Sunteți pe pagina 1din 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 1 Which three statements are true in order for inbound PSTN calls to work in an H.323 gateway configured with Cisco Unified Communications Manager? (Choose three.) A. The H.323 gateway should be registered with Cisco Unified Communications Manager. B. The command h323-gateway voip tech-prefix should be configured on the H.323 interface. C. The command h323-gateway voip bind srcaddr should be configured on the H.323 interface. D. A VoIP dial peer pointing to Cisco Unified Communications Manager should be configured. E. The command h323-gateway voip id should be configured under the H.323 interface. F. A pots dial peer with direct-inward-dial and incoming-called number should be configured. Answer: C, D, F Question: 2 Which two statements describe RSVP-enabled locations-based CAC? (Choose two.) A. RSVP can be enabled selectively between pairs of locations. B. Using RSVP for CAC simply allows admitting or denying calls based on a logical configuration that is ignoring the physical topology. C. RSVP is topology aware, but only works with full mesh networks. D. An RSVP agent is a Media Termination Point that the call has to flow through. E. RSVP and RTP are used between the two endpoints. Answer: A, D Question: 3 An administrator was testing a new implementation of Cisco Unified Communications Manager Extension Mobility. When the administrator tried to log out of Cisco Unified Communications Manager Extension Mobility, the following message appeared on the user's IP phone: "To set up speed dials and other services for your phone, please go to https://ccm_ip@/ccmuser/showHome.do" What is the most likely cause for this message? A. The administrator forgot to subscribe the IP phone to Cisco Unified Communications Manager Extension Mobility Service. B. The administrator did not associate the User Device Profile with Cisco Unified Communications Manager Extension Mobility Service. C. The Cisco Unified Communications Manager Extension Mobility checkbox was not selected for that particular phone. D. The IP phone user needs to go into ccmuser and set up speed dials in order for Cisco Unified Communications Manager Extension Mobility to work. Answer: B Question: 4 A branch site has a group of salespeople that take orders from customers. The site needs to be able to distribute calls evenly to the salespeople when connectivity to the main site is lost. Which two configurations are correct? (Choose two.) A. Configure hunt groups on the Cisco Unified CME, which is operating in SRST mode.

Page 1 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. All branch site IP phones will need to be preconfigured in the gateway. C. Only the salespeople's phones will need to be preconfigured in the gateway. D. The branch site will need a dedicated UCCX server to queue the customer calls. E. The gateway must be configured to use H.323 to communicate with the Cisco Unified Communications Manager cluster. F. A digital circuit will be required so that DNIS can be used to route the customer calls to the salespeople's queue. Answer: A, C Question: 5 You have configured SRST at a remote site on an MGCP gateway. During testing, you find that IP phones are not registering with the SRST router when the IP WAN fails. Which three potential problems need to be investigated? (Choose three.) A. No dial peers have been added to the SRST router. B. No SRST reference address is included in the device pool. C. The proper service command has not been added to the SRST router. D. The max-ephones command is missing in the SRST router. E. The max-dn command is missing in the SRST router. F. The ccm-manager fallback-mgcp command is missing in the SRST router. Answer: B, D, E Question: 6 Which feature addresses the issues with AAR for mobile users in Cisco Unified Communications Manager? A. Extension Mobility B. Device Mobility C. Mobile Connect D. Mobile Voice for Access Answer: B Question: 7 Drop

Page 2 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 8 What does the addition of the Tcl paramspace command allow the application to do? A. Access the data on an external server B. Specify parameters for a single application C. Set aside memory for application variables D. Share parameters between different call applications E. Consolidate all application parameters on a single call application list Answer: D Question: 9 Refer to the exhibit. When a Cisco IP Communicator Phone roams from SJ to RTP, the physical location for the Cisco IP Communicator Phone changes and the Device Mobility Group changes from SJ to RTP. All route patterns are assigned to partitions and configured to utilize the local gateway. After roaming to RTP, if the user dials 911, which statement about the call routing is true?

A. The call will use the RTP gateway.


Page 3 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. The call will use the SJ gateway because the device's origin is SJ. C. Emergency calls will go through the RTP gateway as first priority. The SJ gateway will be used as backup. D. Emergency calls will always use the local gateway regardless of Device Mobility configurations. E. The call will use the SJ gateway because we keep the Device/Line CSS after roaming. Answer: E Question: 10 You have deployed a centralized call processing solution with a multicast MOH server at your central site on a different VLAN from your Cisco Unified Communications Manager servers and IP phones. When central site users place calls on hold, dead air or silence is heard. Which two actions will resolve this issue? (Choose two.) A. Enable multicast routing on all the routers at the central site. B. Increase the TTL in the configuration of the MOH server to 2 so that packets can cross the VLAN boundary. C. Decrease the TTL configuration in the Cisco Unified Communications Manager server to 0 so that the multicast packets only go to the VLAN that contains the Cisco Unified Communications D. Manager server and IP phones. E. Enable multicast routing on only those router interfaces that connect the voice and MOH VLANs. F. Keep the TTL at 1 for the MOH server and increase the TTL for IP multicast routing to 2 on router interfaces. G. Configure ip-sparse mode on the router interfaces and increase the TTL on the routers to 2. Answer: A, B Question: 11 Drop

Page 4 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 12 Drop

Page 5 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 13 When you configure a region to use the G.729 codec, which other codecs can be utilized in the region? A. The region can use all the codecs supported by Cisco Unified Communications Manager. B. The region will use all of the codecs supported by Cisco Unified Communications Manager as long as a software Media Termination Point is available. C. The region will only use the codec configured in the region configuration field and any other codecs of equal or lower bandwidth. D. The region will use the configured codec and the default codec as long as it does not exceed the configured bandwidth for the region. Answer: C Question: 14 Refer to the exhibit. A manager at HQ holds a weekly meeting with three members of his staff that are located at BR. If the manager hosts the conference using conferencing resources at HQ, how many audio streams will cross the IP WAN?

Page 6 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. 1 B. 2 C. 3 D. 4 Answer: C Question: 15 Drop

Page 7 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 16 Refer to the exhibit. With the Mobile Connect feature configured, when the mobile phone calls IP Phone 3002, which Caller ID will be displayed on phone 3002?

A. Caller ID of 4085551234 B. Caller ID of 1234 C. Caller ID of 5678 D. Caller ID of 3001 E. Caller ID of 4085553001

Page 8 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: D Question: 17 How does the Cisco Unified CallManager use RSVP? A. It uses RSVP bandwidth and zones to determine how and if calls can be placed B. It uses the RSVP-configured bandwidth between sites as a method of determining if there is sufficient bandwidth for a call C. It initiates RSVP reservations from the Cisco Unified CallManager server, which is an active participant in the reservation process D. It uses an RSVP-enabled infrastructure and an RSVP agent controlled by Cisco Unified CallManager to request a bandwidth reservation from the network in order to place a call E. It uses RSVP reservations to request double the bandwidth so calls can flow in both directions Answer: D Question: 18 Which two statements about voice applications are true? (Choose two.) A. A gateway cannot support both Tcl and VXML applications. B. A Tcl license must be purchased in order to run custom applications. C. VXML applications can utilize existing web server and application logic. D. Customers can purchase a Cisco support contract for application development. E. Customer developed Tcl scripts must be compiled in order to use the Cisco proprietary Tcl IVR 2.0 extensions. Answer: C, D Question: 19 A call is placed from encrypted IP phone A, to authenticated IP phone B. Which security mode will be used for this call? A. Encrypted B. Authenticated C. 3DES encrypted D. Nonsecure Answer: B Question: 20 Refer to the exhibit. ABC Company needs to have the receptionist at extension 5000 handle all callers who exit their auto attendant by pressing "0". After changing the Operator parameter from 5500 to 5000, callers are still sent to extension 5500 when they press "0" in the auto attendant. What needs to be done to correct this issue?

Page 9 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The gateway needs to be reloaded for application changes to take effect. B. The application needs to be edited to point to the correct operator. C. Dial peer 1 needs to be restarted using the shutdown and no shutdown commands. D. The aa application needs to be reloaded in order to recognize the parameter changes. E. The Operator parameter should be configured under dial peer 1 using the param command. Answer: D Question: 21 What is considered to be a "Trusted Introducer" in a Cisco IP telephony environment? A. CAPF B. SIP Digest C. SRTP D. TLS Answer: A Question: 22 When a WAN link problem occurs, it takes over three minutes for IP phones to become registered with the SRST gateway. What is the most likely cause of this? A. The WAN link is bouncing.
Page 10 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. The Keepalive timer in the SRST gateway is set too long. C. Each phone has a list of two alternate Cisco Unified Communications Manager systems, and it tries to register with each before registering with the SRST gateway. D. The SRST gateway is an MGCP gateway, and it must stop the MGCP process and switch over to the default H.323 process before the SRST process can be initiated. Answer: C Question: 23 Refer to the exhibit. With Mobile Voice Access configured, if the PSTN user dials 4085556789 what should the Mobile Voice Access Directory Number be under Media Resources?

A. 4085556789 B. 4085551234 C. 6789 D. 1234 Answer: B Question: 24 A remote site MGCP gateway will be used to provide redundancy when connectivity to the central Cisco Unified Communications Manager cluster is lost. Which three steps are required to enable IP phones to establish calls to the PSTN when they have registered with the gateway? (Choose three.) A. The default service must be enabled globally. B. COR needs to be configured to allow outbound calls. C. The command ccm-manager mgcp-fallback must be configured. D. The default service must be configured on an inbound POTS dial peer. E. VoIP dial peers must be added to the gateway to route calls from the PSTN to the IP phones. F. POTS dial peers must be added to the gateway to route calls from the IP phones to the PSTN. Answer: A, C, F
Page 11 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 25 You've been asked to make Cisco Unified Communications Manager Extension Mobility more secure for a customer whose employees are all required to log in to the IP phone before they can make external calls. Which two parameters will make Cisco Unified Communications Manager Extension Mobility more secure? (Choose two.) A. Disable the Settings button on all phones from the Phone Configuration page. B. Enforce maximum login time under Cisco Unified Communications Manager Extension Mobility Service Parameters. C. Limit maximum failed login attempts under Cisco Unified Communications Manager Extension Mobility Service Parameters. D. Enable administrator notification for Multiple Login Behavior under Cisco Unified Communications Manager Extension Mobility Service Parameters. E. Disable Remember the Last User Logged In under Cisco Unified Communications Manager Extension Mobility Service Parameters. Answer: B, E Question: 26 Refer to the exhibit. Based on just the information in this configuration, what can be determined from the dial plan?

Page 12 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The Boston office uses 10-digit local dialing. B. The Carmichael office uses 6-digit extensions. C. The Boston office uses a 10-digit route pattern. D. The Carmichael office uses 10-digit local dialing. E. The Carmichael office can make local calls in Boston. Answer: D Question: 27 Refer to the exhibit. The mobile phone is unable to call the PSTN phone using the Mobile Voice Access feature. The mobile phone user hears "Your call cannot be completed as dialed ...." Which two CSSs combine to determine whether access to the partition that is assigned to the PSTN route pattern is allowed? (Choose two.)

Page 13 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The Gateway CSS B. The Phone Device CSS C. The Remote Destination Profile CSS D. The Remote Destination Profile Rerouting CSS E. The Phone Line (DN CSS) Answer: C, E Question: 28 What is one function of AAR? Which type of call processing can AAR be applied to? (Choose one function and one call processing type.) A. Distributed call processing B. Allows calls to be rerouted through the PSTN by using an alternate number when Cisco Unified Communications Manager blocks a call due to insufficient location bandwidth C. Allows calls to be rerouted through the PSTN when the IP WAN fails or the Cisco Unified Communications Manager becomes unavailable D. Centralized call processing E. Allows calls to be rerouted through the PSTN for CTI route points, and hunt pilots to an alternate number when Cisco Unified Communications Manager blocks a call due to insufficient location bandwidth F. Single site call processing Answer: A Question: 29 Refer to the exhibit. When a Cisco IP Communicator Phone roams from the San Jose site to the RTP site, the Physical Location for the Cisco IP Communicator Phone changes and the Device Mobility Group remains the same. After roaming to RTP, the user called a colleague in RTP and conferenced in a phone in his home location (San Jose). Which statement about the MRGL for the Cisco IP Communicator Phone is true?

Page 14 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The Cisco IP Communicator Phone will use the RTP_ MRGL regardless of Device Mobility Group. B. The Cisco IP Communicator Phone will use the Home MRGL (SJ_MRGL) since he is conferencing a user at his home location. C. The Cisco IP Communicator Phone will use the Home MRGL (SJ_MRGL) since his Device Mobility Group (DMG) remained the same. D. The Cisco IP Communicator Phone will use the RTP_MRGL since his Device Mobility Group remained the same. Answer: A Question: 30 As the Administrator for an IT company that's using a Centralized Cisco Unified Communications Manager topology, you've been tasked to implement Device Mobility feature for users that roam between their home country (US) and Europe. Due to frequent travels to different countries, your goal is to implement Device Mobility without requiring users to learn each country's numbering plan. Which scenario will accomplish your goal? A. Place each roaming user in a country specific User Device Profile. B. Place each site in a different Device Mobility Group. C. Place each site and user in the appropriate Device Calling Search Space so they always use the local PSTN gateway for each country. D. Place each site in a different device pool but use the same Device Mobility Group. E. Implement Mobile Connect. Answer: B

Page 15 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 31 Refer to the exhibit. With the Mobile Connect feature configured, when the PSTN phone calls the Enterprise user at extension 3001, the Enterprise user's mobile phone does not ring. Which CSS is responsible for ensuring that the correct partitions are accessed when calls are sent to the Enterprise user's mobile phone?

A. The gateway CSS B. The Phone Device CSS C. The Remote Destination Profile CSS D. The Remote Destination Profile Rerouting CSS E. The Phone Line(DN)CSS Answer: D Question: 32 In order to have Secure Conferencing resources, what is required? A. Media Termination Point B. IOS DSP farm C. Software conference bridge D. Hardware transcoder Answer: B Question: 33 The following exhibit shows configs for H.323 gateway. You have been asked to implement TEHO from a remote branch office with area code 301 to the HQ office with area code 201 using Cisco Unified Communications Manager. The remote office has an MGCP gateway and the HQ office has an H.323 gateway. Once the call arrives at the HQ, it should break out to the PSTN as a seven-digit local call. Which statement about the route pattern is true?

Page 16 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. Route pattern should be 91201.[2-9]XXXXXX with Discard Digit as Predot and Prefix 9 B. Route pattern should be 91201.[2-9]XXXXXX with Discard Digit as Predot C. Route pattern should be 91201.[2-9]XXXXXX D. Route pattern should be 9.1201[2-9]XXXXXX with Discard Digit as Predot E. Route pattern should be 9.1201[2-9]XXXXXX with Discard Digit as Predot and Prefix 9 Answer: A Question: 34 Drop

Page 17 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 35 What is the best practice to employ when using certificates between a browser and the Cisco Unified Communications Manager server? A. Accept the certificate when the security alert pop-up window appears. B. Use SSH exclusively to verify the thumbprint of the certificate and then send the certificate to all Web browser users that require access to the server. C. Use either SSH or CLI to view the thumbprint of the certificate and then communicate the information to all Web browser users so they already have it available when they receive the security alert. D. Note the thumbprint of the Cisco Unified Communications Manager certificates after installation and then communicate the information to all Web browser users so they have it available when they receive the security alert. E. Install thumbprint readers on the devices that need to connect to the Cisco Unified Communications Manager servers via HTTPS. Answer: D Question: 36 SRTP is used for which two services? (Choose two.) A. Accounting B. Encryption C. TLS D. Authentication E. Key Generation Answer: B, D Question: 37 Refer to the exhibit. IT shows an H.323 gateway configuration in a Cisco Unified Communications Manager environment. An inbound PSTN call to this H.323 gateway fails to connect to IP phone extension 2001. The PSTN user hears a reorder tone. Debug isdn q931 on the H.323 gateway

Page 18 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

shows the correct called-party number as 5015552001. Which two configuration changes can correct this issue? (Choose two.)

A. Add port 1/0:23 to dial-peer voice 123 pots. B. Ensure that the Significant Digits for inbound calls on the H.323 gateway configuration is 4. C. Add a voice translation profile to truncate the number from 10 digits to 4 digits. Apply the voice translation profile to the Voice-port. The configuration field "Significant Digits for inbound calls" is left at default ( All ). D. Add the command h323-gateway voip id on interface vlan120. E. Change the destination-pattern on the dial-peer voice 23000 VoIP to 501501? and change the F. Significant Digits for inbound calls to 4. Answer: A, C Question: 38 You have five clusters with three Cisco Unified Communications Manager systems in each. How many Intercluster Trunks must be configured to provide full server redundancy if a gatekeeper is present in the network? A. 1
Page 19 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. 2 C. 3 D. 4 E. 5 F. 6 Answer: E Question: 39 When configuring security in an IP telephony network, which two are required at a minimum for SRTP to function properly? (Choose two.) A. CTL B. Cisco Unified Communications Manager C. MGCP Gateway D. PKI E. IP phones Answer: B, E Question: 40 Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.) A. The trusted introducer uses the signed certificates of the endpoints that need to communicate B. PKI uses only a single trusted introducer C. The trusted introducer uses the private key of each enrolling user and the public key of the introducer as the signed certificate D. Only the public key of the introducer has to be initially known and verified by all other entities E. The introducer digitally signs the public key of the user with the public key of the introducer to generate a signed certificate Answer: B, D Question: 41 To enable security on an IP phone, where should the security configuration take place? A. Phone Device Configuration only B. Phone Security Profile and Phone Device Configuration C. Phone Security Profile only D. User Profile Configuration and Phone Device Configuration E. Device Pool Configuration Answer: B Question: 42 Which statement accurately describes AAR? A. AAR allows calls to be rerouted due to insufficient gatekeeper controlled IP WAN bandwidth. B. AAR allows calls to be rerouted because of insufficient Cisco Unified Border Element controlled bandwidth to an ITSP. C. AAR will display "not enough bandwidth" on the IP phone while it reroutes the call. D. The end users sees, "Network Congestion Rerouting?" but AAR is otherwise transparent to the end user and works without user intervention. E. AAR works with only centralized and distributed call processing environments.
Page 20 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: D Question: 43 What are two requirements for configuring an Intercluster Trunk (gatekeeper-controlled) in Cisco Unified Communications Manager? (Choose two.) A. The assigned name must be unique within the cluster. B. The Intercluster Trunk must have the same name in both clusters. C. The Cisco Unified Communications Manager group in the assigned device pool will determine which Cisco Unified Communications Manager systems register with the gatekeeper. D. The IP addresses of Cisco Unified Communications Manager systems in the remote cluster must be specified. E. The gatekeeper must be defined in Cisco Unified Communications Manager before the intercluster trunk is added. F. RSVP must be enabled to provide CAC between clusters. Answer: A, E Question: 44 Refer to the exhibit. You have configured H.225 gatekeeper controlled trunks from the HQ and Region clusters. When you use the show gatekeeper endpoint command the trunks for Region cluster show up but not the trunks from HQ. What is the issue?

A. The IP address for each H.225 trunk needs to be the same. B. The names of the two H.225 trunks in the trunk configuration for Cluster 1 and Cluster 2 need to be different. C. The zone name for the HQ cluster has to be the same as the zone name for the Region cluster. D. The technology prefix for the two clusters has to be different for the H.225 trunks to register properly with the gatekeeper. Answer: B
Page 21 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 45 When an external call is placed from Ajax, they would like the ANI that is sent to the PSTN to be the main number, not the extension. For domestic calls, they would like 10 digits sent; for international calls, they would like to send the country code 1 and the 10 digits. How can this be accomplished? A. Add a translation pattern to the dial peers in the gateway that adds the appropriate digits to the outgoing ANI. B. In the external call route patterns, set the external phone number mask to the main number. Use 10 digits in the domestic route pattern and 1 followed by the main number digits in the international route patterns. C. Use a calling party transform mask for each route group in the corresponding route list configuration. Set the explicit 10-digit main number for domestic calls and 1 followed by the main number for the international route patterns. D. In the directory number configurations, set the prefix digits field to the country code and the 10 digits of the main number. This will be truncated to the 10-digit number for domestic calls and sent out in its entirety for international calls. Answer: C Question: 46 Refer to the exhibit. You are working with a client that has two large offices, one in New York and one in Los Angles. They would like to place calls between the two facilities over the IP WAN through H.323 gateways and a gatekeeper. Each office has a three-digit site code and users dial five-digit extensions. Which configuration component(s) will the gatekeeper use to route calls?

A. The IP address of the gatekeeper B. The IDs of each of the gateways C. The tech prefix of each gateway D. The tech prefix and ID of each gateway
Page 22 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

E. The bandwidth session zone command Answer: C Question: 47 If your IP telephony administrator asks you to configure a local zone for your dial plan to control the volume of calls between two end points in a distributed multisite environment, which type of Call Admission Control will you be implementing? A. Locations based B. Automated alternate routing C. Gatekeeper based D. SRST Answer: C Question: 48 Which two statements describe the functions of AAR? (Choose two.) A. AAR works for calls placed to internal and external directory numbers (TEHO). B. The number specified in the AAR destination mask is known as the call forward no bandwidth (CFNB) destination. C. AAR provides a fallback mechanism for calls denied by locations-based CAC or RSVP enabled locations-based CAC. D. AAR cannot be used for hunt pilots, CTI route points or CTI ports. E. AAR is a fallback mechanism for calls which are denied by locations-based CAC or RSVPenabled locations-based CAC and also applies to calls denied by gateways due to exceeding the available or administratively permitted number of channels. Answer: B, C Question: 49 Drop

Page 23 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 50 If your IP telephony administrator asks you to configure a local zone for your dial plan to control the volume of calls between two end points in a centralized multisite environment, which two types of Call Admission Control can be implemented? (Choose two.) A. Locations based B. Automated alternate routing C. Gatekeeper based D. SRST E. Cisco Unified Communications Manager based Answer: A, C Question: 51 Users at remote sites are complaining that when they place users on hold beeps are heard instead of music. You have checked your configuration and the MOH server and SRST routers are configured correctly for MOH from flash and IP multicast, and the IP WAN is not carrying IP multicast MOH packets. Which two issues could be causing this problem? (Choose two.) A. The IP phones at the remote sites need to have access to the MOH server at the central site from their MRGL. B. The IP phones at the remote sites need to have access to their SRST gateways from their MRGLs. C. The MRG used by the MOH MRGL for the remote sites needs to place the SRST router first in the resource group list. C. The IP phones at the remote sites need to have access to both the MOH server and their SRST gateways from their MRGLs. D. The IP voice streaming is configured for G.729. Answer: A, D Question: 52 What is the purpose of a region? A. To specify only the audio codec used within a site B. To specify only the video codec used between other specific sites C. To specify the range of codecs used between all other sites D. To specify the audio and video codecs used between specific sites

Page 24 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: D Question: 53 Your customer has determined that they would like to implement TEHO in their dial plan. Which table would contain the most vital information for this strategy?

Answer: C

Page 25 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 54 You are implementing an Intercluster Trunk to a remote cluster for a distributed Cisco Unified Communications Manager topology with PSTN backup. Users should always dial four-digit extensions to reach the remote cluster with extensions 4XXX. If the Intercluster Trunk is down, the call should be routed to the PSTN as 5015014XXX through a local MGCP gateway. Assume 9is used as access code and 1 for long distance calls. Which configuration is correct? A. Configure a route list with two route groups. Point the first route group to the trunk. Point the second route group to the MGCP gateway and prefix the number with 1501501. Assign the route list to a route pattern of 4XXX. B. Configure a route pattern with 4XXX. Point the route pattern to the trunk as first choice. The second choice would be an MGCP gateway with prefix 1501501. C. Configure a route list with two route groups. Point the first route group to the trunk. Point the second route to the MGCP gateway and prefix the number with 91501501. Assign the route list to a route pattern of 4XXX. D. Configure a route pattern with 4XXX. Point the route pattern to the trunk as first choice. The second choice would be an MGCP gateway with prefix 91501501. E. Configure two route patterns. Use 4XXX for the first route pattern and point it to the trunk. Use 15015014XXX for the second route pattern and point it to the MGCP gateway. F. Configure two route patterns. Use 4XXX for the first route pattern and point it to the trunk. Use 915015014XXX for the second route pattern and point it to the MGCP gateway. Answer: A Question: 55 Refer to the exhibit. A user in RTP calls a phone in San Jose during congestion with Call Forward No Bandwidth (CFNB) configured to reach cell phone 4085550150. The user in RTP sees the message "Not Enough Bandwidth" on their phone and hears a fast busy tone.

Which two conditions can correct this issue? (Choose two.) A. The calling phone (RTP) needs to have AAR Group value of AAR under the AAR Settings. B. The called phone (San Jose) needs to have AAR Group value of AAR under the AAR Settings. C. The calling phone (RTP) needs to have the AAR destination mask of 914085550150 configured under the AAR Settings. D. The calling phone (RTP) needs to have the AAR destination mask of 4085550150 configured under the AAR Settings. E. The called phone (San Jose) needs to have the AAR destination mask of 914085550150 configured under the AAR Settings.

Page 26 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

F. The called phone (San Jose) needs to have the AAR destination mask of 4085550150 configured under the AAR Settings. Answer: B, F Question: 56 Refer to the exhibit. On an H.323 gateway, the calls from the IP network to the PSTN are working but the inbound calls are not. Which command will you use to correct this issue?

A. Destination-pattern B. Session target C. Bind srcaddr D. Session preference E. Session gateway F. Session connect Answer: C Question: 57 Drop

Page 27 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 58 You've been asked to implement PSTN backup for an existing TEHO setup that is using Cisco Unified Communications Manager. Which configuration method is correct? A. Configure locations based CAC with PSTN backup. If calls over the WAN fail, PSTN backup will be triggered. B. Add a second gateway that is used locally. Create a second route pattern that points to the gateway with preference of 2. C. Create a second route list that points to a local gateway. Assign the route list to the existing route pattern with preference of 2. D. Create one route pattern with the first gateway used for VoIP and the second gateway used for a local PSTN backup. E. Create a second route group which uses the local gateway. Add this route group to the route list that is used in the existing route pattern. Answer: E Question: 59 Refer to the exhibit. A manager at HQ is holding a conference call with three of his staff members that are located at BR. The HQ region uses the G.711 codec, the BR region uses the G.711 codec, and the IP WAN region uses the G.729 codec. The MRGL associated with the manager has only the software conference bridge listed. What will happen when the three staff members join the conference?

Page 28 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The staff members will all join the conference normally. B. The staff members will be prevented from joining because the software conference bridge only supports the G.711 codec and the staff members will be using the G.729 codec. C. The staff members will not be able to join the conference until all the software conferencing resources are consumed and the conference uses the hardware conferencing resources at BR. D. The staff members will join only after the manager has set the conference call up using the hardware conferencing resources. Answer: B Question: 60 Drop

Page 29 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 61 Which two configurations provide the best SIP trunk redundancy with Cisco Unified Communications Manager? (Choose two.) A. Configure all SIP trunks with DNS SRV. B. Configure all SIP trunks with Cisco Unified Border Element. C. Configure all SIP trunks to point to a SIP gateway. D. Configure SIP trunks to be members of route groups and route lists. E. Configure all SIP trunks to allow TCP ports 5060. F. Configure all SIP trunks to point to a gatekeeper through SIP to H.323 gateway. Answer: A, D Question: 62 Refer to the exhibit. You have configured transcoder resources in both an IOS router and a Cisco Unified Communications Manager. When you review the configurations in both devices the IP addresses and transcoder names are correct, but the transcoder is failing to register with the Cisco Unified Communications Manager. Which command needs to be edited to allow the transcoder to register properly?

Page 30 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. The associate profile and dsp farm profile numbers need to match associate ccm 2 command. B. The associate ccm 2 priority 1 command needs to be changed so the ccm value matches identifier 1 in the sccp ccm 10.1.1.1 command. C. The sccp ccm group number needs to match the associate ccm 2 command. D. The maximum sessions command must match the number of codecs configured under the dsp farm profile. E. The sccp ccm group number must match the voice-card number. Answer: B Question: 63 What is the relationship between a Region and a Location? A. The codec parameter configured in the Region is only used between Regions and Location bandwidth is only used between Locations. B. The Region codec parameter is used between a Region and its configured Locations. C. The Region codec parameter is combined with Location bandwidth when communicating with other Regions. D. The Region setting for a Location sets the number of audio and video calls that Location can support. Answer: A Question: 64 The Acme Lumber Company uses a centralized call processing model to connect their saw mills in Albany and Columbus. Each mill is configured as a separate Location in Cisco Unified
Page 31 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

CallManager at HQ. Each Location has been configured with 256 Kbps of voice bandwidth. How many G.729 calls can be placed between Locations simultaneously? A. 5 B. 8 C. 10 D. 16 E. 23 Answer: C Question: 65 What are three ways to block multicast MOH packets from a central site being used by IP phones at remote sites? (Choose three.) A. Disable IP multicast routing on the IP WAN interface at the central site. B. Enable IP multicast routing on all interfaces on all routers at each remote site. C. Enable an IP ACL to block outbound IP multicast packets on the IP WAN interface at the central site. D. Configure the TTL in the Cisco Unified Communications Manager MOH configuration so that IP multicast packets don't cross the IP WAN. E. Enable IP ACLs on each remote site router to block outbound IP multicast packets from the IP WAN. F. Configure IP Phones at the remote site to only accept unicast MOH. Answer: A, C, D Question: 66 Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified Communications Manager server? (Choose two.) A. PKI B. TLS C. SRTP D. Digest authentication E. HTTPS F. SFTP Answer: B, D Question: 67 How is recovery from SRST mode back to Cisco Unified Communications Manager call processing accomplished? A. The IP phones receive Keepalives from Cisco Unified Communications Manager. They then register with Cisco Unified Communications Manager and cancel their registration with the SRST gateway. B. The IP phones receive a response to Keepalives sent to Cisco Unified Communications Manager. They then register with Cisco Unified Communications Manager and cancel their registration with the SRST gateway. C. The SRST gateway receives Keepalives from Cisco Unified Communications Manager. The SRST gateway then rejects the IP phone registrations with instructions to register with Cisco Unified Communications Manager.

Page 32 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

D. The SRST gateway receives a response to Keepalives sent to Cisco Unified Communications Manager. The SRST gateway then rejects the IP phone registrations with instructions to register with Cisco Unified Communications Manager. Answer: B Question: 68 Manual IOS SRTP configuration is required on which two types of gateways? (Choose two.) A. H.323 B. MGCP C. PRI D. SIP E. SCCP Answer: A, D Question: 69 Refer to the exhibit. When a Cisco IP Communicator Phone roams from SJ to RTP, the physical location for the Cisco IP Communicator Phone changes and the Device Mobility Group remains the same. All route patterns are assigned to partitions and configured to utilize the local gateway. After roaming to RTP, which statement about call routing is true?

A. Long distance calls will use the SJ gateway. International calls will use the RTP gateway. Emergency calls will use the San Jose gateway. B. Long distance calls will use the RTP Gateway. International calls will use the SJ gateway. Emergency calls will use the RTP gateway. C. All calls will use the RTP gateway, except emergency calls, which will use the SJ gateway. D. All calls will use the SJ gateway, except emergency calls, which will use the RTP gateway. Answer: B

Page 33 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 70 You are the Cisco Unified Communications Manager in Company.com..You should ensure inbound PSTN calls to work in an H.323 gateway configured with Cisco Unified Communications Manager How should you do? (Choose three.) A. Register he H.323 gateway with Cisco Unified Communications Manager. B. Configure a pots dial peer with direct-inward-dial and incoming-called number C. Execute command h323-gateway voip bind srcaddr on the H.323 interface. D. Configure a VoIP dial peer pointing to Cisco Unified Communications Manager Answer: B, C, D Question: 71 Which two of the following are often sources of toll fraud? (Choose two.) (Source:Preventing Toll Fraud) A. Voice mail-to-voice mail transfer B. CFA C. Transfer from voice mail D. Transfer to an internal destination Answer: B, C Question: 72 Which two have to be defined in the Forward All field? (Choose two.) (Source:Preventing Toll Fraud) A. Destination B. Partition C. Calling search space D. Hunt list Answer: A, C Question: 73 Which is not defined when configuring time periods? (Source: Preventing Toll Fraud) A. Start time B. End time C. Duration D. Period name Answer: C Question: 74 When you are restricting external call transfers, which statement is correct? (Source:Preventing Toll Fraud) A. Route patterns can be classified as on-net or off-net. B. Partitions must be classified in order to use call-transfer restrictions. C. Transfer restrictions, restricted on-net-to-off-net transfer, and restricted off-netto-off-net transfer can be used. D. Only internal devices must be classified. Answer: A
Page 34 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 75 Which two service parameters can be configured when using ad hoc conference restrictions? (Choose two.) (Source: Preventing Toll Fraud) A. Never B. When First On-Net Party Leaves the Conference C. When No Off-Net Parties Remain in the Conference D. When Conference Creator Drops Out Answer: A, D Question: 76 What is the default value for the Drop Ad Hoc Conference service parameter? (Source:Preventing Toll Fraud) A. Never B. Drop Ad Hoc Conference When Creator Leaves C. When No On-Net Parties Remain in the Conference D. When No Off-Net Parties Remain in the Conference Answer: A Question: 77 The list of the Arabia numbers includes pairs of gateway signaling protocols and PSTN trunk types. All gateways are SRST gateways. Please match each item from the list of the Arabia numbers to the correct category of the Rome numbers based on whether active calls to or from the PSTN can be preserved or will be matching when the gateway fails over to SRST mode. (1)MGCP with PRI (2)MGCP with CAS (3)H.323 with PRI (4)H.323 with CAS (I)Calls can be preserved. (II)Calls will be dropped. A. (I)-(2 3 4);(II)- (1) B. (I)-(2 4 3);(II)-(1) C. (I)-(4 3 2);(II)- (1) D. (I)-(4 2 3);(II)- (1) Answer: A Question: 78 What is the purpose of FAC? (Source: Preventing Toll Fraud) A. Time-based call routing B. Restricting call routing to destinations based on the time of day C. Restricting call routing to destinations based on user codes D. Restricting call routing to destinations based on on-net or off-net classification Answer: C

Page 35 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 79 Why is it important to block commonly exploited area codes when you want to restrict international calls? (Source: Preventing Toll Fraud) A. Some countries have special premium numbers as country codes. B. Some countries have special country codes that look like area codes of the United States. C. Countries such as the Bahamas can be reached either over the country code or over an area code. D. When these numbers are not blocked, they are treated like normal local telephone calls. Answer: B Question: 80 Why might a hacker target an IP phone for attack? (Source: Hardening the IP Phone) A. The attacker can learn about the IP telephony environment. B. The attacker can start attacks from the IP phone, because it is a trusted device. C. With a modified image and configuration file, the attacker can bring down the Cisco Unified CallManager. D. The attacker can sabotage a special user. Answer: A Question: 81 Where are IP phone security settings configured? (Source: Hardening the IP Phone) A. Directory Number Configuration B. Phone Configuration C. Phone Security Configuration D. Product Specific Configuration Answer: D Question: 82 A branch site with an H323 gateway has lost connectivity to the main site.Please match the steps for initiating SRST and returning to normal operation to the correct order. (1)Phone initiates registration with SRST gateway. (2)Phone sends Keepalives to Cisco Unified CM. (3)Phone initiates re-registration. (4)Kepalive responses seen when connectivity is restored. (I)step1 (II)step2 (III)step3 (IV)step4 A. (I)-(1);(II)-(3);(III)-(4);(IV)-(2) B. (I)-(2);(II)-(1);(III)-(4);(IV)-(3) C. (I)-(1);(II)-(2);(III)-(4);(IV)-(3) D. (I)-(1);(II)-(2);(III)-(3);(IV)-(4) Answer: C

Page 36 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 83 How do you browse to the IP phone? (Source: Hardening the IP Phone) A. http://IP-phone-IP-address B. https://IP-phone-IP-address C. https://IP-phone-IP-address/CCMAdmin D. https://IP-phone-IP-address/Admin Answer: A Question: 84 Please match the characteristic to the correct feature. (1)support for up to 720 phones (2)support for up to 240 phones (3)support for VG-248 (4)support for alias command (5)support for soft-key templates (6)support for hunt groups (7)SNAP is sued to build ephones (I)Cisco Unified CME in SRST mode (II)SRST (III)SRST and Cisco Unified CME operating in SRST mode A. (I)-(2 5 7);(II)-(1 3 4);(III)-(6) B. (I)-(2 3 6);(III)-(1 5 4);(III)-(7) C. (I)-(2 5 1);(II)-(6 3 4);(III)-(7) D. (I)-(2 5 6);(II)-(1 3 4);(III)-(7) Answer: D Question: 85 Which statement is not true about GARP? (Source: Hardening the IP Phone) A. GARP can be used for a man-in-the-middle attack. B. GARP attacks require access to the target LAN or VLAN. C. GARP is normally used for HSRP. D. GARP can be disabled at Cisco IP phones. Answer: C Question: 86 Which is not a purpose for the built-in switch in the Cisco IP phone? (Source:Hardening the IP Phone) A. Call recording B. Lawful interception C. Supervisory monitoring D. Provide Power over Ethernet to the PC Answer: D

Page 37 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 87 Which two are not cryptographic services? (Choose two.) (Source: Understanding Cryptographic Fundamentals) A. Authenticity B. Confidentiality C. Resistance against DoS attacks D. Defense in depth Answer: C, D Question: 88 You are the Cisco Unified Communications Manager in Company.com. You configure Cisco Unified Communications Manager with a software MTP to use RSVP for Call Admission Control.The maximum sessions are 20,and the maximum bandwidth is 40. Please match the commands to the correct locations in the configuration output. (1)associate profile 1 register HQ-1_MTP (2)rsvp (3)ip rsvp bandwidth 40 (4)dspfarm profile 1 mtp (5)maximum sessions software 20 (6)associate application SCCP (7)codec pass-through ! sccp local FastEthernet0/0 sccp ccm 10.1.1.1 identifier 1 version 6.0 sccp ! sccp ccm group 1 associate ccm 1 priority 1 (I) ! (II) (III) (IV) (V) (VI) ! interface Serica0/1 description IP-WAN ip address 10.1.4.101.255.255.255.0 duplex auto speed auto (VII) ! A. (I)-(2);(II)-(6);(III)-(1);(IV)-(3);(V)-(7);(VI)-(4);(VII)-(5) B. (I)-(2);(II)-(1);(III)-(6);(IV)-(3);(V)-(4);(VI)-(7);(VII)-(5) C. (I)-(2);(II)-(6);(III)-(1);(IV)-(4);(V)-(7);(VI)-(3);(VII)-(5) D. (I)-(2);(II)-(6);(III)-(7);(IV)-(3);(V)-(1);(VI)-(4);(VII)-(5) Answer: A

Page 38 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 89 Which two statements about symmetric encryption are true? (Choose two.) (Source: Understanding Cryptographic Fundamentals) A. Symmetric encryption is a good choice for real-time encryption of bulk data. B. Symmetric encryption is commonly used to sign asymmetric keys. C. Symmetric encryption uses asymmetric keys. D. With symmetric encryption, the encryption key equals the decryption key. Answer: A, D Question: 90 Which two statements about asymmetric encryption are true? (Choose two.) (Source:Understanding Cryptographic Fundamentals) A. Asymmetric encryption is considerably faster than symmetric encryption. B. Asymmetric encryption keys should have about half the lifetime of symmetric encryption keys. C. With asymmetric encryption, either of the two keys can be used for encryption and the other key can be used for decryption. D. Asymmetric encryption is often used to create signatures. Answer: C, D Question: 91 Which statement about hash functions is true? (Source: Understanding Cryptographic Fundamentals) A. A hash digest can never be used to generate the hashed data. B. It is computationally difficult to generate the hashed data from a hash digest. C. Data can be encrypted if hashed with a secret key. D. AES can use SHA-1 for data encryption. Answer: A Question: 92 Which statement does not apply to digital signatures? (Source: Understanding Cryptographic Fundamentals) A. Provide data authenticity B. Provide data integrity C. Provide nonrepudiation D. Are created by hashing the result of an asymmetric encryption Answer: D Question: 93 When configuring encrypted configuration files, what is the correct order? 1. Apply the phone security profile to the phone. 2. Verify that the cluster security mode is set to Secure. 3. Enter the symmetric configuration file encryption key into phones that do not have certificates. 4. Create a new phone security profile and check the TFTP Encrypted Config checkbox. A. 4-3-2-1 B. 2-4-1-3 C. 1-3-2-4
Page 39 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

D. 2-3-1-4 Answer: B Question: 94 What problem does a PKI solve? (Source: Understanding PKI) A. The lack of a common encryption standard for Internet applications B. The problem that asymmetric encryption techniques do not work without a PKI C. The fact that Diffie-Hellman is not secure D. The problem of scalable, secure key exchange Answer: D Question: 95 Which two statements about trusted introducing are incorrect? (Choose two.) (Source:Understanding PKI) A. The trusted introducer has to be trusted by all other members of the system. B. The trusted introducer has to trust all other members of the system. C. Only the trusted introducer has to trust the root of the system. D. Any entity of the system can guarantee the authenticity of any other member. Answer: C, D Question: 96 Which statement about certificates is true? (Source: Understanding PKI) A. Include the identity and the symmetric key of the owner B. Include the public key of the issuer C. Include the identity and the private key of the owner D. Include the identity of the issuer and the identity and the public key of the owner Answer: D Question: 97 Which are the two valid options to secure enrollment in a PKI? (Choose two.) (Source:Understanding PKI) A. Perform the enrollment from a trusted device only B. Perform the enrollment in both directions. C. Perform the enrollment over a trusted network.. D. Perform mutual out-of-band authentication between the PKI user and CA. Answer: C, D Question: 98 Which is true about certificate revocation? (Source: Understanding PKI) A. Any entity of a PKI system that receives an untrusted certificate can request revocation of that certificate. B. The CA periodically revokes all expired certificates. C. Certificate revocation is needed when the public key has been transferred without a certificate. D. Certificate revocation is needed whenever the private key is not trustworthy anymore.

Page 40 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: D Question: 99 What is the certificate of a web server used for when you are using SSL? (Source:Understanding PKI) A. It is used to authenticate the client. B. The public key of the server is used by the client when encrypting the data sent to the server. C. The private key of the server is used by the client when encrypting the data sent to the server. D. It is used to authenticate the server and to encrypt the symmetric session keys used for the authentication and encryption of the data stream. Answer: D Question: 100 Which two are not security threats to an IP telephony system? (Choose two.) (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. Loss of privacy B. Impersonation C. Integrity D. Loss of control Answer: C, D Question: 101 Which statement about enrollment in the IP telephony PKI is true? (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. MICs are issued by the CAPF itself or by an external CA. B. LSCs are issued by the Cisco CTL client or by the CAPF. C. CAPF enrollment supports the use of authentication strings. D. The CAPF itself has to enroll with the Cisco CTL client. Answer: C Question: 102 Which entities use a smart token for key storage? (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. CTL B. Cisco CTL client C. CAPF in proxy mode D. CAPF in CA mode Answer: B Question: 103 What are the authentication features of TLS in Cisco IP telephony? (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. Two-way device authentication B. Two-way device authentication and signed media messages C. One-way device authentication and signed signaling message D. Two-way device authentication and signed signaling messages
Page 41 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: D Question: 104 During an encrypted call between two IP phones, which two events do not happen? (Choose two.) (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. Mutual certificate exchange between Cisco Unified CallManager and each IP phone B. Mutual certificate exchange between the IP phones C. SRTP packet authentication and encryption D. Encrypted transmission of SRTP session keys between the IP phones Answer: B, D Question: 105 Which is the most accurate list of tasks required to configure a Cisco Unified CallManager cluster for security? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Enable services, set cluster to secure mode, create a signed CTL, and deploy certificates to the IP phones B. Enable services, set cluster to secure-only mode, create a signed CTL, and deploy certificates to the IP phones C. Enable extended services, set cluster to authenticated or encrypted mode, create a signed CTL, and deploy certificates to the IP phones D. Enable services, set cluster to secure mode, create a signed CTL, deploy certificates to the IP phones, and set the device security mode Answer: D Question: 106 Which two services must be enabled when configuring a Cisco Unified CallManager cluster for security? (Choose two.) (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Cisco CAPF B. Cisco Authority Provider Function C. Cisco CTL Provider D. Cisco CTL Proxy Answer: A, C Question: 107 Please match the correct configuration step to the right for Cisco Unfied Mobility configuration. (1)Enable mobility for the phone. (2)Add the mobility service under IP phone services. (3)Configure Mobile Voice Access under Media Resources. (4)Activate the required services. (5)Configure the Cisco IOS gateway. (6)Add the mobility softkey to the phone. (7)Configure Remote Destination/Profiles. (8)Enable mobility for the user. (9)Configure Remote Destination CSS. Mobile connect, and Mobile Voice Access Configurations

Page 42 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

(I)step1 (II)step2 (III)step3 (IV)step4 (V)step5 (VI)step6 A. (I)-(3);(II)-(4);(III)-(5);(IV)-(6);(V)-(7);(VI)-(9) B. (I)-(2);(II)-(4);(III)-(5);(IV)-(6);(V)-(7);(VI)-(8) C. (I)-(3);(II)-(4);(III)-(5);(IV)-(6);(V)-(7);(VI)-(8) D. (I)-(1);(II)-(4);(III)-(5);(IV)-(6);(V)-(7);(VI)-(9) Answer: C Question: 108 What are the needs for the PC when you are installing the Cisco CTL client? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Microsoft Windows operating system, at least one USB port, Smart Card service enabled B. Linux operating system, at least two USB ports, Smart Card service enabled C. Windows 2000 operating system, at least two USB ports, Smart Card service disabled D. Microsoft Windows operating system, PCMCIA slot, Smart Card service enabled Answer: A Question: 109 An update of the configuration using the Cisco CTL client not needed when _______.(Source: Configuring Cisco IP Telephony Authentication and Encryption) A. An LSC of the IP phone is upgraded B. A security token is added to the system C. A Cisco Unified CallManager has been removed D. An IP address of the Cisco TFTP server has been changed Answer: A Question: 110 SRTP is used for ____ A. Accounting and TLS B. Encryption and Authentication C. TLS and Authentication D. Only for Authentication Answer: B Question: 111 Which two statements about LSCs are correct? (Choose two.) (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. On a Cisco Unified IP Phone 7970, a MIC has priority over an LSC. B. On a Cisco Unified IP Phone 7960, an LSC has priority over a MIC. C. The Certificate Operation field of the CAPF can be set to Install/Upgrade, Delete, Troubleshoot, or No Pending Operation.

Page 43 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

D. CAPF authentication can be configured to be done by authentication string,null string, or existing certificates. Answer: C, D Question: 112 What configuration element is used to enable authentication and encryption for a specific phone? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Device security mode at the Phone Configuration page B. Device security mode at the phone security profile C. Security operation mode at the Phone Configuration page D. Security operation mode at the phone security profile Answer: B Question: 113 Which two options are search criteria when you are searching for IP phones using the Find and List Phones window? (Choose four.) (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Authentication mode B. LSC status C. Device name D. Directory number E. Device security mode Answer: B, C, D, E Question: 114 Which statement is true about digest authentication? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Encrypts packets B. Authenticates and encrypts packets C. Is challenge response based D. Is based on asymmetric encryption Answer: C Question: 115 Which three tasks are performed to install an encrypted configuration file in a phone? (Choose three.) (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Set the cluster security mode to Secure. B. Enter the key into the phone. C. Configure the CAPF to issue a certificate to the phone. D. Set the TFTP Encrypted Configuration enterprise parameter to True. Answer: A, B, D Question: 116 Which statement is true about secure SRST? (Source: Configuring Cisco IP Telephony Authentication and Encryption)

Page 44 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. You have to manually enter the certificates of CAs that issue phone certificates to the gateway. B. You have to manually enter the gateway certificate into Cisco Unified CallManager. C. You do not have to enter any certificates manually. D. In a fallback event, the gateway requests all phone certificates from Cisco Unified CallManager. Answer: A Question: 117 Which statement about SIP trunks and H.323 and MGCP gateways is correct? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. SIP trunks support TLS and SRTP. B. Key exchange between Cisco Unified CallManager and H.323 and MGCP gateways is secure. C. H.323 gateways support TLS but not SRTP. D. Even when using SRTP, signaling messages between Cisco Unified CallManager and MGCP and H.323 gateways are sent in cleartext. Answer: D Question: 118 Enabling authentication and encryption for CTI, JTAPI, and TAPI applications requires which two tasks? (Choose two.) (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Enter the encryption key into the application. B. Add the application user or end users to the Standard CTI Secure Connection user group, Standard CTI Allow Reception of SRTP Key Material user group, and Standard CTI Enabled user group. C. Set up an IPsec association between the application and Cisco Unified CallManager. D. Configure related security parameters in the CTI, JTAPI, and TAPI application. Answer: B, D Question: 119 Which statement is correct about IPsec in Cisco Unified CallManager? (Source: Configuring Cisco IP Telephony Authentication and Encryption) A. Cisco Unified CallManager supports IPsec with preshared keys only. B. Cisco Unified CallManager supports IPsec with certificates only. C. Cisco Unified CallManager supports IPsec with preshared keys or certificates. D. Cisco Unified CallManager does not support IPsec. IPsec can be used only on network devices. Answer: C Question: 120 What is the video payload in a video call with 384 kbps and G.711? (Source: Introducing IP Video Telephony) A. 300 kbps B. 320 kbps C. 376 kbps D. 384 kbps Answer: B
Page 45 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 121 To enable video calls with a requested speed of 256 kbps, what would the recommended bandwidth setting be on Cisco Unified CallManager locations? (Source: Introducing IP Video Telephony) A. 307.2 kbps B. 256 kbps C. 512 kbps D. 281.6 kbps Answer: B Question: 122 Which video codec will be used when Cisco Unified Video Advantage and H.323 devices communicate? (Source: Introducing IP Video Telephony) A. H.263 B. H.264 C. Cisco wideband codec D. H.261 Answer: B Question: 123 How is CAC performed between Cisco Unified CallManager clusters with a nongatekeepercontrolled intercluster trunk? (Source: Introducing IP Video Telephony) A. Gateway B. Cisco Unified CallManager locations C. Gatekeeper D. MCU Answer: B Question: 124 Please match the route pattern wild card description to the wild card it describes. (1)single digit (2)number range (3)one or more digits (4)country specific numbeirng plan (I)X (II)@ (III)! (IV)[xyz] A. (I)-(4);(II)-(1)(III)-(2);(IV)-(3) B. (I)-(4);(II)-(1)(III)-(3);(IV)-(2) C. (I)-(1);(II)-(4)(III)-(2);(IV)-(3) D. (I)-(1);(II)-(4)(III)-(3);(IV)-(2) Answer: D

Page 46 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 125 Which device performs CAC within a cluster with multiple sites connected over a WAN? (Source: Introducing IP Video Telephony) A. Gateway B. Cisco Unified CallManager C. MCU D. Intercluster trunk Answer: B Question: 126 Which device is needed to integrate H.320 into the Cisco video solution? (Source: Introducing IP Video Telephony) A. MCU B. Video gateway C. MGCP gateway D. H.323 gatekeeper Answer: B Question: 127 Into which port should the PC with Cisco Unified Video Advantage client software installed be plugged? (Source: Configuring Cisco Unified Video Advantage) A. Cisco Catalyst switch port B. Cisco IP phone access port C. MCU port D. Videoconferencing port Answer: B Question: 128 You are the Cisco Unified Communications Manager in Company.com.You want to implement TEHO in their dial plan. Which table would contain the most vital information for this strategy? -------With regard to this question, we do not have the right answer, if you have, please contact us.

Page 47 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: Pending Question: 129 Which two protocols are supported by Cisco Unified Video Advantage? (Choose two.)(Source: Configuring Cisco Unified Video Advantage) A. Cisco Audio Session Tunnel B. FTP C. RTP D. SSH Answer: A, C Question: 130 Which three SCCP Cisco endpoints are video-capable? (Choose three.) (Source:Configuring Cisco Unified Video Advantage)

Page 48 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. Cisco Unified IP Phone 7902 B. Cisco Unified IP Phone 7941 C. Cisco Unified IP Phone 7960 D. Cisco Unified IP Phone 7970 Answer: B, C, D Question: 131 Which two IP phone settings are enabled by default in Cisco Unified CallManager?(Choose two.) (Source: Configuring Cisco Unified Video Advantage) A. Video capabilities B. PC port C. Retry Video Call as Audio D. Video calling search space Answer: B, C Question: 132 Video calls using 384 kbps need to be supported across a gatekeeper-controlled trunk. What value should be entered into the gatekeeper to support this bandwidth? (Source: Configuring Cisco Unified Video Advantage ) A. 192 kbps B. 384 kbps C. 512 kbps D. 768 kbps Answer: D Question: 133 Choose the signaing type to the proper locations.(The signaing types may be used more than one) I.SCCP II.RSVP III.RTP

Page 49 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. 1-II;2-I;3-I;4-II;5-I;6-I;7-III;8-III B. 1-I;2-II;3-II;4-I;5-I;6-I;7-III;8-III C. 1-II;2-I;3-I;4-II;5-III;6-III;7-I;8-I D. 1-I;2-II;3-II;4-I;5-III;6-III;7-I;8-I Answer: A Question: 134 Please match the Cisco Unified Communications Manager configuration option to the thpe of transformation mask to which it applies. (1)Line ID Presentation (2)Discard Digits (3)Called Party Mask (4)Name Presentation (I)Caller ID (II)Dialed Number A. (I)-(1 3);(II)-(2 4) B. (I)-(1 2);(II)-(3 4) C. (I)-(1 4);(II)-(2 3) D. (I)-(2 3);(II)-(1 4) Answer: C Question: 135 The relationship between a Region and a Location is that the Region codec parameter is used between a Region and its configured Locations. A. TRUE B. FALSE

Page 50 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: B Question: 136 The relationship between a Region and a Location is that the Region codec parameter is combined with Location bandwidth when communicating with other Regions. A. TRUE B. FALSE Answer: B Question: 137 The relationship between a Region and a Location is that the Region setting for a Location sets the number of audio and video calls that Location can support. A. TRUE B. FALSE Answer: B Question: 138 Which way are not able to block multicast MOH packets from a central site being used by IP phones at remote sites? A. By disabling IP multicast routing on the IP WAN interface at the central site. B. By enabling IP multicast routing on all interfaces on all routers at each remote site. C. By enabling an IP ACL to block outbound IP multicast packets on the IP WAN interface at the central site. D. By configuring the TTL in the Cisco Unified Communications Manager MOH configuration so that IP multicast packets don't cross the IP WAN. Answer: B Question: 139 Manual IOS SRTP configuration is required on ____ gateways A. H.323 and SIP Answer: A Question: 140 Security issue is crucial to us. As a network technician, can you tell me which security characteristic of the following will only be configured in phone security profile? (Choose two) A. CAPF authentication mode B. Encrypted configuration files C. CAPF key size D. Device security mode Answer: B, D Question: 141 The Cisco CTL client software, available as a plug-in application on Cisco Call Manager Administration, is used to create or update the Certificate Trust List (CTL). Cisco Unified

Page 51 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Communications Manager creates a unified workspace that supports a full range of communications features and applications with a solution. Cisco Unified Communications Manager cluster will support which security modes while using the Cisco CTL client? (Choose two) A. Security mode B. Non secure mode C. Mixed mode D. Cluster mode Answer: B, C Question: 142 Refer to the following descriptions, which two are correct about SRST? (Choose two) A. When an IP phone registers with the secure SRST gateway by using TLS, the secure SRST gateway will send its certificate to the IP phone. B. You have to manually enter the certificates of CAs that issue phone certificates to the gateway. C. You have to manually enter the certificate of the gateway into Cisco Unified Communications Manager. D. In a fallback event, the gateway will request all phone certificates from Cisco Unified Communications Manager. Answer: A, B Question: 143 SIP trunk encryption protects SIP signaling messages by using TLS with packet authentication (HMAC) and encryption (AES). In the process of configuring SIP trunk encryption, which steps of the following are correct? (Choose two) A. Adding the certificate of the issuer of the certificate of the peer to Cisco Unified Communications Manager. B. Applying the SIP trunk security profile to the SIP gateway. C. Setting the X.509v3 certificate subject in the SIP trunk security profile. D. Setting the Device Security Mode to Encrypted in the SIP trunk configuration Answer: A, C Question: 144 SRTP is a security profile for RTP that adds confidentiality, message authentication, and replay protection to that protocol. Which two features are of SRTP protection? (Choose two) A. Keys are sent to the IP phones by Cisco Unified Communications Manager inside signaling messages B. SRTP can be used with IP phones even if they do not support the use of authenticated and encrypted signaling C. SRTP protection requires encrypted signaling to ensure protection of media key distribution D. SRTP session keys are generated by the phone itself if using SCCP. Answer: A, C Question: 145 A hash function is any well-defined procedure or mathematical function which converts a large, possibly variable-sized amount of data into a small datum, usually a single integer that may serve as an index into an array. Which features are of hash functions? (Choose two)
Page 52 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. It is impossible to recover hashed data from a digest. B. They are slow. C. They generate variable length output. D. They are one-way functions. Answer: A, D Question: 146 Look at the following items, which three are features of SRTP to MGCP gateways? (Choose three) A. The MGCP gateway generates the keys and sends them to the Cisco Unified Communications Manager. B. Security capabilities are exchanged during call setup C. The highest possible security mode is automatically used. D. The key exchange is not protected. Answer: B, C, D Question: 147 Which two descriptions of the following are correct regarding the web server authentication process? (Choose two) A. The client uses its private key to encrypt the random challenge data sent to the web server. B. The client sends a challenge with random data to the web server. C. The client verifies the returned data using the public key of the web server D. The web server uses its public key to sign the random data and send it back to the client. Answer: B, C Question: 148 According to the security mode settings, can you tell me which two of the following call scenarios are correct? (Choose two) A. If one phone is set to Encrypted and the other phone is set to Non-Secure, then an anthenticated call is placed. B. If any of the devices is set to Non-Secure, then a non-secure cal is placed. C. If both devices are set to Encrypted, then an encrypted call is placed. D. If one phone is set to Authenticated and the other is set to Encrypted, then a non-secure call is placed. Answer: B, C Question: 149 In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by its own creator. Self-signed certificate is used by which IP telephony services? (Choose two) A. Each PSTN gateway. B. Each TFTP server. C. Each Cisco Unified Communications server running the Cisco CallManager service. D. Each IP phone. Answer: B, C
Page 53 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 150 When users communicate with each other by using e-mail, which cryptography service could certify that the content of the received e-mail and the content of the sent e-mail are identical? A. Integrity B. Nonrepudiation C. Authenticity D. Confidentiality Answer: A Question: 151 When using an existing MIC to implement a certificate upgrade, which two actions will you take? (Choose two) A. The user must manually contact the CAPF for the update B. The Authentication Mode must be set to By Existing Certificate-precedence to MIC. C. The IP phone must be reset. D. The existing LSC is used for authentication during the enrollment. Answer: B, C Question: 152 Internet Protocol security (IPsec) is a framework of open standards for protecting communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPsec will encrypt Survivable Remote Site Telephony (SRTP) session keys in which scenarios? (Choose two) A. Signaling to Media Gateway Control Protocol (MGCP) B. Intracluster phone-to-phone signaling C. Intercluster trunk signaling D. Server-to-server intercluster signaling Answer: A, C Question: 153 A digital signature or digital signature scheme is a type of asymmetric cryptography. Which three descriptions are correct about digital signatures? (Choose three) A. They provide data integrity. B. They provide data authenticity. C. They provide data confidentiality. D. They provide nonrepudiation. Answer: A, B, D Question: 154 Which two of the following items are limitations of public key distribution in asymmetric cryptography without using PKI? (Choose two) A. It has a more complex key distribution and management than symmetric cryptography. B. It is susceptible to man-in-the middle attacks. C. It cannot provide confidentiality. D. Out-of-band verification does not scale.
Page 54 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: B, D Question: 155 If a phone has a certificate to get an encrypted configuration file, which actions should be taken? (Choose two) A. The Cisco Unified Communications Manager TFTP server encrypts the key that it used for the asymmetric encryption of the configuration file content with the public key of the IP phone. B. The receiving phone uses its private key and decrypts the asymmetrically encrypted key that was attached to the configuration file. C. The receiving phone need to know the key that was used for the encryption and the key has to be manually entered into the phone by the administrator. D. The Cisco Unified Communications Manager TFTP server makes the asymmetrically encrypted configuration file available for download. Answer: A, B Question: 156 There are two basic techniques for encrypting information: symmetric encryption and asymmetric encryption. When distributing a symmetric key from one user to another by use of asymmetric encryption, which descriptions is correct? (Choose two) A. User A generates the symmetric key. B. User A encrypts the symmetric key using the private key of User A. C. User B decrypts the symmetric key using his private key. D. User B encrypts the symmetric key using the public key of User A. Answer: A, C Question: 157 Which two of the following items are features of the CAPF? (Choose two) A. The CAPF can never be the PKI root B. The CAPF can issue proxy enrollment requests to an external CA. C. The CAPF can issue certificates on its own. D. CAPF-issued certificates are always lowest priority. Answer: B, C Question: 158 When increasing a secure SRST gateway into the Cisco Unified Communications Manager configuration, which description regarding the process of certificate usage with secure SRST is correct? (Choose two) A. When an IP phone registers with the gateway. They exchange certificates and both devices verify the other's certificate signature. B. The Cisco manufacturing and CAPF certificates must be manually copied into the secure SRST gateway configuration. C. Once Verified, the certificate is added to IP phone configuration files. D. Cisco Unified Communications Manager obtains the gateway's certificate and automatically verifies it. The process of certificate usage with secure SRST Answer: B, C

Page 55 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 159 Assume that CAC is configured with an H.323 gatekeeper. There are two zones and four commands. Two zones: ClusterA and ClusterB Four commands: Bandwidth interzone default 64 Bandwidth interzone zone ClusterB 32 Bandwidth session default 128 Bandwidth total zone ClusterB 304 For the following call scenarios, which one will not produce denied calls? A. Tree G.729 calls between ClusterA and ClusterB B. One G.729 call between ClusterA and Cluster,two G.711 calls and four G.729 calls within ClusterB. C. Two G.729 calls between ClusterA and ClusterB and five G.711 calls within clusterA D. Four G.729 calls within ClusterA and G.711 call between ClusterA and ClusterB Answer: C Question: 160 You are asked to fly from America to Europe on business, and you would like to use the phone settings from the remote site, what must you own? A. Different physical location B. Different DMG as his home DMG C. Same DMG as his home DMG D. Same physical location Answer: B Question: 161 You have a H.323 network and want to limit the bandwidth at HQ to 128 kbp and bandwidth from HQ to remote sites to 256kbps. (Choose two) A. Bandwidth interzone zone HQ 256 B. Bandwidth session 128 C. Bandwidth session zone HQ 128 D. Bandwidth default 128 E. Bandwidth total 256 Answer: A, C Question: 162 SRTP is a security profile for RTP that adds confidentiality, message authentication, and replay protection to that protocol. SRTP uses which of the following encryption protocol? A. IPSec B. 3DES C. AES D. CUSE Answer: C

Page 56 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 163 Refer to the following options, which is necessary for CTL client? A. Tokens B. CTL provider C. Cisco Unified CallManager D. TFTP service Answer: A Question: 164 Automated alternate routing (AAR) provides a mechanism to reroute calls through the PSTN or other network by using an alternate number when Cisco Unified Communications Manager blocks a call due to insufficient location bandwidth. When will AAR be used? A. From a remote router in SRST mode B. Centralized C. Decentralized D. Centralized using CTI Answer: B Question: 165 A Media Termination Point (MTP) software device allows Cisco CallManager to relay calls that are routed through SIP or H.323 endpoints or gateways. Refer to the following items, which can be used as a media termination point? A. Hardware transcoder B. DTMF relay C. Music on hold server D. Software conference bridge Answer: A Question: 166 Trivial File Transfer Protocol (TFTP) is a file transfer protocol, with the functionality of a very basic form of File Transfer Protocol (FTP). TFTP images can be encrypted by which of the following services? A. Cisco TFTP B. Cisco Messaging Interface C. Cisco CTI Manager TFTP images D. Cisco CTL Provider Answer: A Question: 167 CAPF is short for Certificate Authority Proxy Function? User intervention will be needed by which CAPF mode? A. Authentication String B. Existing Certificate (Precedence to LSC) C. Existing Certificate (Precedence to MIC) D. CAPF never requires user intervention

Page 57 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: A Question: 168 POTS Dial Peer refers to the dial peer connected via a traditional telephony network (POTS). Which commands can be used to troubleshoot a POTS dial-peer that fails to work? (Choose three) A. show ccm-manager B. show gatekeeper endpoints C. show dial-peer voice summary D. show voice port 1/0 Answer: A, C, D Question: 169 You are the network technician of your company. And you company has a centralized Cisco Unified CallManager deployment, with SRST implemented on MGCP gateways at the remotes sites. The WAN link to Boston has failed. All phones in Boston have registered to the SRST gateway and can call each other internally, but all outside calls fail. What is the most likely solution to the problem based on the following information?

A. Enable the outgoing POTS dial peer with the no shutdown command B. Disable the outgoing POTS dial peer with the no shutdown command C. Call the phone provider and report that the PRI link is down D. Configure MCGP fallback on the gateway Answer: D
Page 58 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 170 You are the network technician of your company. On a router running Cisco IOS version 12.3(14)T, an auto-attendant Tcl script is loaded and a warning message is displayed, stating that the operator parameter has not been registered. Based on the following information, can you tell me what action will you take next? 2811(config-app)#service aa flash:its-cisco.2.0.1.0.tcl 2811(config-app-param)# *sep 20 17:24:11.545 //-1//hifs:/hifs_ifs_cb: hifs ifs file read succedded. size=6627,url=flash:its-cisco.2.0.1.0.tcl *sep 20 17:24:11.549 //-1//hifs:/hifs_free_idata: hifs_free_idata: 0x48CA4354 *sep 20 17:24:11.549 //-1//hifs:/hifs_hold_idata: hifs_hold_idata: 0x48CA4354 2811(config-app-param)#param operator 5000 warning:parameter operator has not been registered under aa namespace 2811(config-app-param)# A. You should do nothing, the warning may be ignored B. You should register the application with the gatekeeper C. You should register the application parameters with the gatekeeper D. You should register the application parameters with the application Answer: A Question: 171 Tail-End Hop-Off (TEHO) allows a company to reduce its long-distance toll charges .You are the IP Telephone Manger in Company.com. Which two dial plan components are required to implement TEHO? A. Network bandwidth B. Path selection C. Class of Service D. Digit manipulation Answer: B, D Question: 172 Which Call Admission Control method can be used for intercluster calls? A. Resource Reservation Protocol B. Gatekeeper resource availability indication C. Cisco CallManager locations D. Gatekeeper zone bandwidth Answer: D Question: 173 Which debug command can be used to troubleshoot an issue with a TCL sript? A. debug tcl script B. debug call script C. debug custom script D. debug voice application Answer: D
Page 59 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 174 How are Cisco Unified CallManager location parameters used? A. Assign directory numbers to devices as they connect to the IP telephony network. B. Specify the bandwidth used for audio and video calls. C. Implement call admission control in a centralized call processing deployment. D. Provide alternate call routing when the primary call path is unavailable. Answer: C Question: 175 The ABC Company Corporation is experiencing poor, choppy audio quality on voice calls placed across their WAN link to and from Madison. What can be done to the Location parameter for Madison to help alleviate this problem? A. Nothing, the audio bandwidth Location parameter for Madison is not related to the problem. B. Increase the audio bandwidth setting in the Location configuration window for Madison. C. Decrease the audio bandwidth setting in the Location configuration window for Madison. D. Remove the audio bandwidth parameter in the Location configuration window for Madison. Answer: C Question: 176 What is the impact of setting an RSVP policy per location pair with a default interlocation RSVP service policy? A. The default interlocation RSVP service policy will be overridden B. An RSVP mandatory mid-call retry counter will be added to calls that encounter mid-call retry errors C. Additional bandwidth capacity will be added to the default interlocation RSVP service policy D. The RSVP policy will only be associated with one type of call; for example, if it is associated with video calls, audio calls will not be impacted Answer: A Question: 177 What is the function of Cisco Unified CallManager Regions? A. To assign directory numbers to devices as they connect to the IP telephony network B. To implement call admission control in a centralized call processing deployment C. To provide alternate call routing when the primary call path is unavailable D. To specify the codec used for audio and video calls Answer: D Question: 178 For phone hardening tasks, which two statements are accurate? (Choose two.) A. By default, Cisco Unified CallManager disables the PC port on all Cisco IP phones that have a PC port. It is possible to enable the PC Port setting in the Phone Configuration window of Cisco Unified CallManager Administration. B. Disabling PC voice VLAN access will cause packets received from the PC port that uses the voice VLAN tag to drop.

Page 60 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

C. Disabling settings access prohibits access to all the options that are normally displayed when the Settings button on the phone is pressed. D. Disabling settings access automatically sets the current Contrast, Ring Type, Network Configuration, Model Information, Status, and Volume settings to the default for that phone. Answer: B, C Question: 179 Which two statements about PKI topologies in Cisco IP telephony are true? (Choose two.) (Source: Understanding Cisco IP Telephony Authentication and Encryption Fundamentals) A. MICs are self-signed by the IP phone. B. Cisco Unified IP Phone 7940, 7960, and 7970 models can have MICs and LSCs. C. The CAPF has a self-signed certificate. D. Cisco Unified IP Phone 7940, 7960, and 7970 models can have only LSCs. Answer: C, D Question: 180 When using a manual authentication string to install a certificate for the first time, what is the correct order? 1. A Reset the IP phone 2. Set Authentication Mode to By Authentication String. 3. Set Certificate Operation option to Install/upgrade. 4. The user has to enter the authentication string. 5. The certificate is issued 6. The user initiates installation of the certificate. A. 1-5-4-2-3-6 B. 3-2-1-6-4-5 C. 2-4-1-6-5-3 D. 1-5-3-4-2-6 Answer: B Question: 181 What does the icon of a video camera on the Cisco IP phone screen status line mean? (Source: Configuring Cisco Unified Video Advantage) A. The Cisco VT Camera is connected to the PC, and the PC is connected to the Cisco IP phone. B. The Cisco IP phone has web access. C. The Cisco IP phone is configured with video capabilities. D. The Cisco IP phone is receiving a video call. Answer: C Question: 182 As an experienced technician, you are responsible for infrastructure design and global configuration changes. In order to provide Call Admission Control, you would like to configure a gatekeeper. The maximum bandwidth within the Los Angeles zone for a single session is 128 kb/s, while between the Los Angeles zone and any other zone the maximum bandwidth is 256 kb/s. To implement the requirements, which two of the following commands will you add to the configuration? (Choose two) A. bandwidth total default 256
Page 61 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. bandwidth session zone la 128 C. bandwidth default 128 D. bandwidth interzone la 256 Answer: B, D Question: 183 When configuring a Cisco Unified Communications Manager cluster for security, which of the following best describes the correct task steps? A. Enable services, set cluster to secure mode, create a signed CTL, deploy certificates to the IP phones,and set the device security mode. B. Enable services set cluster to secure-only-mode, create a signed CTL, and deploy certificates to the IP phones C. Enable services,set cluster to mixed mode, create a signed CTL, and deploy certificates to the IP phones. D. Enable extended services, set cluster to authenticated or encrypted mode, create a signed CTL, and deploy certificates to the IP phones. Answer: C Question: 184 Automated alternate routing (AAR) provides a mechanism to reroute calls through the PSTN or other network by using an alternate number when Cisco Unified Communications Manager blocks a call due to insufficient location bandwidth. AAR supports which two call scenarios?(Choose two.) A. Calls from remote sites where SRST is activated B. Calls with CTI route points as the origin or destination of calls C. Calls originating from an IP phone within one location which terminates at an IP phone within another location D. Calls incoming through a gateway device within one location which terminates at an IP phone within another location Answer: C, D Question: 185 As an experienced technician, you are responsible for Technical Support in your company. A customer would like to know what the purpose of Automated Alternate Routing (AAR) is and what type of call processing AAR can be applied to. How will you reply? (Choose one purpose and one call processing type) A. allows calls to be rerouted through the PSTN when the IP WAN fails or the Cisco Unified Communications Manager becomes unavailable B. allows calls to be rerouted through the PSTN by using an alternate number when Cisco Unified Communications Manager blocks a call due to insufficient location bandwidth C. single site call processing D. centralized call processing Answer: B, D Question: 186 A Media Termination Point (MTP) software device allows Cisco CallManager to relay calls that are routed through SIP or H.323 endpoints or gateways. Which description below is correct about a Media Termination Point?(Choose one.)
Page 62 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. A Media Termination Point corrects a mismatch in DTMF transport types when using Delayed Offer for inbound SIP calls. B. A Media Termination Point is an entity that accepts two full-duplex G.711 streams. It bridges the media streams together and allows them to be set up and torn down independently. C. A hardware Media Termination Point can be used to transcode a-law to mu-law and vice versa, but both connections must utilize the same packetization periods. D. When using H.323 Fast Start, for inbound and outbound Fast Start, a Media Termination Point is required. Answer: B Question: 187 You are a network technician of your company. Your company uses 4-digit extensions. All employees should dial the intersite access code '8' followed by the 3-digit site code and 4-digit extension of the phone they want when they make an internal call between sites. Phone_A is in partition Branch1 with a CSS named BR1_External. Which element of the route plan will be matched if a user dials 85014532 from Phone_A?(Choose one.)

A. Route Pattern 8501.XXXX in the partition Gateway B. The phone with extension 4532 in partition Branch1 C. The phone with extension 4532 among the partition HQ_Phones D. Translation Pattern 85XX in the partition Intersite Answer: D Question: 188 Each Cisco Unified Communications Manager cluster can support up to 30,000 users. A remote site disconnected to the centralized Cisco Unified Communications Manager cluster. The remote site H.323 gateway is configured to support SRST. Which three options are correct about SRST?(Choose three.) A. The remote site IP phones initiate registration with the SRST gateway.
Page 63 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

B. The gateway sends Keepalives to Cisco Unified Communications Manager to determine when connectivity is restored. C. The IP phones send Keepalives to Cisco Unified Communications Manager to determine when connectivity is restored. D. The IP phones re-register with Cisco Unified Communications Manager when they see responses to the Keepalives. Answer: A, C, D Question: 189 You are the network administrator of your company.You were tasked with testing a new implementation of Cisco Unified Communications Manager Extension Mobility.When you pressed the Services button on the phone to log in to Cisco Unified Communications Manager Extension Mobility Service, the user's IP phone displayed the following message: "To set up speed dials and other services for your phone, please go to https://ccm_ip@/ccmuser/showHome.do" Why?(Choose one.) A. The administrator forgot to subscribe the IP phone to Cisco Unified Communications Manager Extension Mobility Service. B. The IP phone user needs to go into ccmuser and setup speed dials in order for Cisco Unified Communications Manager Extension Mobility to work. C. The administrator did not associate the User Device Profile with Cisco Unified Communications Manager Extension Mobility Service. D. The Cisco Unified Communications Manager Extension Mobility checkbox was not selected for that particular phone. Answer: A Question: 190 Assume that you are a network technician. Your task is to ensure a roaming device inherits the roaming sensitive and Device Mobility settings from the roaming device pool. Which two requirements should be satisfied?(Choose two.) A. Device Mobility Group after roaming is different than device's home Device Mobility Group. B. Physical Location after roaming is different than device's home Physical Location. C. Physical Location after roaming is the same as the device's home Physical Location. D. Device Mobility Group after roaming is the same as the device's home Device Mobility Group. Answer: B, D Question: 191 Look at the following descriptions seriously. Which two are correct about transcoder? (Choose two.) A. Transcoders convert lower bit rate streams to higher bit rate streams. B. Transcoders may operate as a Media Termination Point when the codecs are of the same sampling rate but use different codec types. C. Transcoders can only connect two streams of the same codec type that use different sampling rates. D. Transcoders can convert an input stream of one codec to an output stream that uses a different codec type. Answer: B, D

Page 64 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 192 Which one of the following descriptions is correct about locations based CAC?(Choose one.) A. It is a purely logical assignment and does not reflect the actual topology or the actual bandwidth available. B. Each device may have more than one location assigned. C. Cisco Unified Communications Manager uses an arbitrary bandwidth value for each location. D. Locations based CAC is used to determine the codec used between sites. Answer: A Question: 193 Which one of the following services, if configured accurately in Enterprise Parameters, allows the phone configuration files to be encrypted?(Choose one.) A. Cisco CTL Client Service B. Cisco Unified Communications Manager Service C. Cisco IP Voice Media Streaming App Service D. Cisco TFTP Service Answer: D Question: 194 In an IP telephony network,if you want to use the Cisco CTL client to activate security effectively, which of the following is a must?(Choose one.) A. IPSEC B. Security Tokens C. Secure SRST D. H.323 gateway Answer: B Question: 195 A branch site with an H.323 gateway has lost connectivity to the main site. Click the steps on the above for initiating SRST and returning to normal operation and drop them in the correct on the below. Not all steps apply.

Page 65 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 196 What is the correct order for secure conferencing configuration up to the actual addition of the conference bridge in CUCM? 1. Configure a secure conference media resource and associate it with the certificate. 2. Export CUCM certificate. 3. Obtain a certificate for the secure conference media resource. 4. Add downloaded CUCM certificates to the Cisco IOS router
Page 66 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

5. Export the CA's certificate to the secure conference media resource. 6. Add downloaded CA certificates to CUCM servers. A. 3-2-5-6-1-4 B. 3-1-2-4-5-6 C. 2-1-4-5-3-6 D. 2-4-1-5-3-6 Answer: B Question: 197 Choose the most appropriate definition for each cryptography service. 1. Data No repudiation 2. Data Integrity 3. Data Confidentiality 4. Data Authenticity (I). Provides privacy by ensuring that messages can be read only by the receiver. (II). Ensures messages were not altered in transit. (III).Guarantees the message comes from the source that it claims to come from. (IV).Enable the sender of a message to be uniquely identified. A. 1-(II),2-(III),3-(I),4-(IV) B. 1-(IV),2-(II),3-(I),4-(III) C. 1-(II),2-(I),3-(III),4-(IV) D. 1-(IV),2-(III),3-(I),4-(II) Answer: B Question: 198 Look at the following options, and then classify them into Symmetric and Asymmetric. 1. Slow 2. Each entity owns its pair of keys. 3. Fast. 4. Same key encrypts and decrypts 5. Sender and receiver key must be kept secret. 6. Only the decryption key must be kept secret (I) Symmetric (II) Asymmetric A. (I)-2,3,6;(II)-1,4,5 B. (I)-3,4,5;(II)-1,2,6 C. (I)-2,4,6;(II)-1,3,5 D. (I)-2,4,5;(II)-1,3,6 Answer: B Question: 199 What is the correct sequence for becoming part of a trust system? 1. The trusted introducer verifies the received information and then signs the public keys. 2. The trusted introducer sends signed certificates to the entities. 3. All end users request a signed certificate from the trusted introducer. 4. The entities exchange their public keys.
Page 67 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. 3-2-1-4 B. 3-1-2-4 C. 2-1-4-3 D. 2-4-1-3 Answer: B Question: 200 Cisco Unified Communications Manager is an enterprise-class IP telephony call-processing system that provides traditional telephony features as well as advanced capabilities, such as mobility, presence, preference, and rich conferencing services. Look at the following security threats carefully; choose the most appropriate Cisco Unified Communications Manager security feature to mitigate each threat? 1. Loss of privacy 2. Denial of service 3. Loss of integrity 4. Impersonation (I)Device authentication (II)Encrypted media (III)Authenticated packets (IV)Device hardening A. (I)-2 ;( II)-1 ;( III)-3 ;( IV)-4 B. (I)-4 ;( II)-1 ;( III)-3 ;( IV)-2 C. (I)-2 ;( II)-1 ;( III)-3 ;( IV)-4 D. (I)-4 ;( II)-2 ;( III)-1 ;( IV)-3 Answer: B Question: 201 During the configuration of SIP digest authentication, the correct sequence of actions is: 1. Choose the digest user in the Phone Configuration. 2. Configure the digest credentials in the End User configuration. 3. Check the Enable Digest Authentication checkbox in a SIP phone security profile. 4. Apply the SIP phone security profile to the phone. A. 3-2-1-4 B. 3-4-2-1 C. 2-1-4-3 D. 2-4-1-3 Answer: B Question: 202 Each RSVP message must be properly handled by each RSVP protocol module according to node's position and node type. Place each RSVP message into its corresponding feature. 1. Path message. 2. Reservation-request error message. 3. Teardown message. 4. Reservation-request message. (I)Travels toward the receiver and is routed hop by hop using the reservation state.
Page 68 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

(II)Removes the path and reservation state without waiting for the cleanup timeout period. (III)Follows in the reverse direction to data packets all the way to the sender hosts. (IV)Stores path state in each node. A. (I)-2 ;( II)-1 ;( III)-3 ;( IV)-4 B. (I)-2 ;( II)-3 ;( III)-4 ;( IV)-1 C. (I)-3 ;( II)-4 ;( III)-1 ;( IV)-2 D. (I)-3 ;( II)-2 ;( III)-1 ;( IV)-4 Answer: B Question: 203 In the process of AAR configuration, you should take the following actions in which order? 1. Configure partitions and CSSs. 2. Configure AAR groups. 3. Configure AAR service parameters. 4. Configure phones for AAR A. 3-2-1-4 B. 3-1-2-4 C. 2-1-4-3 D. 2-4-1-3 Answer: B Question: 204 You are a network technician of your company. Your company wants to implement TEHO in its dial plan. Which one of the following tables will provide the most important information for this plan? (Choose one.)

Page 69 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Page 70 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer: Pending Question: 205 Cisco Unified Communications Manager is an enterprise-class IP telephony call-processing system that provides traditional telephony features as well as advanced capabilities, such as mobility, presence, preference, and rich conferencing services. Drag the Cisco Unified Communications Manager configuration option on top to the type of transformation mask at the bottom it applies.

Answer:

Question: 206 The list on top shows pairs of gateway signaling protocols and PSTN trunk types.Each gateway is SRST gateway. Drag each item from the list on top to the correct category at the bottom according to whether active calls to or from the PSTN can be preserved or will be dropped when the gateway falls over to SRST mode.

Page 71 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Question: 207 The list on the left depicts some characteristics, while the list on the right includes some features. Drag the characteristic on the left to its proper location on the right.

Page 72 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Answer:

Page 73 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

Question: 208 Click the route pattern wild card description of the left and drag it to the wild card it describes on the right. Not all apply.

Answer:

Question: 209 The Public Key Infrastructure (PKI) is a set of hardware, software , people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. What is the correct relationship between PKI entities and their corresponding descriptions? 1. CA 2. PKI users 3. Self-signed certificate. 4. Certificate (I) A document that binds together the name of the entity and the public key for the entity that has been signed by the CA. (II) A certificate where the subject of the certificate is also the signer of the certificate. (III) Trusted third party that signs the public keys of all end entities. (IV) A member of the PKI that has a public and private key pair.

Page 74 of 75

Exam Name: Exam Type: Exam Code:

Implementing Cisco Unified Communications Manager Part 2 Cisco 642-456 Total Question

209

A. (I)-2 ;( II)-1 ;( III)-3 ;( IV)-4 B. (I)-4 ;( II)-3 ;( III)-1 ;( IV)-2 C. (I)-2 ;( II)-1 ;( III)-4 ;( IV)-3 D. (I)-4 ;( II)-1 ;( III)-2 ;( IV)-3 Answer: B

End of Document

Page 75 of 75

S-ar putea să vă placă și