Which of the steps below will be the most help?
A group of Cisco CallManager servers needs to be secured from viruses that may propagate over the network. Which of the steps below will be the most help?
Which types of voice ports allow a small office to provide outbound DNIS and inbound DID?
Which types of voice ports allow a small office to provide outbound DNIS and inbound DID?
What solution will effectively address the concern that software for IP phones might be hacked?
What solution will effectively address the concern that software for IP phones might be hacked?
What does secure RTP authentication provide?
What does secure RTP authentication provide?
Which type of voice port supports immediate-start, wink-start, and delay-start followed by pulse or DTMF tones
Which type of voice port supports immediate-start, wink-start, and delay-start followed by pulse or DTMF tones?
Which two steps should be taken to prevent malicious software from running on Cisco CallManager servers?
Which two steps should be taken to prevent malicious software from running on Cisco CallManager servers? (Select two)
Which two functions are associated with a voice gateway?
Which two functions are associated with a voice gateway? (Choose two.)
Which type of toll fraud is this?
An attacker calls Certkiller from outside, pretending to be an employee working from home, and asks to be transferred to an external number. Which type of toll fraud is this?
Which signaling protocol is appropriate for this situation?
You are configuring a network to support voice to the PSTN. One important aspect to the configuration is to be able to determine the individual slot, subunit, and port number from the gateway endpoint identifier. Which signaling protocol is appropriate for this situation?
Which two of these statements are true once MLA has been enabled on a Cisco CallManager server?
Which two of these statements are true once MLA has been enabled on a Cisco CallManager server? (Choose two)