Official 2014 Latest Cisco 350-030 Dump Free Download(191-200)!

QUESTION 191
Integrity, authentication, and encryption are some of the security features that are supported on Cisco Unified Communications Manager and IP phones. Which of these describes an integrity threat?

A.    modification of call-processing signals between Cisco Unified Communications Manager and IP phones
B.    man-in-the-middle attacks
C.    phone and server identity theft
D.    TFTP file manipulation
E.    unauthorized capturing and decoding of voice signaling packets

Answer: D

QUESTION 192
Which of the following three messages could be sent by the UAC in response to the 180 Ringing? (Choose three.)

A.    PR ACK
B.    ACK
C.    BYE
D.    CANCEL
E.    INVITE

Answer: ABD

QUESTION 193
Which signaling method cannot solve the FXO disconnect problem?

A.    power denial
B.    tone-based supervisory disconnect
C.    pulse dial
D.    ground-start signaling
E.    battery reversal

Answer: C

QUESTION 194
Which two telephony interfaces on a Cisco IOS gateway can be controlled by Cisco Unified Communications Manager using SCCP? (Choose two.)

A.    analog E&M
B.    ISDN BRI
C.    ISDN PRI
D.    analog FXS
E.    analog FXO

Answer: BD

Answer: B

QUESTION 195
CRTP belongs to which Cisco quality of service feature?

A.    classification
B.    congestion management
C.    congestion avoidance
D.    shaping and policing
E.    link efficiency mechanisms

Answer: E

QUESTION 196
You are implementing a Cisco Unified Communications Manager solution utilizing MGCP gateways with PRI interface cards. You are working with your security department, which has a firewall in place between Cisco Unified Communications Manager and the gateway. After the firewall is turned up, your PRI is no longer working. You suspect that the backhaul port has been blocked.
What port does Cisco Unified Communications Manager use between itself and an MGCP gateway for PRI backhaul traffic?

A.    2427
B.    2428
C.    2727
D.    2728
E.    9900

Answer: B

QUESTION 197
Which statement about the H.323 Fast Connect (also known as fast start) procedures is correct?

A.    Fast Connect shortens the call setup time by forcing all H.245 negotiations to take place earlier
during the H.225 message exchanges, setup time by allowing H.323 devices to propose and confirm
master-slave determination in H.225 message exchanges.
B.    Fast Connect shortens the call setup time by permitting calls to bypass certain H.225 steps and move
directly from H.225 setup to H.225 exchanges.
C.    Fast Connect shortens the call setup time by allowing H.323 devices to propose and confirm Open
Logical Channel in H.225 message connect.
D.    Fast Connect shortens the call setup time by allowing H.323 devices to use UDP as a transport
protocol for H.245 negotiation messages, exchanges.
E.    Fast Connect shortens the call reclaiming time that is otherwise used for TCP handshakes.

Answer: A

QUESTION 198
Which of these is not a valid switchback method for SCCP hardware conference bridges?

A.    immediate
B.    never
C.    graceful
D.    guard
E.    uptime

Answer: B

QUESTION 199
Which three statements are true about multicast IGMP snooping? (Choose three.)

A.    When a host in a multicast group sends an IGMP leave message, only that port is deleted from the
multicast group.
B.    An IP multicast stream to the IP host can be stopped only by an IGMP leave message.
C.    IGMP snooping does not examine or snoop Layer 3 information in packets that are sent between
the hosts and the router.
D.    When the switch hears the IGMP host report from a host for a particular multicast group, the switch
adds the host’s port number to the associated multicast table entry.
E.    IGMP control messages are transmitted as IGMP multicast packets so that they can be distinguished
from normal multicast data at Layer 2.
F.    A switch that is running IGMP snooping examines every multicast data packet to verify whether it
contains any pertinent IGMP “must control” information.

Answer: ADF

QUESTION 200
What are two advantages of multicast technologies? (Choose two.)

A.    Denial of service attacks in the network are prevented.
B.    They eliminate multipoint applications.
C.    They reduce traffic by delivering a separate stream of information to each corporate recipient or
home environment, which reduces bandwidth
D.    They control network traffic and reduce server and CPU load.
E.    They eliminate traffic redundancy.

Answer: DE

If you want to pass the Cisco 350-030 Exam sucessfully, recommend to read latest Cisco 350-030 Dumpfull version.

clip_image001