Question: 18
While operating in SRST, what is needed to route calls outside of the remote site location to the PSTN?
A. SIP trunk
B. CallManager route patterns
C. translation patterns
D. POTS dial peers
E. VOIP dial peers
Answer: D
Explanation:
Incorrect answer: A,B,C,E in time of srst configuration on router, please configure a dial-peer so that call flow in SRST mode.
Thursday, 15 December 2016
Wednesday, 10 August 2016
642-457 Sample Question: 17
Question: 17
In a node-specific Service Advertisement Framework forwarder deployment model, what is the maximum number of Service Advertisement Framework forwarders that you can assign to a specific node?
A. 1
B. 2
C. 3
D. 4
E. 5
F. 6
Answer: B
In a node-specific Service Advertisement Framework forwarder deployment model, what is the maximum number of Service Advertisement Framework forwarders that you can assign to a specific node?
A. 1
B. 2
C. 3
D. 4
E. 5
F. 6
Answer: B
Tuesday, 26 July 2016
642-457 Sample Question: 16
Question: 16
Which sign is prefixed to the number in global call routing?
A. –
B. +
C. #
D. @
E. &
F. *
Answer: B
Which sign is prefixed to the number in global call routing?
A. –
B. +
C. #
D. @
E. &
F. *
Answer: B
Friday, 1 July 2016
642-457 Sample Question: 15
Question: 15
Which statement best describes globalized call routing in Cisco Unified Communications Manager?
A. All incoming calling numbers on the phones are displayed as an E.164 with the + prefix.
B. Call routing is based on numbers represented as an E.164 with the + prefix format.
C. All called numbers sent out to the PSTN are in E.164 with the + prefix format.
D. The CSS of all phones contain partitions assigned to route patterns that are in global format.
E. All phone directory numbers are configured as an E.164 with the + prefix.
Answer : B
Which statement best describes globalized call routing in Cisco Unified Communications Manager?
A. All incoming calling numbers on the phones are displayed as an E.164 with the + prefix.
B. Call routing is based on numbers represented as an E.164 with the + prefix format.
C. All called numbers sent out to the PSTN are in E.164 with the + prefix format.
D. The CSS of all phones contain partitions assigned to route patterns that are in global format.
E. All phone directory numbers are configured as an E.164 with the + prefix.
Answer : B
Thursday, 16 June 2016
642-457 Sample Question: 14
Question: 14
How is a SIP trunk in Cisco Unified Communications Manager for SIP precondition?
A. The configuration is done by selecting a SIP precondition trunk type.
B. The configuration is automatically selected when RSVP is enabled for the location assigned to the trunk.
C. SIP precondition is configured by selecting E2E for RSVP over SIP on the default SIP profile assigned to the SIP trunk.
D. SIP precondition is configured by configuring a new SIP profile and selecting E2E for RSVP over SIP. The new SIP must then be assigned to the SIP trunk.
Answer: D
How is a SIP trunk in Cisco Unified Communications Manager for SIP precondition?
A. The configuration is done by selecting a SIP precondition trunk type.
B. The configuration is automatically selected when RSVP is enabled for the location assigned to the trunk.
C. SIP precondition is configured by selecting E2E for RSVP over SIP on the default SIP profile assigned to the SIP trunk.
D. SIP precondition is configured by configuring a new SIP profile and selecting E2E for RSVP over SIP. The new SIP must then be assigned to the SIP trunk.
Answer: D
Wednesday, 4 May 2016
642-457 Sample Question: 13
Question: 13
Refer to the exhibit.
A. three G.729 calls
B. one G.711 call
C. one G.711 and three G.729 calls
D. There is no limit for incoming calls to Cluster B. Outgoing calls are limited to one G.711 and three G.729 calls.
Answer: A
Refer to the exhibit.
How many calls can be placed to Cluster B?
A. three G.729 calls
B. one G.711 call
C. one G.711 and three G.729 calls
D. There is no limit for incoming calls to Cluster B. Outgoing calls are limited to one G.711 and three G.729 calls.
Answer: A
Thursday, 7 April 2016
642-457 Sample Question: 12
Question: 12
Which statement about Service Advertisement Framework is true?
A. SAF requires that the EIGRP be configured on all routers, including non-SAF routers.
B. SAF requires that the EIGRP be configured only on SAF routers. Non-SAF routers act as an IP cloud.
C. SAF has no dependency on the underlying routing protocol, as long as it is a dynamic routing protocol. Static routes are not supported.
D. SAF operates on any dynamic or static IP routing configuration. SAF is totally independent of the underlying routing protocol.
Answer: D
Don't Miss: 642-457 Braindumps
Which statement about Service Advertisement Framework is true?
A. SAF requires that the EIGRP be configured on all routers, including non-SAF routers.
B. SAF requires that the EIGRP be configured only on SAF routers. Non-SAF routers act as an IP cloud.
C. SAF has no dependency on the underlying routing protocol, as long as it is a dynamic routing protocol. Static routes are not supported.
D. SAF operates on any dynamic or static IP routing configuration. SAF is totally independent of the underlying routing protocol.
Answer: D
Don't Miss: 642-457 Braindumps
Friday, 1 April 2016
642-457 Sample Question: 11
Question: 11
Assume that the Cisco IOS SAF Forwarder is configured correctly. Which minimum configurations on Cisco Unified Communications Manager are needed for the SAF registration to take place?
A. SAF Trunk, SAF Security Profile, SAF Forwarder, and CCD Advertising Service
B. SAF Trunk, SAF Security Profile, SAF Forwarder, and CCD Requesting Service
C. SAF Trunk, SAF Security Profile, SAF Forwarder, CCD Requesting Service, and CCD Advertising Service
D. SAF Trunk, SAF Security Profile, and SAF Forwarder
E. SAF Trunk, CCD Requesting Service, and CCD Advertising Service
Answer: B
Assume that the Cisco IOS SAF Forwarder is configured correctly. Which minimum configurations on Cisco Unified Communications Manager are needed for the SAF registration to take place?
A. SAF Trunk, SAF Security Profile, SAF Forwarder, and CCD Advertising Service
B. SAF Trunk, SAF Security Profile, SAF Forwarder, and CCD Requesting Service
C. SAF Trunk, SAF Security Profile, SAF Forwarder, CCD Requesting Service, and CCD Advertising Service
D. SAF Trunk, SAF Security Profile, and SAF Forwarder
E. SAF Trunk, CCD Requesting Service, and CCD Advertising Service
Answer: B
Wednesday, 10 February 2016
Pes 2016 And A Font File Can Have Your Computer
Graphic library lib and vulnerable Police car in Firefox, Thunderbird, and Talos said WordPad
Cisco updated belonging Talos announced a bunch of error present library source applications that run on Windows and Linux that affect client and server computers.
The problem is in the Libgraphite library, and means that applications that use the library to load the TTF font file can inherit their vulnerabilities. Everything needed for a successful operation, Talos writes, is that the user will need to run an application allowed graphite to a page with a maliciously crafted font.
Since Libgraphite is a font library, vulnerable environments are not limited to a particular operating system. Microsoft WordPad uses, but Thunderbird, Firefox and OpenOffice (to name a few).
The office believes that "Linux" is vulnerable, but El Reg suspicion is a misunderstanding, since it is clear that the VULN is triggered by application of activated graphite.
And since Libgraphite supports server-side policies ", the attacker could easily compromise a server and then serve the police specifically designed when the user takes a page from the server."
Talos four vulnerabilities CVE (Common Vulnerabilities and Exposures) CVE-2016-1521 / 2/3/6 are described.
Topping the list is the severity of off-limits read. The authors of the police lost value Goto check packages ensure that the variable program remains in memory limits.
TTF and VM exploits have been demonstrated by Joshua Drake in Pwn2Own last year - "Reading out of bounds, the TTF virtual machine to run code under the attacker's control," Talos said.
Cisco updated belonging Talos announced a bunch of error present library source applications that run on Windows and Linux that affect client and server computers.
The problem is in the Libgraphite library, and means that applications that use the library to load the TTF font file can inherit their vulnerabilities. Everything needed for a successful operation, Talos writes, is that the user will need to run an application allowed graphite to a page with a maliciously crafted font.
Since Libgraphite is a font library, vulnerable environments are not limited to a particular operating system. Microsoft WordPad uses, but Thunderbird, Firefox and OpenOffice (to name a few).
The office believes that "Linux" is vulnerable, but El Reg suspicion is a misunderstanding, since it is clear that the VULN is triggered by application of activated graphite.
And since Libgraphite supports server-side policies ", the attacker could easily compromise a server and then serve the police specifically designed when the user takes a page from the server."
Talos four vulnerabilities CVE (Common Vulnerabilities and Exposures) CVE-2016-1521 / 2/3/6 are described.
Topping the list is the severity of off-limits read. The authors of the police lost value Goto check packages ensure that the variable program remains in memory limits.
TTF and VM exploits have been demonstrated by Joshua Drake in Pwn2Own last year - "Reading out of bounds, the TTF virtual machine to run code under the attacker's control," Talos said.
Tuesday, 19 January 2016
642-457 Sample Question: 10
Question: 10
When an incoming PSTN call arrives at an MGCP gateway, how does the calling number get normalized to a global E.164 number with the + prefix in Cisco Unified Communications Manager?
A. Normalization is done using translation patterns.
B. Normalization is done using route patterns.
C. Normalization is done using the gateway incoming called party prefixes based on number type.
D. Normalization is done using the gateway incoming calling party prefixes based on number type.
E. Normalization is achieved by local route group that is assigned to the MGCP gateway.
Answer: D
Wednesday, 13 January 2016
642-457 Sample Question: 9
QUESTION 9
Which method can be used to address variable-length dial plans?
A. Overlap sending and receiving.
B. Add a prefix for all calls that are longer than 10-digits long
C. Use nested translation patterns to eliminate inter-digit timeout
D. Use the @macro on the route pattern
E. Use MGCP gateways, which support variable-length dial plans
Correct Answer: A
Which method can be used to address variable-length dial plans?
A. Overlap sending and receiving.
B. Add a prefix for all calls that are longer than 10-digits long
C. Use nested translation patterns to eliminate inter-digit timeout
D. Use the @macro on the route pattern
E. Use MGCP gateways, which support variable-length dial plans
Correct Answer: A
Subscribe to:
Posts (Atom)