Download New Latest (May) Cisco 642-447 Actual Tests 181-190

By | May 17, 2015

Ensurepass

 

QUESTION 181  (Topic 10)

 

What is one difference between Cisco inline power and 802.3af PoE?

 

A.

Cisco inline power should only be activated for those ports that require PoE to avoid oversubscription.

B.

You must determine the total number of IP phones the switch can support with 802.3af to avoid oversubscription.

C.

You must specify which set of pins the powered device is going to accept power on for 802.3af.

D.

Cisco inline power provides a variable amount of power by using CDP.

 

Answer: B

 

 

QUESTION 182

DRAG DROP  (Topic 10)

 

You work as a network technician at Abc.com. Your boss, Miss ABC, is interested in CoS values. In this particular scenario a catalyst switch has been configured to trust IP phones. Match the proper Switchassigned CoS Value with appropriate traffic type.

 

clip_image001

Answer:

 

 

clip_image002

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 183  (Topic 10)

 

abc.com Lumber Company phones are configured to use AAR to reroute a call when the call is rejected due to insufficient IP WAN bandwidth. Which AAR configuration parameter will prevent a call originating at a lobby phone from using AAR when CAC rejects the call due to insufficient bandwidth?

 

A.

disabling AAR for the specific DN

B.

changing the AAR Calling Search Space in the IP phone line settings

C.

changing the AAR Group information

D.

changing the AAR External Phone Number masks

 

Answer: B

 

 

QUESTION 184  (Topic 10)

 

You have two clusters with six Cisco Unified CallManager systems in each. How many ICTs must be configured to provide full server redundancy if a gatekeeper is present in the network?

 

A.

4

B.

6

C.

5

D.

1

 

Answer: D

 

 

QUESTION 185  (Topic 10)

 

You need to establish a connection from your Cisco Unified CallManager cluster to a service provider’s registrar server. Which trunk type should you select?

 

A.

intercluster trunk (non-gatekeeper-controlled)

B.

intercluster trunk (gatekeeper-controlled)

C.

H.225 trunk (gatekeeper-controlled)

D.

SIP trunk

 

Answer: D

 

 

QUESTION 186  (Topic 10)

 

What two types of calls can cause the Cisco Unified CallManagerto send an ARQ to a gatekeeper to determine if a call should be routed? (Choose two.)

 

A.

calls routed to SIP gateways

B.

calls routed to H.323 gateways

C.

calls routed over an intercluster trunk

D.

calls routed to MGCP gateways

 

< p style="line-height: normal; margin: 0cm 0cm 0pt; text-autospace: ; cursor: auto; mso-pagination: none; mso-layout-grid-align: none" class="MsoNormal">Answer: BC

Explanation:ARQ not used in SIP or MGCP

 

 

QUESTION 187  (Topic 10)

 

When using 802.3af inline power, what is the default power wattage that the Catalyst switch provides to an IP

 

phone?

 

A.

0 watts

B.

4 watts

C.

7 watts

D.

15.4 watts

 

Answer: D

Explanation:Power classification defines these five classes

?0 (default): 15.4 W reserved

?1:4 V

?2:7 W

?3: 15.4 W

?4: Reserved for future expansion

 

Topic 11, CIPT2 6.0

 

 

QUESTION 188  (Topic 11)

 

Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)

 

A.

digest authentication

B.

https

C.

PKI

D.

TLS

 

Answer: AD

 

 

QUESTION 189  (Topic 11)

 

Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.)

 

A.

the trusted introducer uses the signed certificates of the endpoints that need to communicate

B.

the introducer digitally signs the public key of the user with the public key of the

 

 

introducer to generate a signed certificate

C.

only the public key of the introducer has to be initially known and verified by all other entities

D.

pki uses only a single trusted introducer

 

Answer: CD

Explanation:Chapter 14: Understanding Cryptographic Fundamentals and PKI pg. 374 A PKI does not eliminate the need for authenticity when you exchange public keys in an asymmetric encryption environment, but it solves the scalability issues associated with that process.

A PKI uses the concept of a single, trusted introducer. Instead of securely exchanging all public keys among all devices, only the public key of the trusted introducer has to be securely distributed to all devices. This exchange is usually done by downloading the public key and then verifying it out of band.

 

 

QUESTION 190  (Topic 11)

 

At the very minimum which settings should be set on a Cisco ip phone that is placed in a public Space like a lobby? (Choose two)

 

A.< /p>

Enable GARP

B.

Disable Settings button on the IP phone

C.

Disable PC Port access

D.

disable PC voice VLAN access

E.

Disable Web access on the IP phone

 

Answer: BC

Topic 12, Mixed Questions

 

Free VCE & PDF File for Cisco 642-447 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …