Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-043" Exam

310-043: Some Important Questions

 

Question 1.
Which file does inetd use for linking service requests with processes to start?

A. /etc/inetd.cfg
B. /etc/default/inet
C. /etc/inet/inetd.conf
D. /etc/init.d/inetinit
E. /var/inet/inetd.conf

Answer: C

Question 2.
In the five layer TCP/IP model, at which two layers does the client-server relationship function? (Choose two)

A. Hardware
B. Internet
C. Transport
D. Application
E. Network interface

Answer: C, D

Question 3.
What does the first field in /etc/inet/services describe?

A. Socket number
B. Network service
C. Remote host name
D. Transmission protocol

Answer: B

Question 4.
Exhibit:



Which host is acting as an intermediate router?

A. samba
B. violet
C. admin-d
D. localhost
E. admin-picc
F. admin-picc3

Answer: B

Question 5.
Which daemon can configure a default router dynamically?

A. rdisc
B. routed
C. in.rdisc
D. in.routed

Answer: C

Question 6.
Which daemon implements RIP?

A. rsh
B. ripd
C. rdisc
D. in.ripd
E. in.rdisc
F. in.routed

Answer: F

Question 7.
Given:
IP address netmask
192.20.20.75 255.255.255.192
• You are adding a "network" specific route.
• Presume the route has been deleted and you are establishing it.
Which command adds a routing table entry with a route mask 255.255.255.192?

A. route -net 192.20.20.64 192.20.20.192
B. route add -netmask 192.20.20.255 192.20.20.75 0
C. route add net 192.20.20.64 192.20.20.75 -netmask 255.255.255.192 0
D. route add net 192.20.20.64 192.20.20.75 -netmask 192.20.255.255
E. ifconfig hme0 inet 192.20.20.64 netmask 192.20.20.192 broadcast 192.20.20.64

Answer: C

Question 8.
A router is refusing to forward IP packets. Snoop has revealed that packets are arriving on its interfaces, but is refusing to forward packets and route them.
Which command should you use to verify that the router is configured (in the kernel) to forward IP packets?

A. ndd -get /dev/udp ip-forward
B. ndd -get /dev/ip ip_forwarding
C. ndd -get ip-forwarding /dev/tcp
D. ndd -set /dev/ip ip_forwarding 1
E. ndd -set /dev/ip ip_forwarding 0

Answer: B

Question 9.
The traceroute command shows routing paths to a given destination. Which protocols are used by this diagnostic tool?

A. TCP + IP TTL
B. SNMP + IP TTL
C. HTTP + IP TTL
D. ICMP + IP TTL
E. SNMP + TCP

Answer: D

Question 10.
Which command is used to start up the NTP daemon?

A. /etc/init.d/ntp start
B. /etc/init.d/ntpd start
C. /etc/init.d/xntp start
D. /etc/init.d/xntpd start

Answer: D

Question 11.
What is the full default path name of the NTP server template file?

Answer: /etc/inet/ntp.server

Question 12.
Which two statements about the named.conf file are true? (Choose two)

A. It allows nslookup to resolve queries.
B. It informs a primary of the addresses of secondary servers.
C. It informs a secondary server of the address of the primary.
D. It informs in.named which zones it supports as a primary or secondary.

Answer: C, D

Question 13.
A DNS server is configured as a secondary server and successfully synchronizes with the primary server when the secondary server is first started. A zone file on the primary server is updated but the secondary server fails to synchronize. The secondary server is rebooted but this fails to help.
Which failure causes this problem?

A. Failure to update the NS record of the updated zone file.
B. Failure to update the time stamp of the updated zone file.
C. Failure to update the serial number of the updated zone file.
D. Failure to update the SOA ttl number of the updated zone file.

Answer: C

Question 14.
Which daemon name is the uppermost in the branch of the DNS tree related to reverse lookups?

A. com
B. net
C. arpa
D. in-addr

Answer: C

Question 15.
Which three are functions of SNMP? (Choose three)

A. Get
B. Set
C. Trap
D. Delete
E. Create
F. Modify

Answer: A, B, C

Question 16.
How do you run DHCP in debug mode on a DHCP server?

A. You kill the DHCP server process then relaunch the server process using the /sbin/dhcpagent-
d2 command.
B. You kill the DHCP server process and set DHCP_DEBUG=true in the dhcp.conf file.
C. You kill the DHCP server process and change the DHCP start script to use the in.dhcp -i
<interface> -d –v command. You then run the DHCP start script.
D. You kill the DHCP server process and change the DHCP start script to include
DHCP_DEBUG=true; export DHCP near the start of the script. You then run the DHCP start
script.

Answer: C

Question 17.
You have a DHCP client on network 192.200.51.0. The DHCP server has the DHCP data in the /var/dhcp directory.
What is the full default path name of the file containing the IP address pool for the client?

Answer: /var/dhcp/192_200_51_0

Question 18.
Two hosts in the same network are connected to different subnets. Which routing method is used to transmit packets between these hosts?

A. None
B. Direct
C. Repeater
D. Indirect
E. Discover

Answer: D

Question 19.
Exhibit: hme0: flags-1000842<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 inet 62.254.198.30 netmask ffffff00 broadcast 62.254.198.255 ether 8:0:20:8e:4f:1c
The hme0 interface on your subnet does not appear to be functioning correctly. The output from ifconfig is shown in the exhibit.
Which statement describes the current configuration of the hme0 interface?

A. The network cable is disconnected.
B. The broadcast address is incorrect.
C. There is a duplicate IP address conflict.
D. The interface is configured, but not enabled.
E. The interface driver is not configured in the kernel.

Answer: D

Question 20.
Which two values are used to calculate the network number? (Choose two)

A. Netmask
B. Subnet number
C. Host IP address
D. Gateway address
E. Host MAC address
F. Broadcast address

Answer: A, C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-531 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-531" Exam

Please forward dump of this

 Please Forward me dump of this above exam urgently 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-297 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-297" Exam

Please send the latest dump!

 Thank you so much for your help! 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-292 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-292" Exam

Please Send me Latest Dump

 Hi, 
Please Send me the latest dumps on 70-292 to sunny_saam2002@yahoo.com
as soon as possible. This friday i am taking the exam.

Thanx


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-806 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-806" Exam

It is the latest dump for IBM users

 Question 1.
Which statement is true about designing highly available infrastructures based on WebSphere Application Server ND V6.1 clusters?

A.A stand-alone server topology provides the greatest amount of process isolation and therefore 
   is the most effective building block in combination with other stand-alone servers for building a 
   highly resilient cluster based infrastructure.
B. A horizontal scaling topology provides the greatest opportunity to implement efficient use of 
    single machine processing power so that should there be a failover in that environment, there  
    will be sufficient capacity available for the remaining nodes to pick up the workload from the 
    failed node.
C. A vertical scaling topology provides the greatest opportunity to implement efficient use of 
    machine processing power so that should there be failover in that environment, there is  
    sufficient capacity available for the remaining cluster members to pick up the workload from the 
    failed cluster member.
D. A horizontal scaling topology provides the greatest amount of process isolation and therefore 
    is the most effective building block in combination with other stand-alone servers for building a  
    highly resilient cluster based infrastructure.

Answer: C

Question 2.
An administrator is configuring a cluster bus destination on a cluster with five members on five different physical machines. The administrator will configure two messaging engines which may be run on any of the five cluster members. 

What is the simplest configuration for the messaging engines' data stores that still ensures proper fail over?

A.A file-based data store in the config directory that is kept in sync on all cluster members by the 
   deployment manager
B. A single remote database accessible by all cluster members with one schema to be shared by 
    the messaging engines
C. A single remote database accessible by all cluster members with two schemas
D. Two remote databases accessible by all cluster members

Answer: C

Question 3.
A WebSphere Application Server ND V6.1 administrator has been asked to set up cache replication for an application. The application team wants to make sure it does not loose any cache data that is generated. 

What would make losing cache data least likely to happen?

A.Full group replication
B. Enable disk offload
C. Push only
D. Flush to disk

Answer: B

Question 4.
A WebSphere Application Server ND V6.1 administrator recently added a new cluster member. When the administrator checked the status of the servers in the cluster, they noticed the cluster showing a state of partially started. 

What does that mean?

A. All cluster members are running, but the node agents have not been started.
B. At least one of the cluster members is running.
C. The cluster was not started by the deployment manager.
D. The cluster was created, however the servers were never stopped then restarted cleanly.

Answer: B

Question 5.
To improve scalability of a cluster bus member, an administrator proposes adding messaging engines to the cluster. 

Which valid concern cannot be resolved through configuration?

A. Multiple messaging engines starting on the same cluster member; a review of available 
    resources on the cluster members must be conducted to determine if this can be tolerated
B. Duplicate messages may actually decrease the scalability of the application; the application 
    developers must be consulted to determine the performance impact
C. Message order not being preserved; the application developers must be consulted to 
    determine whether or not this will cause application errors
D. Additional load on the deployment manager as it directs messages to the partitioned 
    destinations; a review of available resources on the deployment manager must be conducted 
    to determine if this can be tolerated

Answer: C

Question 6.
The lexically lowest named server in a cell, server A, is an application server that happens to be started and stopped frequently. An administrator is planning to greatly increase the number of application servers and clusters in the cell. The administrator will also be adding a large number of destinations to the default messaging provider. 

Which action should the administrator take to prevent any scaling problems when adding the servers and destinations?

A. Create a cluster of several application servers using server A as a template
B. Add server A to a replication domain to replicate session information
C. Configure the DefaultCoreGroup's preferred coordinator servers to prefer servers other than 
    server A
D. Move any default messaging provider messaging engines and destinations from server A to 
    other servers in the cell

Answer: C

Question 7.
Which statement most accurately states considerations that need to be taken when configuring a Web server farm that fronts a cluster of WebSphere application servers for the purpose of evenly distributing workload?

A. A server weight value of less than one notifies the plugin that this application server must 
    continue to receive an equal share of the new incoming requests.
B. The number of Web servers in the configuration must be exactly identical to the maximum 
    number of cluster members that can ever be active and receiving incoming requests at one 
    time.
C. When all server weights have been set to an equal value in the plugin configuration file, the 
    weighting of the round robin approach for workload load distribution is effectively turned off.
D. When the number of active Web servers in the configuration exceeds the number of  
    application servers that are accepting incoming traffic, the excess Web servers will be placed 
    in standby mode to conserve resources.

Answer: C

Question 8.
An application with EJBs is deployed on a cluster. The workload for the application has increased. To keep up with the increased workload, the administrator has added more application servers to the cluster. However, this has resulted in some cluster members being overloaded and others being idle. 

Which exception to the WLM routing policy might be causing this problem?

A. Preferred servers that are set servers in the cluster's replication domain
B. Transaction Affinity caused by the application's runtime behavior
C. The Preferred Server Only property is enabled in the cluster's coregroup
D. Session affinity caused by the application's runtime behavior

Answer: B

Question 9.
What is one action that must be taken to allow the administrative console application to be accessed via the Web server?

A. Change admin_host virtual host group to include Web server port 80 (default)
B. Open port 80 on the firewall
C. Stop and restart the node agent
D. Change the deployment manager master configuration file and force the updates to all nodes

Answer: A

Question 10.
When enabling failover for Stateful Session Beans (SFSBs), the WebSphere EJB container will set the activation policy to activate at transaction boundary for:

A. all EJBs in the EJB container.
B. all Servlets, JSPs and EJBs.
C. all stateless session beans.
D. all SFSB.

Answer: D

Question 11.
Where is the file-based repository that is built into WebSphere stored?

A.\profiles\\config\cells\\bultinFileRegistry.xml
B. \profiles\\config\cells\\fileRegistry.props
C. \profiles\\config\cells\\fileRegistry.properties
D. \profiles\\config\cells\\fileRegistry.xml

Answer: D

Question 12.
Which list is the most accurate description of the duties and benefits provided by a WebSphere Application Server ND V6.1 Trust Association Interceptor (TAI) module?

A. Extract the user's credential information from the request validate user authorizations eliminate 
    additional user authentication calls
B. Validate the trust of the perimeter authentication service extract user credentials eliminate 
    additional user authentication calls
C. Extract the user's credential information from the request validate trust relationship with 
    perimeter authentication service eliminate additional user authorization calls
D. Validate the trust of the perimeter authentication service validate user authorizations eliminate 
    additional user authentication calls

Answer: B

Question 13.
WebSphere administrative security is just enabled when suddenly, several of the deployed Java client applications fail with "security exceptions". 

Which configuration file should be investigated first?

A. sas.server.props
B. sas.client.props
C. wsjass_client.conf
D. ws-security.xml

Answer: B

Question 14.
Which list of activities most accurately describes the duties that must be performed by the perimeter authentication service as a part of interfacing with its corresponding Trust Association Interceptor (TAI) module in targeted WebSphere Application Servers ND V6.1?

A. Perform user authentication, establish a trust relationship with the WebSphere application 
    server(s) and verify user role authorization(s)
B. Verify user role authorization(s), perform user authentication, establish a trust relationship with 
    the WebSphere application server(s) and extract user credential information from the requests
C. Perform user authentication, establish a trust relationship with the WebSphere application 
    server(s) and insert user credential information into HTTP requests
D. Verify user role authorization(s), perform user authentication and insert user credential 
    information into HTTP requests

Answer: C

Question 15.
What is the default base entry value for the built-in, file-based repository for the federated repository?

A. o=WIMFileBasedRealm
B. o=defaultWIMFileBasedRealm
C. o=defaultWIMFileBasedRepository
D. o=defaultWIMFileBaseEntry

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-631 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-631" Exam

Please Send me Latest Dump

 Please Send me Latest Dump
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 646-204 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "646-204" Exam

Cisco Sales Expert

 Question 1.
Which two characteristics of optical networks data to be transmitted over extremely long distances? (Choose two.)

A. No electromagnetic interference (EMI)
B. Minimal signal loss
C. No bandwidth limits
D. No encryption

Answer: A, B

Question 2.
What is a wide-area network (WAN)?

A. A network that is restricted to a single building, a group of buildings, or even a single room
B. A network that connects client devices wirelessly using radio waves
C. A network that crosses metropolitan, regional or national boundaries
D. A network that encompasses an entire city or metropolitan area and connects multiple local-
    area networks (LANs)

Answer: C

Question 3.
Which IP telephony component provides call processing, such as signaling that in a traditional voice network is provided by switching equipment, such as a PBX?

A. Voice gateways, such as the Cisco VG248 analog phone gateway
B. Call-management hardware and software, such as Cisco Call Manager
C. Client-based software, such as Cisco SoftPhone
D. Advanced call-handling software, such as Cisco Unity

Answer: B

Question 4.
A software engineering firm wants to streamline call center operations to reduce customer wait times and improve employee productivity. 

Which Cisco solution best matches this business need?

A. IP Telephony
B. DSL
C. WLAN
D. Optical Network

Answer: A

Question 5.
A growing publishing firm needs a secure way for remote content editors to connect through the Internet to the company extranet.

Which Cisco solution best matches this business need?

A. IP telephony
B. Virtual Private Network (VPN)
C. Content Networking
D. Wireless network

Answer: B

Question 6.
What creates an encrypted tunnel through a shared public network infrastructure, such as the Internet to provide a secure connection between remote users and a private network?

A. VPN
B. HTTP
C. DSL
D. Optical Networking

Answer: A

Question 7.
What does a router do?

A. Reads Media Access Control (MAC) addresses to forward messages to the correct location 
    and connects the local-area network (LAN) to the wide-area network (WAN)
B. Stores data on network and connects the local-area network (LAN) to the wide-area network 
    (WAN)
C. Routes traffic down alternative paths and connects the local-area network (LAN) to the wide-
    area network (WAN)
D. Broadcasts data to all devices that are connected to it across the local-area network (LAN) and 
    wide-area network (WAN)

Answer: C

Question 8.
Which device is used in wireless networks to send transmission to a target area?

A. Directional Antenna
B. Optical fiber
C. Omni-directional antenna
D. Access point

Answer: A

Question 9.
Which wireless local-area network (WLAN) device is often used to make wireless connections between buildings or campuses?

A. Access Point
B. Bridge
C. Router
D. Client Adapter

Answer: B

Question 10.
On what type of network does the Cisco Unified Communications system reside?

A. A single, joined voice, video and data network
B. Voice networks only
C. Wireless networks only
D. Data networks only
E. Independent voice, video and data networks

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 920-452 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "920-452" Exam

Help Please!

 Help Please! 
i need this dump
thanks anyone to ad it


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-481 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-481" Exam

Cisco Rich Media Communications

 Question 1.
Exhibit:
 

The network has two gatekeepers that control four zones. Which command is used to ensure that the aggregate bandwidth between zones that are controlled by the Portland Gatekeeper and the Seattle Gatekeeper is limited to 100,000 kbps?

A. bandwidth interzone 166667
B. bandwidth remote 166667
C. bandwidth session 166667
D. bandwidth region 166667
E. bandwidth zone 166667

Answer:  B

Question 2.
ITCertKeys.com has a single Cisco IPVC 3511 MCU E. At present there are two conferences occurring as follows:
Conference 1: three conference participantstransrating 768 kbps to 384 kbpsenhanced
continuous presence
Conference 2: three conference participantstransrating 768 kbps to 384 kbpsmultiple
conference view (3)A third conference is desired with the following requirements:
Conference 3: three conference participants

What will occur when the third conference is attempted?

A. The third conference will succeed as desired.
B. The third conference will succeed, but without the enhanced continuous presence.
C. The third conference will fail because an IPVC 3511 MCU does not have the resources for 
    three conferences of three people each.
D. The third conference will fail because the EMP module does not have the resources to provide 
    the number of required services.

Answer:  A

Question 3.
Exhibit:
 

ITCertKeys.com is using Cisco meeting place at its world headquarters; ITCertKeys.com also has a Cisco CallManager cluster. The Cisco CallManager cluster includes a video deployment with both SCCP and H.323 video endpoints. The videoconferencing capability is provided by a Cisco IPVC 3540 Series Videoconferencing System. 

Using the topology in the exhibit, what should be the video gateway location?

A. A
B. B
C. C
D. D

Answer:  B

Question 4.
ITCertKeys.com is deploying Cisco VT Advantage to enable executives to participate in video calls with customers and suppliers. 

Which two devices can be used to allow these external calls to be placed over a dedicated PRI? (Choose two.)

A. Cisco IPVC 3521
B. Cisco IPVC 3526
C. Cisco IPVC 3540
D. Cisco Multiservice IP-to-IP Gateway
E. Cisc MCM proxy

Answer:  B, C

Question 5.
Exhibit:
 

A network has two gatekeepers that control four zones. 

Which command is used to ensure that the aggregate bandwidth between the Seattle and Spokane zones is limited to 100,000 kbps?

A. bandwidth interzone 166667
B. bandwidth remote 166667
C. bandwidth session 166667
D. bandwidth region 166667
E. bandwidth zone 166667

Answer:  A

Question 6.
Exhibit:
 

CAC is being configured for the centralized call-processing video telephony network. Each video terminal is capable of a maximum data rate of 320 kbps, and two video terminals are planned for each site. The requirement is to make two simultaneous video calls between the ITCertKeys main office and each remote ITCertKeys branch office site. The audio codec will be G.711. 

In order to ensure quality of service for calls, which action should be taken when configuring Cisco CallManager?

A. Set the location video call bandwidth between the central site and each remote site to 922 
    kbps.
B. Set the location video call bandwidth between the central site and each remote site to 384 
    kbps.
C. Set the location video call bandwidth between the central site and each remote site to 768 
    kbps.
D. Configure the gatekeeper to set the req-qos guaranteed-delay video bandwidth at 922 kbps 
    between the central site and each remote site.
E. Configure the gatekeeper to set the req-qos guaranteed-delay video bandwidth at 384 kbps 
    between the central site and each remote site.
F. Configure the gatekeeper to set the req-qos guaranteed-delay video bandwidth at 768 kbps 
    between the central site and each remote site.

Answer:  C

Question 7.
ITCertKeys.com has a requirement for up to 10 simultaneous conferences of four people each, and each conference requires 384-kbps to 128-kbps transrating and H.261 to H.263 video transcoding. 

What should this company purchase?

A. one Cisco IPVC 3540 Transcoder Module for MC06A
B. one Cisco IPVC 3540 Transcoder Module for MC06A with an EMP blade
C. one Cisco IPVC 3540 Transcoder Module for MC06A with an EMP3 blade
D. two Cisco IPVC 3540 Transcoder Modules for MC06A
E. two Cisco IPVC 3540 Transcoder Modules for MC06A, each with an EMP blade
F. two Cisco IPVC 3540 Transcoder Modules for MC06A, each with an EMP3 blade

Answer:  C

Question 8.
Which three factors must be considered when designing a H.323 videoconferencing dial plan? (Choose three.)

A. the number of sites in the enterprise
B. the number and location of gatekeepers
C. the incoming PSTN call routing method
D. the DNs and location of conferencing MCUs to be deployed
E. the videoconferencing features and applications to be deployed
F. the location of voice gateways

Answer:  A, C, D

Question 9.
Exhibit:
 

The network has two gatekeepers that control four zones. 

Which command is used to ensure that no single call in Zone Eugene uses more than 768 kbps?

A. bandwidth interzone 768
B. bandwidth limit 768
C. bandwidth session 768
D. bandwidth call 768
E. bandwidth zone 768

Answer:  C

Question 10.
What is traditionally used in a H.323 gatekeeper to pool endpoints into groups?

A. zones
B. clusters
C. calling search spaces
D. toll bypass routing

Answer:  A

Question 11.
ITCertKeys.com has a small group of users who do interactive video teaching from H.323 endpoints to H.320 videoconferencing systems. 

What should you do so that incoming calls can reach endpoints that are associated with a specific E.164 address?

A. Deploy an IPCC server and configuration an IVR to act as a front end to the MCU
B. Enable the DID capability that is built into the gateway
C. Deploy the Cisco IP IVR
D. Configure the DID in the Cisco CallManager

Answer:  B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1Y0-611 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1Y0-611" Exam

New Collection: thanks to itcertkeys

 New Collection: thanks to itcertkeys


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.