Cause all that matters here is passing the Cisco 300 075 dump exam. Cause all that you need is a high score of 300 075 dump Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) exam. The only one thing you need to do is downloading Exambible 300 075 vce exam study guides now. We will not let you down with our money-back guarantee.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 300-075 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 300-075 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/300-075-exam-dumps.html
Q11. What are the two tasks that you must perform to configure the Service Advertisement Framework forwarder in Cisco Unified Communications Manager? (Choose two.)
A. create VPN groups
B. create VPN profiles
C. create a new Service Advertisement Framework security profile
D. set feature configuration parameters of Call Control Discovery
E. configure Service Advertisement Framework forwarder information
F. enable enterprise parameter for Service Advertisement Framework forwarder
Answer: C,E
Q12. Which process can localize a global E.164 with + prefix calling numbers for inbound calls to an IP phone so that users see the calling number in a local format?
A. Calling number localization is done using translation patterns.
B. Calling number localization is done using route patterns.
C. Calling number localization is done by configuring a calling party transformation CSS at the phone.
D. Calling number localization is done by configuring a calling party transformation CSS at the gateway.
E. Calling number localization is done by configuring the phone directory number in a localized format.
Answer: C
Q13. The network administrator at Enterprise X is creating the guidelines for a new IPT deployment consisting of a large number of remote offices. Every user within Enterprise X is assigned a directory number of 5 digits. Which option might cause an issue in a multisite deployment?
A. Overlapping DID ranges are allocated to each site.
B. The maximum number of IP phones are in use at each remote site.
C. MoH cannot be provided for the remote sites.
D. All media streams are necessarily routed through the central office for calls to establish correctly.
Answer: A
Q14. Company X has deployed a VCS Control with a local zone and a traversal client zone. To facilitate external calls, VCS Expressway is deployed and traversal server zone is set up there. Video endpoints inside Company X have registered but are unable to receive calls from outside endpoints. Which option could be the cause of this issue?
A. The access control list on the VCS Control must be updated with the IP for the external users.
B. When a traversal zone is set up on VCS Control only outbound calls are possible.
C. The local zone on the VCS Control does not have a search rule configured.
D. The traversal zone on the VCS Control does not have a search rule configured.
Answer: C
Q15. When you use the Query wizard to configure the trace and log central feature to collect install logs, if you have servers in a cluster in a different time zone, which time is used?
A. TLC adjusts the time change appropriately.
B. TLC uses its local time for all systems.
C. TLC queries for the time zone as part of configuration.
D. TLC produces an error and must be run remotely.
Answer: A
Q16. Which two statements about symmetric encryption are true? (Choose two.)
A. With symmetric encryption, the encryption key equals the decryption key.
B. Symmetric encryption is commonly used to sign asymmetric keys.
C. Symmetric encryption is a good choice for real-time encryption of bulk data.
D. Symmetric encryption uses asymmetric keys.
Answer: A,C
Explanation:
Incorrect Answer: B, D There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption.) in symmetric key As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Link:
http://support.microsoft.com/kb/246071
Q17. An update of the configuration using the Cisco CTL client not needed when _______.
A. a Cisco Unified CallManager has been removed
B. an LSC of the IP phone is upgraded
C. a security token is added to the system
D. an IP address of the Cisco TFTP server has been changed
Answer: B
Explanation:
Incorrect Answer: A, C, D The CTL file contains entries for the following servers or security tokens:
. System Administrator Security Token (SAST)
. Cisco CallManager and Cisco TFTP services that are running on the same server
. Certificate Authority Proxy Function (CAPF) .
. TFTP server(s)
. ASA firewall
Link: http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/security/8_6_1/secugd/secuauth.h tml#wp1028878
Q18. Which two are gatekeeper-controlled trunk options that support gatekeeper call administration control? (Choose two.)
A. H.323
B. H.245
C. H.225
D. intercluster
E. intracluster
Answer: C,D
Q19. Which Cisco IOS command is used for internal SAF Clients to check SAF learned routes?
A. show eigrp address-family ipv4 saf
B. show voice saf routes
C. show voice saf detail
D. show eigrp service-family ipv4 saf
E. show voice saf dndb all
Answer: E
Explanation:
Incorrect Answer: A, B, C, D Router# show voice saf dnDb all Total no. of patterns in db/max allowed : 1/6000 Patterns classified under dialplans (private/global) : 0/1 Informational/Error stats -Patterns w/ invalid expr detected while add : 0 Patterns duplicated under the same instance : 0 Patterns rejected overall due to max capacity : 0 Attempts to delete a pattern which is invalid : 0
Last successful DB update @ 2009:12:14 15:42:45:967 Link:
http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/feature/guide/SAF_FeatureModule.html#wp1202115
Q20. In a node-specific Service Advertisement Framework forwarder deployment model, what is the maximum number of Service Advertisement Framework forwarders that you can assign to a specific node?
A. 1
B. 2
C. 3
D. 4
E. 5
F. 6
Answer: B