Call bridges can connect to databases in full mesh
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
An engineer must match any incoming call to the Expressway that is searching for an E.164 address of only 6 digits and append the domain cisco.com to the end. Which pattern match and replace string using regular expressions accomplish this task? (Choose two.)
A.
pattern match: ({6}\d)
B.
pattern match: ({6}*)
C.
replace string: \[emailprotected]
D.
pattern match: ({5}\d)
E.
replace string: \[emailprotected]
F.
replace string: \[emailprotected]
Answer:
ae
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 6
In an H.323 call that is not interworked, which three signaling protocols are routed through the Expressway? (Choose three.)
A.
RTP
B.
H.245
C.
RAS
D.
RTCP
E.
Q.931
F.
H.254
Answer:
cef
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 7
Cisco Meeting Server uses four API commands to interact with the server. Which API command is used to modify a configuration setting on the Cisco Meeting Server?
A.
PUT
B.
POST
C.
GET
D.
DELETE
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What is the minimum number of databases that can exist within a cluster when deploying a resilient and scalable Cisco Meeting Server deployment?
A.
5
B.
3
C.
2
D.
4
Answer:
c
Minimum is 2 however it is recommended to have 3 databases when using database clustering.
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Which description of the steps one must take to build a TMS phone book is true?
A.
Create a source, create a phone book, connect the source to the phone book, and set on systems.
B.
Export a .csv file to the TMS database from AD or Outlook, create a phone book, connect the file to a phone book, and set on systems.
C.
Connect TMS to the Cisco Unified Communications Manager contact list files, create a phone book, connect the files to a phone book, and set on systems.
D.
Create a contact list, create a phone book, connect the contact list to the phone book, and set on systems.
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Which two protocols are used in the traversing of media across a firewall through the Expressway? (Choose two.)