1. |
Which is the most accurate list of tasks required to configure a Cisco CallManager cluster for security?
- Enable services, set cluster to mixed mode, create a signed CTL, and deploy certificates to the IP Phones
- Enable services, set cluster to secure-only mode, create a signed CTL, and deploy certificates to the IP Phones
- Enable extended services, set cluster to authenticated or encrypted mode, create a signed CTL, and deploy certificates to the IP Phones
- Disable extended services, set cluster to mixed mode, create a signed CTL, and deploy certificates to the IP Phones
- Enable services, set cluster to mixed mode, create a signed CTL, deploy certificates to the IP Phones, and set the device security mode
- Run the auto-secure feature
|
2. |
Which two services must be enabled when configuring a Cisco CallManager cluster for security?
- Cisco CAPF
- Cisco Authority Provider Function
- Cisco CTL Provider
- Cisco CTL Proxy
- Cisco CTL Client Provider
- Cisco Extended Functions
|
3. |
What are the minimum needs for the PC when you are installing Cisco CTL Client?
- Windows 2000 or XP operating system, at least one USB port, Smart Card service enabled
- Windows XP operating system, at least two USB ports, Smart Card service enabled
- Windows 2000 operating system, at least two USB ports, Smart Card service disabled
- Installation on Cisco CallManager publisher server only, two available USB ports, Smart Card service enabled
- Windows 2000 operating system, PCMCIA slot, Smart Card service enabled
- Windows 2000 operating system, at least one USB port, Cisco VT Advantage camera, Smart Card service enabled
|
|
|
4. |
When is update of the configuration using the Cisco CTL client not needed?
- When an LSC of the IP Phone is upgraded
- When a security token is added to the system
- When a Cisco CallManager has been removed
- When an IP address of the Cisco TFTP server has been changed
|
5. |
Which two statements about LSCs are correct?
- On a Cisco IP Phone 7970, a MIC has priority over an LSC.
- On a Cisco IP Phone 7960, an LSC has priority over a MIC.
- The CAPF issues LSCs if used as a CA and MICs if used as a proxy.
- The certificate operation of the CAPF can be set to install, upgrade, or delete.
- The certificate operation of the CAPF can be set to install/upgrade, delete, or troubleshoot.
- CAPF authentication can be configured to be done by authentication string, null string, or existing certificates.
|
6. |
Which two combinations of device security modes and resulting call type are correct?
- Phone 1: Non Secure, phone 2: Authenticated; call: authenticated
- Phone 1: Non Secure, phone 2: Encrypted; call: authenticated
- Phone 1: Authenticated, phone 2: Non Secure; call: nonsecure
- Phone 1: Encrypted, phone 2: Authenticated; call: authenticated
- Phone 1: Authenticated, phone 2: Encrypted; call: encrypted
- Phone 1: Encrypted, phone 2: Non Secure; call: encrypted
|
7. |
Which two of the following options are not search criteria when you are creating a CAPF report?
- Authentication mode
- Certificate operation status
- Device name
- Certificate lifetime
- Authentication string
- Device security mode
|
|
|
8. |
Which two of the following options are not search criteria when you are searching for IP Phones using the Find and List Phones window?
- Authentication mode
- LSC status
- Device name
- Directory number
- Authentication string
- Device security mode
|
9. |
Which phone model does not support phone security options?
- Cisco 7920
- Cisco 7970
- Cisco 7961
- Cisco 7960
|
10. |
Which of the following types of communication cannot be encrypted? (Choose three.)
- Signaling messages between an IP Phone and an SRST gateway
- Calls to other clusters using intercluster trunks
- Calls communicating using a conference bridge
- Calls using a transcoder
|