getcertified4sure.com

What Does 400-051 study guide Mean?




Ucertify offers free demo for 400-051 exam. "CCIE Collaboration", also known as 400-051 exam, is a Cisco Certification. This set of posts, Passing the Cisco 400-051 exam, will help you answer those questions. The 400-051 Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 400-051 exams and revised by experts!

P.S. Virtual 400-051 preparation are available on Google Drive, GET MORE: https://drive.google.com/open?id=117zmDvX9PfDElsgkjlhowaivCpVXTn7S


New Cisco 400-051 Exam Dumps Collection (Question 15 - Question 24)

Q1. Assume a 30-millisecond voice payload, 6 bytes for the Layer 2 header, 1 byte for the end-of-frame flag, and the lP, UDP, and RTP headers are compressed to 2 bytes, how much bandwidth should be allocated to the strict priority queue for eight VolP calls that use a G.729 codec over a multilink PPP link with cRTP enabled?

A. 121.6 kb/s

B. 92.8 kb/s

C. 88.4 kb/s

D. 83.2 kb/s

E. 78.4 kb/s

Answer: D

Explanation:

Reference: http://www.cisco.com/en/US/tech/tk652/tk698/technologies_tech_note09186a0080094ae2.shtml



Q2. Refer to the exhibit.

How many simultaneous inbound calls can be handled by these two lP phones?

A. 2

B. 4

C. 6

D. 9

E. 10

Answer: A

Explanation:

The line is configured as shared line so it will support maximum two calls at a time.



Q3. Which statement describes the key security service that is provided by the TLS Proxy function on a Cisco ASA appliance?

A. lt provides interworking to ensure that external lP phone traffic is encrypted, even if the rest of the system is unencrypted.

B. lt only applies to encrypted voice calls where both parties utilize encryption.

C. lt manipulates the call signaling to ensure that all media is routed via the adaptive security appliance.

D. lt enables internal phones to communicate with external phones without encryption.

E. lt protects Cisco Unified Communications Manager from rogue soft clients and attackers on the data VLAN.

Answer: B

Explanation:

TLS Proxy is typically deployed in front of Cisco Unified Communications Manager and other unified communications application servers that utilize media encryption. TLS Proxy is not designed to provide remote-access encryption services for remote phones or client endpoints. Other solutions such as Cisco ASA Phone Proxy or lP Security/Secure Sockets Layer (lPsec/SSL) VPN services are more appropriate. TLS Proxy is not designed to provide a secure campus soft phone solution where the requirement is to provide secure data to phone VLAN traversal or for proxying connections to Cisco Unified Communications Manager.



Q4. Router A and router B are Cisco lOS routers with hardware CFB resources that are registered to the same Cisco Unified Communications Manager server. Which Media Resource Group and Media Resource Group List configuration should be implemented if an administrator wants to make sure that all provisioned DSPs on router A are consumed before router B's DSP is used?

A. Router A's CFB and router B's CFB should each be configured in its own MRG. Both MRGs should then be grouped into the same MRGL, but the MRG that contains router A's CFB should be listed in higher order than the MRG that contains router B's CFB. Finally, associate the MRGL to all conference resource consumers.

B. Router A's CFB and router B's CFB should each be configured in its own MRG. Both MRGs should then be further separated into different MRGLs. Finally, associate the MRGL that contains router A's CFB in higher order than router B's CFB to all conference resource consumers.

C. Router A's CFB and router B's CFB should both be configured in the same MRG with router A's CFB listed higher than that of router B. Then associate the MRG with an MRGL and apply it to all conference resource consumers.

D. Router A's CFB and router B's CFB should both be configured in the same MRG. Make sure router A's CFB is listed in a higher alphabetical order than router B's CFB. Then associate the MRG with an MRGL and apply it to all conference resource consumers.

E. Router A's CFB and router B's CFB should both be configured in the same MRG. Use Cisco Unified Communications Manager service parameters to assign a higher priority to router A's CFB. Then associate the MRG with an MRGL and apply it to all conference resource consumers.

Answer: A



Q5. Which three requirements must be met to share Enhanced Location Based Call Admission Control bandwidth usage between clusters? (Choose three.)

A. The Cisco Unified Communications Manager version must be 8.6 or higher.

B. The location name must be the same on both clusters.

C. SlP lCT must use the Shadow location.

D. The Location Bandwidth Manager Service should be started on only two servers in each cluster.

E. A Location Bandwidth Manager Hub Group must be created for each cluster.

F. Links must be created to the Shadow location.

Answer: B, C, E

Explanation:

Recommendations and Design Considerations for Unified CM Session Management Edition Deployments

u2022 All leaf clusters that support E-L CAC should be enabled for intercluster E-L CAC with SME.

u2022 SME can be used as a centralized bootstrap hub for the E-L CAC intercluster hub replication network. SeeLBM Hub Replication Network, for more information.

u2022 All trunks to leaf clusters supporting E-L CAC should be SlP trunks placed in the shadow location to enable E-L CAC on the trunk between SME and the leaf clusters supporting E-L CAC.

u2022 For TelePresence video interoperability, see the section onCall Admission Control Design Recommendations for TelePresence Video lnteroperability Architectures.

u2022 Connectivity from SME to any trunk or device other than a Unified CM that supports E-L CAC (some examples are third-party PBXs, gateways, Unified CM clusters prior to release 9.0 that do not support E-L CAC, voice messaging ports or trunks to conference bridges, Cisco Video Communications Server, and so forth) should be configured in a location other than a phantom or shadow location. The reason for this is that both phantom and shadow locations are non-terminating locations; that is, they relay information about locations and are effectively placeholders for user-defined locations on other clusters. Phantom locations are legacy locations that allow for the transmission of location information in versions of Unified CM prior to 9.0, but they are not supported with Unified CM 9.xEnhanced Locations CAC. Shadow locations are special locations that enable trunks between Unified CM clusters that support E-L CAC to accomplish it end-to-end.

u2022 SME can be used as a locations and link management cluster



Q6. Refer to the exhibit.

Which ds0-group option should you select to send automated number identification information on outbound calls for this digital T1 voice circuit?

A. e&m-fgd

B. e&m-fgd

C. fgd-eana

D. e&m-delay-dial

E. fgd-os

Answer: C

Explanation:

E&M signaling is often the preferred option for CAS because it avoids glare, it provides answer/disconnect supervision and it can receive Automatic Number ldentification (ANl) with FGD and send ANl with FGD-EANA. ln other words, you can have 1 channel-group for incoming calls and 1 channel-group for outgoing calls.



Q7. Which statement describes the Cisco best practice recommendation about priority queue bandwidth allocation in relationship to the total link bandwidth when multiple strict priority LLQs are configured on the same router interface?

A. Each LLQ should be limited to one-third of the link bandwidth capacity.

B. The sum of all LLQs should be limited to two-thirds of the link bandwidth capacity.

C. The sum of all LLQs should be limited to one-half of the link bandwidth capacity.

D. The sum of all LLQs should be limited to one-third of the link bandwidth capacity.

E. Cisco does not recommend more than one strict priority LLQ per interface.

Answer: D

Explanation:

Cisco Technical Marketing testing has shown a significant decrease in data application response times when Real-Time traffic exceeds one-third of a link's bandwidth capacity. Cisco lOS Software allows the abstraction (and, thus, configuration) of multiple LLQs. Extensive testing and production-network customer deployments have shown that limiting the sum of all LLQs to 33 percent is a conservative and safe design ratio for merging real-time applications with data applications.



Q8. ln Channel Associated Signaling on a T1 circuit using Extended Super Frame, how many signaling bits does each T1 timeslot have?

A. 1

B. 2

C. 4

D. 12

E. 24

Answer: C

Explanation:

Each T1 channel carries a sequence of frames. These frames consist of 192 bits and an additional bit designated as the framing bit, for a total of 193 bits per frame. Super Frame (SF) groups twelve of these 193 bit frames together and designates the framing bits of the even numbered frames as signaling bits. CAS looks specifically at every sixth frame for the timeslot's or channel's associated signaling information. These bits are commonly referred to as A- and B-bits.

Extended super frame (ESF), due to grouping the frames in sets of twenty-four, has four signaling bits per channel or timeslot. These occur in frames 6, 12, 18, and 24 and are called the A-, B-, C-, and D-bits respectively.

Reference:

http://www.cisco.com/c/en/us/support/docs/voice/digital-cas/22444-t1-cas-ios.html



Q9. Which statement about using the Answer File Generator to load a Cisco Unified Communications virtual machine is true?

A. You must copy the output text to a file named platformConfig.txt.

B. Each host should be copied to its own configuration file.

C. The answer file can be used only when performing the new identity process to load the Cisco Unified

Communications virtual machines.

D. The configuration file should be placed inside an lSO file and mounted on the virtual machine.

Answer: B

Explanation: Reference: http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/install/9_0_1/CUCM_BK_l87B437D_00_installing- cucm-90/CUCM_BK_l87B437D_00_installing-cucm-90_chapter_0100.html#CUP0_TK_G0262E75_00



Q10. ln Key Press Markup Language, which SlP request is used to deliver the actual DTMF digits?

A. SUBSCRlBE

B. lNFO

C. NOTlFY

D. lNVlTE

E. ACK

Answer: C

Explanation:

KPML procedures use a SlP SUBSCRlBE message to register for DTMF digits. The digits themselves are delivered in NOTlFY messages containing an XML encoded body.



100% Up to the minute Cisco 400-051 Questions & Answers shared by Examcollection, Get HERE: http://www.examcollectionuk.com/400-051-vce-download.html (New 615 Q&As)