Download of 300 075 pdf exam cram materials and Q&A for Cisco certification for customers, Real Success Guaranteed with Updated 300 075 ciptv2 pdf dumps vce Materials. 100% PASS Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) exam Today!
Q81. Refer to the exhibit.
The HQ site uses area code 650. The BR1 site uses area code 408. The long distance national code for PSTN dialing is 1. To make a long distance national call, an HQ or BR1 user dials access code 9, followed by 1, and then the 10-digit number.
Both sites use MGCP gateways. AAR must use globalized call routing using a single route pattern. Assume that all outgoing PSTN numbers are localized at the egress gateway as shown in the exhibit.
Which partition should be configured in the AAR CSS applied at the phones?
A. PSTN partition
B. LD partition
C. The HQ AAR CSS must include a partition assigned to route pattern 91408XXXXXXX. The BR1 AAR CSS must include a partition assigned to route pattern 91650XXXXXXX.
D. AAR CSS must contain translation pattern 9.1[2-9]XX[2-9]XXXXXX for each site that must be globalized. Otherwise the called numbers will not be localized at the egress gateway.
Answer: A
Q82. Refer to the exhibit.
All HQ phones are configured to use HQ_MRGL and all BR phones are configured to use BR_MRGL. For the HQ phones always to use the hardware conference bridge as a first choice, which configuration should be implemented?
A. Ensure that both the hardware and software conference bridges are listed in the HQ_MRG. Ensure that the instance ID for the hardware conference bridge is 0.
B. Ensure that both the hardware and software conference bridges are listed in the HQ_MRG. The hardware conference bridge must be configured first.
C. Assign the hardware conference bridge to HQ_MRG. Configure a second HQ_MRG_2 and assign the software conference bridge to it. Add both the HQ_MRG and HQ_MRG_2 to the HQ_MRGL and list the HQ_MRG first.
D. Assign the hardware conference bridge to HQ_MRG. Configure a second HQ_MRG_2 and assign the software conference bridge to it. Configure an additional HQ_MRGL_2. Add the HQ_MRG to HQ_MRGL. Add HQ_MRG_2 to HQ_MRGL_2. The HQ_MRGL should be assigned to the HQ phones. The HQ_MRGL_2 should be assigned to the HQ device pool.
Answer: C
Q83. In a distributed call processing network with locations-based CAC, calls are routed to and from intercluster trunks. Which trunk type is implemented in this network?
A. intercluster trunk with gatekeeper control
B. intercluster trunk without gatekeeper control
C. SIP trunk
D. h225 trunk
Answer: B
Q84. Video calls using 384 kbps need to be supported across a gatekeeper-controlled trunk. What value should be entered into the gatekeeper to support this bandwidth?
A. 768 kbps
B. 384 kbps
C. 512 kbps
D. 192 kbps
Answer: B
Explanation:
Incorrect Answer: A, C, D A 384-kb/s video call may comprise G.711 at 64 kb/s (for audio) plus 320 kb/s (for video). This sum does not include overhead. If the audio codec for a video call is G.729 (at 24 kb/s), the video rate increases to maintain a total bandwidth of 384 kb/s. Link:
http://www.ciscosystems.com/en/US/docs/voice_ip_comm/cucm/admin/8_6_1/ccmsys/a08video.html#wp1059726
Q85. Refer to the exhibit.
To permit three G.729 calls, what should the bandwidth value be for the ip rsvp bandwidth command?
A. 32
B. 48
C. 64
D. 88
E. 128
Answer: D
Q86. Which bandwidth amounts are correct for configuring locations?
A. 8 kb/s for G.729, 64 kb/s for G.711, and 64 kb/s for G.722
B. 8 kb/s for G.729, 64 kb/s for G.711, and 16 kb/s for G.722
C. 64 kb/s for G.729, 64 kb/s for G.711, and 64 kb/s for G.722
D. 8 kb/s for G.729, 8 kb/s for G.711, and 8 kb/s for G.722
Answer: A
Q87. Which two statements about symmetric encryption are true? (Choose two.)
A. With symmetric encryption, the encryption key equals the decryption key.
B. Symmetric encryption is commonly used to sign asymmetric keys.
C. Symmetric encryption is a good choice for real-time encryption of bulk data.
D. Symmetric encryption uses asymmetric keys.
Answer: A,C
Explanation:
Incorrect Answer: B, D There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) in symmetric key As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Link:
http://support.microsoft.com/kb/246071
Q88. Which Cisco IOS command is used to verify that the Cisco Unified Communications Manager Express has registered with the SAF Forwarder?
A. show eigrp service-family ipv4 clients
B. show eigrp address-family ipv4 clients
C. show voice saf dndb all
D. show saf registration
E. show ip saf registration
Answer: A
Explanation:
Incorrect Answer: B, C, D, E show eigrp service-family ipv4 clients Displays information from the EIGRP IPv4 service-family results.
Q89. The following exhibit shows configs for H.323 gateway. You have been asked to implement TEHO from a remote branch office with area code 301 to the HQ office with area code 201 using Cisco Unified Communications Manager. The remote office has an MGCP gateway and the HQ office has an H.323 gateway. Once the call arrives at the HQ, it should break out to the PSTN as a seven-digit local call. Which statement about the route pattern is true?
A. route pattern should be 91201.[2-9]XXXXXX with Discard Digit as Predot and Prefix 9
B. route pattern should be 91201.[2-9]XXXXXX with Discard Digit as Predot
C. route pattern should be 91201.[2-9]XXXXXX
D. route pattern should be 9.1201[2-9]XXXXXX with Discard Digit as Predot
E. route pattern should be 9.1201[2-9]XXXXXX with Discard Digit as Predot and Prefix 9
Answer: A
Explanation:
Incorrect Answer: B, C, D, E
Destination pattern is 91, HQ office area code is 201 .
Q90. Which process can localize a global E.164 with + prefix calling numbers for inbound calls to an IP phone so that users see the calling number in a local format?
A. Calling number localization is done using translation patterns.
B. Calling number localization is done using route patterns.
C. Calling number localization is done by configuring a calling party transformation CSS at the phone.
D. Calling number localization is done by configuring a calling party transformation CSS at the gateway.
E. Calling number localization is done by configuring the phone directory number in a localized format.
Answer: C