Dropping Conference Calls

Table of contents:

Review Questions

You can find the solutions to these questions in Appendix A, "Answers to Review Questions."

1.

Which two of the following are typical sources of toll fraud?

  1. Voice mail-to-voice mail transfer
  2. Call Forward All
  3. Transfer from voice mail
  4. Transfer to an internal destination
  5. Transfer to a conference system
2.

When you are restricting external call transfers, which statement is correct?

  1. Route patterns and gateways can be classified as OnNet or OffNet.
  2. Calls must be classified to use call transfer restrictions.
  3. Only restricted OnNet-to-OffNet transfers and OffNet-to-OffNet transfers can be used.
  4. Only OnNet devices must be classified.
3.

Which two service parameters can be configured when using ad hoc conference restrictions?

  1. Never
  2. When First OnNet Party Leaves the Conference
  3. When No OffNet Parties Remain in the Conference
  4. When Conference Creator Drops Out
4.

What is the default value for the Drop Ad Hoc Conference service parameter?

  1. Never
  2. Drop Ad Hoc Conference When Creator Leaves
  3. When No OnNet Parties Remain in the Conference
  4. When No OffNet Parties Remain in the Conference
5.

What is the purpose of FACs?

  1. Time-based call routing
  2. Restricting call routing to destinations based on the time of day
  3. Restricting call routing to destinations based on user codes
  4. Restricting call routing to destinations based on OnNet or OffNet classification
   
6.

Why is it important to block commonly exploited area codes when you want to restrict international calls?

  1. Commonly exploited countries have special premium numbers as country codes.
  2. Commonly exploited countries have special country codes that look like area codes of the United States.
  3. Countries such as the Bahamas can be reached either over the country code or over an area code.
  4. When these numbers are not blocked, they are treated like normal local telephone calls.
7.

What automated method does Cisco support for security updates and hot fixes to the CallManager server?

  1. Receiving e-mail updates from the Cisco CallManager Notification Tool
  2. Downloading updates directly from Microsoft using the Windows Update Services
  3. Using the CSA standalone automatic update feature
  4. Downloading updates directly from Cisco using the automated Cisco Update Services
8.

Which of the following describes the configuration of time-of-day routing?

  1. Create a time period, and then assign the time period to the calling search space.
  2. Create time periods, add the time periods to a time schedule, assign the time schedule to a partition, and assign the partition to a calling search space.
  3. Create time schedules, add the time schedules to a time period, create partitions, assign the partitions to a calling search space, and then assign the time period to the calling search space.
  4. Create a time period, add the time period to a time schedule, create partitions, assign the partitions to a calling search space, and then assign the time schedule to the calling search space.
9.

Which of the following requires a code to be dialed, which is typically tracked to a specific department or user, before making outgoing calls? (Hint: This code can be used to make all outgoing calls.)

  1. CBC
  2. FAQ
  3. FAC
  4. CMC
   
10.

Which of the following devices can be classified as OnNet or OffNet? (Choose three.)

  1. Route pattern
  2. Route group
  3. Route list
  4. Trunks
  5. Gateways
  6. IP phones

Part I: Cisco CallManager Fundamentals

Introduction to Cisco Unified Communications and Cisco Unified CallManager

Cisco Unified CallManager Clustering and Deployment Options

Cisco Unified CallManager Installation and Upgrades

Part II: IPT Devices and Users

Cisco IP Phones and Other User Devices

Configuring Cisco Unified CallManager to Support IP Phones

Cisco IP Telephony Users

Cisco Bulk Administration Tool

Part III: IPT Network Integration and Route Plan

Cisco Catalyst Switches

Configuring Cisco Gateways and Trunks

Cisco Unified CallManager Route Plan Basics

Cisco Unified CallManager Advanced Route Plans

Configuring Hunt Groups and Call Coverage

Implementing Telephony Call Restrictions and Control

Implementing Multiple-Site Deployments

Part IV: VoIP Features

Media Resources

Configuring User Features, Part 1

Configuring User Features, Part 2

Configuring Cisco Unified CallManager Attendant Console

Configuring Cisco IP Manager Assistant

Part V: IPT Security

Securing the Windows Operating System

Securing Cisco Unified CallManager Administration

Preventing Toll Fraud

Hardening the IP Phone

Understanding Cryptographic Fundamentals

Understanding the Public Key Infrastructure

Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

Configuring Cisco IP Telephony Authentication and Encryption

Part VI: IP Video

Introducing IP Video Telephony

Configuring Cisco VT Advantage

Part VII: IPT Management

Introducing Database Tools and Cisco Unified CallManager Serviceability

Monitoring Performance

Configuring Alarms and Traces

Configuring CAR

Using Additional Management and Monitoring Tools

Part VIII: Appendix

Appendix A. Answers to Review Questions

Index



Authorized Self-Study Guide Cisco IP Telephony (CIPT)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
ISBN: 158705261X
EAN: 2147483647
Year: 2004
Pages: 329

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net