Q) The user named Joe Cambers is not able to use Cisco Jabber’s IM or Presence functionality. Which of the following is most likely the reason?
A. The softphone has no SIP profile.
B. The softphone’s profile does not allow CTI control.
C. The SIP trunk to the CUPS server is down.
D. The Cisco Unity Connection server either is down or is not installed.
E. The Cisco Jabber client is configured to require a nonexistent desk phone.
Q) Which of the following fields should you configure to enable calls from this Cisco Jabber client to be rerouted through the PSTN if bandwidth is lacking?
A. AAR Group
C. Rerouting calling Search Space
D. SUBSCRIBE Calling Search Space
E. Use Trusted Relay Point
Q) You want to configure an alerting name that will be displayed on a caller’s IP phone when the recipient’s IP phone is ringing. Which of the following fields in UCM Administration should you edit?
A. the Alerting Name field on the dn configuration page
B. the Alerting Name field on the phone configuration page
C. the Alerting Name field on the end user configuration page
D. the Alerting Name field on the server configuration page
Q) You are editing the user account named jpublic in the Cisco Unity Connection administrative GUI. Which of the following cannot be modified from the Message Settings page?
A. the maximum voice mail message length
B. the voice mail message greeting
C. voice mail message editing
D. the voice mail message language
E. the voice mail message urgency
Q) You want to verify that an IP phone has downloaded a configuration file from a TFTP server. Which of the following would you most likely do on the IP phone?
A. Press settings > Network Configuration, and verify the TFTP server’s IP address.
B. Press settings > Network Configuration, and verify the DHCP server’s IP address.
C. Press settings > Network Configuration, and verify that DHCP is enabled.
D. Press settings > Network Configuration, and verify the VLAN ID.
E. Press settings > Status > Status Messages.
F. Press settings > Status > Network Statistics.
Q) Another administrator modifies the UCM cluster security password by using the CLI. Which of the following is most likely to be affected by this change?
A. encryption of DRS backups that were made prior to the change
B. encrypted communication between DRS Master Agents and Local Agents
C. the addition of new backup devices to a DRS schedule
D. the deletion of old backup devices from a DRS schedule
E. access to network storage location configuration