1. |
B and C Users can exploit the Call Forward All feature (which they can configure through a web interface) and transfer from voice-mail features to make toll calls using the corporate voice network. |
2. |
A To restrict external call transfers (which block OffNet-to-OffNet transfers), route patterns and gateways should be classified as OnNet or OffNet. Route patterns are typically used to restrict outbound calls, whereas gateways are used to restrict incoming calls. |
3. |
A and D By default, the ad hoc conference restrictions are set to Never, which opens the possibility of toll fraud. You can choose to set the restrictions to When Conference Creator Drops Out or When No OnNet Parties Remain in the Conference to restrict this toll fraud method. |
4. |
A By default, the ad hoc conference restrictions are set to Never, which opens the possibility of toll fraud. You can choose to set the restrictions to When Conference Creator Drops Out or When No OnNet Parties Remain in the Conference to restrict this toll fraud method. |
5. |
C Forced Authorization Codes (FACs) allow you to restrict call routing to destinations based on user codes. This is not only useful to prevent toll fraud, but also to determine which users or departments are making toll calls for billing purposes. |
6. |
B Commonly exploited countries have special area codes that look like area codes of the United States. Not all international numbers begin with the 011 identifier (in North America). Because of this, you should be especially careful to restrict international area codes using route patterns. |
7. |
A The most automated process for installing security updates and hot fixes to the CallManager server is e-mail subscription to the Cisco CallManager Notification Tool. The updates must then be manually downloaded and installed. |
8. |
B The correct configuration of time-of-day routing is as follows: create time periods, add the time periods to a time schedule, assign the time schedule to a partition, and assign the partition to a calling search space. |
9. |
D Client Matter Codes (CMCs) are typically used to track calls to a specific department or user. However, they do not give you the varying authorization levels of the FAC feature. |
10. |
A, D, and E By classifying the route patterns, trunks, and gateways as OnNet or OffNet, you can effectively curb OffNet-to-OffNet transfer toll fraud. |
Part I: Cisco CallManager Fundamentals
Introduction to Cisco Unified Communications and Cisco Unified CallManager
Cisco Unified CallManager Clustering and Deployment Options
Cisco Unified CallManager Installation and Upgrades
Part II: IPT Devices and Users
Cisco IP Phones and Other User Devices
Configuring Cisco Unified CallManager to Support IP Phones
Cisco IP Telephony Users
Cisco Bulk Administration Tool
Part III: IPT Network Integration and Route Plan
Cisco Catalyst Switches
Configuring Cisco Gateways and Trunks
Cisco Unified CallManager Route Plan Basics
Cisco Unified CallManager Advanced Route Plans
Configuring Hunt Groups and Call Coverage
Implementing Telephony Call Restrictions and Control
Implementing Multiple-Site Deployments
Part IV: VoIP Features
Media Resources
Configuring User Features, Part 1
Configuring User Features, Part 2
Configuring Cisco Unified CallManager Attendant Console
Configuring Cisco IP Manager Assistant
Part V: IPT Security
Securing the Windows Operating System
Securing Cisco Unified CallManager Administration
Preventing Toll Fraud
Hardening the IP Phone
Understanding Cryptographic Fundamentals
Understanding the Public Key Infrastructure
Understanding Cisco IP Telephony Authentication and Encryption Fundamentals
Configuring Cisco IP Telephony Authentication and Encryption
Part VI: IP Video
Introducing IP Video Telephony
Configuring Cisco VT Advantage
Part VII: IPT Management
Introducing Database Tools and Cisco Unified CallManager Serviceability
Monitoring Performance
Configuring Alarms and Traces
Configuring CAR
Using Additional Management and Monitoring Tools
Part VIII: Appendix
Appendix A. Answers to Review Questions
Index