300 075 ciptv2 (11 to 20)

Examcollection 300 075 vce Questions are updated and all 300 075 ciptv2 answers are verified by experts. Once you have completely prepared with our 300 075 pdf exam prep kits you will be ready for the real 300 075 ciptv2 exam without a problem. We have Most recent Cisco 300 075 ciptv2 dumps study guide. PASSED 300 075 pdf First attempt! Here What I Did.


The article at Testaimer.com going over http://www.testaimer.com/300-075-test is very comprehensive.

Q11. What user profile is used to define the settings for a user on login? 

A. Device Profile 

B. Group Profile 

C. Pool Profile 

D. Specific Profile 

Answer:


Q12. What is the purpose of configuring a hardware-based MTP when deploying Cisco Unified Communications Manager? 

A. to allow for supplementary services such as hold, transfer, and conferencing 

B. when you need support for up to 24 MTP sessions on the same server and 48 on a separate server 

C. when you need the ability to grow support by using DSPs 

D. when you want to only use Cisco Unified Communications Manager resources 

Answer:


Q13. Cisco Unified border element is configured to support RSVP-based CAC. When is the RSVP path and reservation message sent and received? 

A. Immediately after the call setup message is received and the reservation message is received after H.245 capabilities negotiation is completed. 

B. The path and reservation messages are sent and received after the H.245 capabilities negotiation is completed. 

C. The path and reservation messages are sent and received immediately after the call setup message is received. 

D. The path is setup once the global command call rsvp-sync is configured. 

Answer:


Q14. Which statement is true regarding the configuration of SAF Forwarder? 

A. In a multisite dial plan, SAF Forwarders may exist in multiple autonomous systems. 

B. The client label that is configured in Cisco Unified Communications Manager must match the configuration on the SAF Forwarder router. 

C. There should not be multiple nodes of Cisco Unified Communications Manager clusters acting as SAF clients. 

D. The destination IP address must match the loopback address of the SAF router. 

Answer:


Q15. Which two options are valid service parameter settings that are used to set up proper video QoS behavior across the Cisco Unified Communications Manager infrastructure? (Choose two.) 

A. DSCP for Video Calls when RSVP Fails 

B. Default Intraregion Min Video Call Bit Rate (Includes Audio) 

C. Default Interregion Max Video Call Bit Rate (Includes Audio) 

D. DSCP for Video Signaling 

E. DSCP for Video Signaling when RSVP Fails 

Answer: A,C 


Q16. Which statement about the host portion format in Cisco Unified Communications Manager URI dialing is false? 

A. The host portion cannot start or end with a hyphen. 

B. The host portion is not case sensitive. 

C. The host portion accepts characters a-z, A-Z, 0-9, hyphens, and periods. 

D. The host portion can have two periods in a row. 

Answer:


Q17. Which two statements about symmetric encryption are true? (Choose two.) 

A. With symmetric encryption, the encryption key equals the decryption key. 

B. Symmetric encryption is commonly used to sign asymmetric keys. 

C. Symmetric encryption is a good choice for real-time encryption of bulk data. 

D. Symmetric encryption uses asymmetric keys. 

Answer: A,C 

Explanation: 

Incorrect Answer: B, D There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) in symmetric key As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Link: 

http://support.microsoft.com/kb/246071 


Q18. Which two statements about SAF service identifier numbers are true? (Choose two.) 

A. They are generated in the format service:sub-service:instance.instance.instance.instance. 

B. They are 16-bit decimal identifiers. 

C. They are generated in the format data-source:sub-service:instance.matrix.fifty.saf. 

D. They are 32-bit decimal identifiers. 

E. They are generated in the format data.saf.cucm-publisher.asf@domain.local. 

F. They are generated in the format telco.cisco.saf-forwader.db.replicate.data.local. 

Answer: A,B 


Q19. Which two configurable options are available to enable Early Offer for calls over a Cisco Unified Communications Manager SIP trunk? (Choose two.) 

A. No Media Termination Point Required 

B. Media Termination Point Required 

C. Accept Audio Codec Preferences in Received Offer 

D. Early Offer support for voice and video calls Mandatory (insert MTP if needed) 

E. Use Trusted Relay Point 

Answer: B,D 


Q20. In a Centralized Call processing architecture, you have deployed Extension Mobility (EM) feature. After the deployment of EM, when one of the end-users tries to login to the IP phone, the Error 25 is displayed on the screen. What three things should you do to resolve this issue? (Choose three.) 

A. upgrade the firmware of the IP Phone to the latest version 

B. activate EM feature service under Cisco Unified Serviceability 

C. associate EM Device profile with the end-user 

D. subscribe the MAC address of the IP Phone to EM Service 

E. update EM Phone Service URL to point to the publisher 

F. subscribe device profile to EM phone service in case the enterprise subscription of EM Service is disabled 

Answer: B,C,D