What do users do in order to log on and change phone options?
What do users do in order to log on and change phone options?
What IP phone Softkey would a user press to pick up a call that is coming into a directory number that is assi
What IP phone Softkey would a user press to pick up a call that is coming into a directory number that is assigned to a group call pickup?
How do you configure media resources for a device?
How do you configure media resources for a device?
What are the two levels of MRGL selection and the priority associated with each level?
What are the two levels of MRGL selection and the priority associated with each level? (Choose two)
what should you check if you are having a problem with the message waiting indicators on the phones?
When configuring the Cisco Messaging Interface, what should you check if you are having a problem with the message waiting indicators on the phones?
which Music on Hold source will the PSTN caller hear?
When an IP Phone user places a PSTN caller on hold, which Music on Hold source will the PSTN caller hear?
What is configured in Cisco CallManager for a user to be able to use Cisco IP SoftPhone in first party control
What is configured in Cisco CallManager for a user to be able to use Cisco IP SoftPhone in first party control?
how many concurrent users can Music on Hold support?
A company is deploying Cisco IP Telephony at its headquarters to support 5000 users. It will have a four server cluster; stand-alone publisher, two Primary Cisco CallManagers and a backup Cisco CallManager. Music on Hold is configured on the primary CallManagers for a simplex stream (unicast) environment. The company wants to provide music on hold to all users. Given the configuration described, how many concurrent users can Music on Hold support?
which SDI trace is used to examine the problem?
When troubleshooting a problem with Music on Hold, which SDI trace is used to examine the problem?
Which security solution has most likely been deployed?
The incidence of rogue phones gaining network access has dropped to zero. Which security solution has most likely been deployed?