which two methods can be used to help prevent malicious phone attacks?
The Ajax network coordinator is concerned that the IP phones can be targeted for malicious attack. When the security is designed for the IP telephony solution, which two methods can be used to help prevent malicious phone attacks? (Choose two.)
What two things can be done to resolve this solution?
Ajax has contacted its LEC to obtain an additional range of DIDs. Their current DID range is 555- 6000 through 555-6999. The LEC can provide them with an additional range of numbers, 556- 6000 through 556-6999. The LEC is currently sending four digits inbound, so the two DID ranges overlap. What two things can be done to resolve this solution? (Choose two.)
Which option is true regarding the use of a gatekeeper in their network?
You have decided to use the MGCP signaling protocol for the PSTN gateway at Ajax. Which option is true regarding the use of a gatekeeper in their network?
Which two connection types would be applicable for use with the planned contact center?
Ajax needs to provide technical support outside of normal operating hours. They would like to deploy a small test call center to develop the skills necessary to provide phone, chat, and e-mail support. Ajax wants to start with five agents. Which two connection types would be applicable for use with the planned contact center? (Choose two.)
What are four general E911 responsibilities of an enterprise telephony system?
Ajax wants to ensure that their employees are safe and that they comply with the law. What are four general E911 responsibilities of an enterprise telephony system? (Choose four.)
which three things must be verified from the LAN perspective before IP telephony can be deployed?
In a TDM PBXto Cisco Unified Communications Manager migration, which three things must be verified from the LAN perspective before IP telephony can be deployed? (Choose three.)
What information is relevant to choosing an IP telephony centralized call processing model?
What information is relevant to choosing an IP telephony centralized call processing model?