Download New Latest (May) Cisco 642-447 Actual Tests 171-180

Ensurepass

 

QUESTION 171  (Topic 8)

 

What causes an IP phone to register with the SRST router when the IP WAN fails?

 

A.

The IP WAN interface on the SRST router goes down and triggers an SRST operation.

B.

The IP phone loses keepalives from the Cisco Unified CallManager and reregisters with

 

 

the SRST.

C.

The SRST sends an INVITE message to the IP phone when the IP WAN fails.

D.

The SRST router stops receiving keepalives from the Cisco Unified CallManager and falls back to the SRST

 

Answer: B

 

 

QUESTION 172  (Topic 8)

 

Which two are requirements for configuring a gatekeeper-controlled intercluster trunk? (Choose two.)

 

A.

The assigned name must be unique within the cluster.

B.

The Cisco Unified CallManager group in the assigned device pool will determine which Cisco Unified CallManager systems register with the gatekeeper.

C.

RSVP must be enabled to provide CAC between clusters.

D.

The gatekeeper must be defined in Cisco Unified CallManager before the intercluster trunk is added

 

Answer:
AD

 

 

QUESTION 173  (Topic 8)

 

How does the Cisco Unified CallManager use RSVP?

 

A.

it uses RSVP reservations to request double the bandwidth so calls can flow in both directions

B.

it uses the RSVP-configured bandwidth between sites as a method of determining if there is sufficient bandwidth for a call

C.

it uses an RSVP-enabled infrastructure and an RSVP agent controlled by Cisco Unified CallManager to request a bandwidth reservation from the network in order to place a call

D.

it initiates RSVP reservations from the Cisco Unified CallManager server, which is an active participant in the reservation process

 

Answer: C

 

 

QUESTION 174

DRAG DROP  (Topic 8)

 

 

You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in trunk types.

 

Match the proper trunk type with appropriate use.

 

clip_image001

Answer:

clip_image002

 

Topic 9, DRS

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 175  (Topic 9)

 

What is the process used to restore an entire cluster in the event of a catastrophic failure?

 

A.

Restore the first node by doing a fresh install, restore the first node database from DRS, and then restore the subsequent nodes from the DRS backup location.

B.

Restore the first node from tape or SFTP and then restore each subsequent node.

C.

Restore the first node and then perform a database push to the subsequent nodes in the cluster.

D.

Restore all the nodes in the cluster by means of a fresh install and then restore the features and subcomponents to each server by means of DRS.

 

Answer: A

Explanation:Disaster Recovery System Administration Guide

Before you restore a cluster, make sure that all nodes in the cluster are up and communicating with the first node. You must carry out a fresh install for the nodes that are down or not communicating with first node at the time of the restore. Restoring the first node restores the whole cluster database. This may take up to several hours based on number of nodes and size of database being restored. If a subsequent node is down or not connected to the cluster during the cluster restore, the database component restore will skip that node and proceed with the next one. You must carry out a fresh install of Cisco Unified Communications Manager on these subsequent nodes.

You can restore the whole cluster as a single operation. The first node and the subsequent nodes do not necessarily need to be restored in two separate operations.

 

 

QUESTION 176  (Topic 9)

 

How many backup sessions can be active at one time in the Disaster Recovery System?

 

A.

two, one automatic incremental and one scheduled automatic full backup

B.

one, either automatic or manual

C.

two, one automatic and one manual backup

D.

three, one scheduled automatic incremental, one scheduled automatic full backup and one manual backup

 

Answer: B

Topic 10, Cvoice

 

 

QUESTION 177  (Topic 10)

 

In a centralized call-processing solution, there are five sites connected through an IP WAN. To optimize the utilization of the IP WAN, CAC needs to be implemented. How should CAC be implemented?

 

A.

use a gatekeeper to control allocated bandwidth properly

B.

use locations CAC with a single location

C.

use a gatekeeper and Cisco Unified Border Element to provide CAC to sites that use a combination of SIP and MGCP gateways

D.

use a gatekeeper to only control those locations that use H.323 gateways and a Cisco Unified Border Element to control those sites that use MGCP or SIP gateways

E.

use locations CAC with five locations in addition to Hub none

 

Answer: E

Explanation: Incorect answer : ABCD

Explanation : A location setting of Hub_None means that the locations feature does not keep

track of the bandwidth that this annunciator consumes Link :

http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/8_5_1/ccmcfg/b06ctirp.html

 

 

QUESTION 178  (Topic 10)

 

abc.com’s Bicycles has three manufacturing plants and 145 retail stores. Each of the manufacturing plants has a Cisco Unified CallManager cluster. The retail stores use a mix of Cisco Unified CallManager Express and key systems with gateways. What is the recommended trunk type to use on the Cisco Unified CallManager clusters for full intersite calling capability?

 

A.

gatekeeper-controlled interclustertrunks

B.

gatekeeper-controlled H.225 trunks

C.

non-gatekeeper-controlled intercluster trunks

D.

SIP trunks

 

Answer: B

 

 

QUESTION 179  (Topic 10)

 

A dial peer is configured with an outgoing COR list. Which two conditions must be met for calls matching this outbound dial peer to be blocked? (Choose two.)

 

A.

An incoming COR list must be configured on the matched inbound dial peer.

B.

An incoming COR list must be configured on the matched outbound dial peer.

C.

The outgoing COR list must be a superset of the incoming COR list.

D.

The incoming COR list and the outgoing COR list must contain the same members.

E.

The outgoing COR list must be a subset of the incoming COR list.

 

Answer: AE

 

 

QUESTION 180  (Topic 10)

 

What is the impact of setting an RSVP policy per location pair with a default interlocation RSVP service policy?

 

A.

the default interlocation RSVP service policy will be overridden

B.

an RSVP mandatory mid-call retry counter will be added to calls that encounter mid-call retry errors

C.

additional bandwidth capacity will be added to the default interlocation RSVP service policy

D.

the RSVP policy will only be associated with one type of call; for example, if it is associated with video calls, audio calls will not be impacted

 

Answer: A

 

Free VCE & PDF File for Cisco 642-447 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …