Consider the following customer attributes and choose the correct IP telephony call processing model:
– a large campus that spans two PSAP areas
– a single group of buildings connected via fiber optics
– data VPNs that support multiple contractors and suppliers
– a fully developed three-tier network hierarchy
– connectivity to two different service providers for Internet access
A. single-site call processing
B. centralized call processing
C. hybrid call processing
D. distributed call processing
What information is relevant to choosing an IP telephony centralized call processing model?
A. multiple PRIs to the PSTN
B. a campus of six buildings connected via an ATM backbone
C. three small regional sales offices located in the three Western time zones
D. centralized order processing, shipping, and billing for all customer products
E. connectivity to a single service provider that hosts the company web site and provides for
F. a single six-story building with an IDF on each floor and an MDF in the computer room on the
In a TDM PBXto Cisco Unified Communications Manager migration, which three things must be
verified from the LAN perspective before IP telephony can be deployed? (Choose three.)
A. the type of wiring in the office
B. the number of PSTN connections needed
C. the number of public IP addresses available
D. the amount of rack space in the equipment rack
E. the amount of power that is available to support new LAN switches
The intranet will have three VLAN types to support voice and data traffic; one type for voice, one
type for data, and one type for the Cisco Unified Communications Manager cluster. How should
inter-VLAN connectivity by deployed? Drag and drop the type of connectivity to each type of
connection. Types of connections may be used more than once.
Ajax wants to ensure that their employees are safe and that they comply with the law. What are
four general E911 responsibilities of an enterprise telephony system? (Choose four.)
A. Enable PSAP call-back.
B. initiate the update of ALI records.
C. Provide a detailed map of all ERLs.
D. Allow conferencing with internal security personnel.
E. Route calls to the appropriate point (on-net or off-net).
F. Deliver appropriate calling party number digits to LEC