試験科目:「CCIE Security Exam (4.0)」
問題と解答:全575問 350-018v4難易度

>> 350-018v4難易度

試験科目:「CCIE Collaboration」
問題と解答:全331問 400-051必殺問題集

>> 400-051必殺問題集

試験科目:「Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)」
問題と解答:全68問 300-135回答

>> 300-135回答




NO.1 Which two statements describe security services that are provided by the Phone Proxy function
on a Cisco ASA appliance? (Choose two.)
A. It provides interworking to ensure that the external IP phone traffic is encrypted, as long as the
Cisco Unified Communications Manager cluster runs in secure mode.
B. It is supported only on phones that use SCCP.
C. It is supported on an adaptive security appliance that runs in transparent mode.
D. It supports IP phones that send phone proxy traffic through a VPN tunnel.
E. It proxies phone media so that internal phones are not directly exposed to the Internet.
F. It provides a proxy of phone signaling, with optional use of NAT, to hide the Cisco Unified
Communications Manager IP address from the public Internet.
Answer: E,F

400-051対策   400-051 vue   
TLS Proxy is typically deployed in front of Cisco Unified Communications Manager and other unified
communications application servers that utilize media encryption. TLS Proxy is not designed to
provide remote-access encryption services for remote phones or client endpoints. Other solutions
such as Cisco ASA Phone Proxy or IP Security/Secure Sockets Layer (IPsec/SSL) VPN services are more
appropriate. TLS Proxy is not designed to provide a secure campus soft phone solution where the
requirement is to provide secure data to phone VLAN traversal or for proxying connections to Cisco
Unified Communications Manager.

NO.2 Refer to the exhibit.
How many SIP signaling dialog(s) took place in this SIP message exchange between two SIP user
A. 6
B. 3
C. 5
D. 2
E. 4
F. 1
Answer: F

During the establishment, maintenance and termination of a SIP session, signaling messages are
exchanged between the two SIP endpoints. There are two different kinds of signaling "conversations"
that those messages take part in: transactions and dialogs. A transaction is a SIP message exchange
between two user-agents that starts with a request and ends with its final response (it can also
contain zero or more provisional responses in between). For example, during the termination of a SIP
session, one user releases the call by sending a BYE request and the other party replies back with a
200 OK response. This message exchange is called a transaction. But what happens in the case of the
INVITE request? The establishment of a SIP session starts basically with an INVITE request and is
considered as completed upon the receipt of the ACK. In this case, the transaction starts with the
INVITE request and ends with the 200 OK, so the ACK is not part of the transaction. The ACK can be
considered as a transaction on its own. However, when the final response to an INVITE is not a 2xx
response, then the ACK is considered as part of the transaction. A dialog is a complete exchange of
SIP messages between two user-agents. That means that transactions are actually parts of a dialog.
For example, in the case of a SIP session establishment, a dialog starts with the INVITE-200 OK
transaction, continues with the ACK and ends with the BYE-200 OK transaction. The picture below
depicts the dialog and transactions that take place during the establishment of a SIP session: Note:
There can also be subsequent requests that belong to the same dialog, such as a BYE or a re-INVITE
message. As out-of-dialog requests are considered messages such as an initial INVITE request for a
new session or an OPTIONS message for checking capabilities. There are different SIP
headers/parameters that identify the dialogs and transactions, and they will be analyzed in later
Cisco 400-051 Exam

NO.3 In a Cisco Unified Communications Manager system, which three locations does the TFTP
server search when a device requests a configuration file from a TFTP server? (Choose three.)
A. local disk
B. NFS server
C. FTP server
D. alternate file server
E. load server
F. internal caches
Answer: A,D,F


NO.4 Which two rules apply to MMOH in SRST? (Choose two.)
A. Cisco Unified SRST voice gateway allows you to associate phones with different MOH groups on
the basis of their IP address to receive different MOH media streams.
B. Cisco Unified SRST voice gateway allows you to associate phones with different MOH groups on the
basis of their extension numbers to receive different MOH media streams.
C. A maximum of five media streams are allowed.
D. A maximum of three MOH groups are allowed.
E. Cisco Unified SRST voice gateway allows you to associate phones with different MOH groups on
the basis of their MAC address to receive different MOH media streams.
Answer: B,C


NO.5 Which statement describes how the digit zero is handled in the predefined restriction tables in
Cisco Unity Connection?
A. Zero is listed in the Default Transfer Restriction table.
B. Zero is listed in the Default System Transfer Restriction table.
C. Zero is listed in the Default Out-Dial Restriction table.
D. Zero is listed in the User-Defined and Automatically Added Alternate Extensions Restriction table.
E. Zero is not listed in any default restriction table configuration.
Answer: E

400-051日本語サンプル   400-051ソフトウエア   
When user dials "0", by default Unity Connection treats it as an operator call and does not block "0"
by any restriction table configuration. Only the operator can modify transfer extension associated
with operator call.

NO.6 On a Cisco Unified Communications Manager SIP trunk with a single remote device and
OPTIONS ping feature enabled, which response from the SIP remote peer causes the trunk to be
marked as "Out of Service"?
A. 500 Server Internal Error
B. 406 Not Acceptable
C. 505 Version Not Supported
D. 408 Request Timeout
E. 401 Unauthorized
Answer: D

408 Request Timeout
Couldn't find the user in time. The server could not produce a response within a suitable amount of
time, for example, if it could not determine the location of the user in time. The client MAY repeat
the request without modifications at any later time

NO.7 Which protocol does the Cisco Jabber client use, in conjunction with Cisco IM and Presence, to
deliver enterprise-class instant messaging services?
Answer: C

Many federated IM networks communicate using an open standard, such as Jabber, that leverages
the Extensible Messaging and Presence Protocol (XMPP). Networks using XMPP provide open
communications with other XMPP-based networks.

NO.8 Which two steps must be taken when configuring EMCC? (Choose two.)
A. End users must be configured to only exist in their home cluster.
B. A device pool for EMCC phones must be configured.
C. Define MLPP domains.
D. Certificates from all remote clusters must be imported into each cluster.
E. An SFTP server that all clusters share must be set up.
F. Cross-cluster Enhanced Location CAC must be configured.
Answer: D,E


Related Links:
投稿日: 2016/4/18 18:57:31  |  カテゴリー: Cisco  |  タグ: 350-018v4問題数400-051300-135Cisco