[Free] 2019(Nov) EnsurePass Cisco 300-070 Dumps with VCE and PDF 41-50

Get Full Version of the Exam

Question No.41

Which three Cisco Unified CallManager configuration steps are required to support third party SIP phones? (Choose three.)

  1. Configure the device in Cisco Unified CallManager.

  2. Change the proxy address in the SIP phone to an IP address or the Fully Qualified Domain Name (FQDN)of Cisco Unified CallManager.

  3. Associate the device with the end user.

  4. Configure the phone with the TLS username and password.

  5. Configure the end user in Cisco Unified CallManager.

  6. Add the MAC address of the Cisco Unified CallManager server to the SIP phone configuration page.

Correct Answer: ACE

Question No.42

When a call is attempted during a particular time of day, what determines the partitions where calling devices search?

  1. time schedules

  2. calling periods

  3. dial schedules

  4. time periods

Correct Answer: A

Question No.43

Which three of these are characteristics of a Cisco Unified Communications Manager software- based Media Termination Point? (Choose three.)

  1. The codec and packetization of both call legs must be identical.

  2. This Media Termination Point type does not require any DSP resources on the Cisco router.

  3. DSP resources are required.

  4. It can provide G.711 mu-law to G.711 a-law conversion and vice versa.

  5. It can provide packetization conversion for a given codec (for example, if one call leg is using a 20-mssampe size, but the other call legis using a 30-ms sample size).

  6. This Media Termination Point type is typically used for RSVP agent configurations or Cisco Unified borderelementmedia flow-through configuration.

Correct Answer: BDE

Question No.44

Which protocol can Cisco Unified Communications Manager not use to monitor the status of the gateway?

A. H.323

  1. SIP

  2. MGCP

  3. SCCP

Correct Answer: A

Question No.45

Which statement regarding Cisco IP voice media streaming application is correct?

  1. It should be activated on the gateway in cluster that supports the TFTP service.

  2. It should be activated on the gatekeeper in cluster that supports the TFTP service.

  3. It should be activated on the node in cluster that does not support the TFTP service.

  4. It should be activated on the node in cluster that supports the TFTP service.

Correct Answer: D

Question No.46

What is the default option for framing when you configure T1 controller?

  1. Super Frame

  2. alternate mark inversion

  3. C.Extended Super Frame

  4. D.cyclic redundancy check 4

  5. E.high-density bipolar 3

  6. F.No-CRC4

  7. G.binary 8-zero substitution

  8. Australia

Correct Answer: CD




Question No.47

You have two groups of managers that need to hold Meet-Me conferences. You want each group to have access to a range of 10 Meet-Me numbers. What are the two best ways to accomplish this? (Choose two.)

  1. Create two different partitions and add both groups of 10 Meet-Me conference numbers to the partitions.

  2. Ensure that the 10 Meet-Me conference numbers overlap with existing ad hoc conferencing numbers.

  3. Create two different groups of Meet-Me conference numbers, add them to the partition, and add the partition to the two manager groups to provide limited access.

  4. Create a different partition for each group of managers and assign a set of 10 Meet-Me conference numbers to each.

  5. Create two groups of 10 Meet-Me conference numbers that do not overlap with any other number in the numbering plan.

Correct Answer: CE

Question No.48

Which type of IOS Conference bridge requires all users to use the same video format in order to participate in a video conference?

  1. Ad Hoc Conferencing

  2. Homogenous Conferencing

  3. HeterogeneousConferencing

  4. Guaranteed Audio Video Conferencing

  5. Meet-Me Conferencing

Correct Answer: B


A homogenous conference refers to one in which participants connect to the ISR G2 with devices that support the same video format attributes (for example, the same codec, resolution, frame rate, and bit rate).

Question No.49

Which of these methods can be used to implement toll-fraud prevention?

  1. drop conferences when only two attendees remain

  2. block on-net to on-net calls

  3. deploy conferencing resources to only those employees that require the service

  4. drop conferences when no on-net party remains

Correct Answer: D

Question No.50

Where do you configure the region for a group of devices?

  1. Common device profile.

  2. Device defaults.

  3. Common device configuration.

  4. Common phone profile.

  5. Device pool.

Correct Answer: E

Get Full Version of the Exam
300-070 Dumps
300-070 VCE and PDF