1.
This test was created by Padraig Hynes. Please do not share it outside of EOS as the link is tracked.
Correct Answer
A. Agree
Explanation
The given correct answer is "Agree." However, without any context or information about the question being asked, it is not possible to provide an explanation for why this answer is correct. The question or prompt is missing, making it impossible to generate a meaningful explanation.
2.
Which two signaling protocols the Cisco Unified Communication Manager supports for the Cisco IP phones?
Correct Answer(s)
C. SIP
D. H.323
Explanation
The Cisco Unified Communication Manager supports SIP and H.323 signaling protocols for the Cisco IP phones. These protocols enable the communication between the IP phones and the Unified Communication Manager, allowing for features such as call setup, call control, and media transmission. SIP (Session Initiation Protocol) is a widely used protocol for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. H.323 is an older protocol that provides similar functionality for multimedia communication over IP networks.
3.
Choose all statements that apply to the Cisco TelePresence Management Suite (TMS).
Correct Answer(s)
B. TMS can integrate with Microsoft Exchange and Outlook to support flexible meeting scheduling.
C. TMS is a portal for managing and monitoring video conferencing network.
E. TMS provides centralized control for on-site and remote video systems.
Explanation
The Cisco TelePresence Management Suite (TMS) is a portal that allows users to manage and monitor their video conferencing network. It provides centralized control for both on-site and remote video systems, allowing for easier management and configuration. Additionally, TMS can integrate with Microsoft Exchange and Outlook, enabling flexible meeting scheduling and enhancing the overall user experience. The complexity of a TMS installation is not determined by the number of Cisco Unified CM in a Cisco Unified CM cluster, so this statement is not applicable.
4.
Which of the following are provided by the Infrastructure collaboration components?
Correct Answer(s)
B. Quality of Service
C. Security mechanism
Explanation
The Infrastructure collaboration components provide Quality of Service and Security mechanism. Quality of Service ensures that the network can prioritize certain types of traffic, such as voice or video, to ensure a high level of performance. Security mechanisms are implemented to protect the infrastructure from unauthorized access and ensure the confidentiality, integrity, and availability of data and services. Instant messaging and voice-mail systems are not specifically mentioned as being provided by the Infrastructure collaboration components.
5.
Which of the following are true about the Cisco Unified Communication Manager?
Correct Answer(s)
C. Provides limited conferencing capabilities through the Cisco IP Voice Media Streaming Application Service
D. Support conferencing using DSP (Digital Signal Processors) resources.
Explanation
The Cisco Unified Communication Manager provides limited conferencing capabilities through the Cisco IP Voice Media Streaming Application Service. It also supports conferencing using DSP (Digital Signal Processors) resources.
6.
Which services are provided in a Cloud deployment?
Correct Answer(s)
B. Meeting services
D. Messaging services
Explanation
In a Cloud deployment, meeting services and messaging services are provided. Meeting services refer to the ability to conduct virtual meetings and video conferences through the Cloud, allowing users to collaborate and communicate remotely. Messaging services, on the other hand, enable users to send and receive messages, whether it be through instant messaging, email, or other forms of communication. Phone devices and video devices are not explicitly mentioned as services provided in a Cloud deployment.
7.
Which of the following have been optimized to be deployed with Cisco Unified Communications Manager?
Correct Answer(s)
A. Cisco Meeting Server
D. Cisco Meeting Apps
Explanation
The Cisco Meeting Server and Cisco Meeting Apps have been optimized to be deployed with Cisco Unified Communications Manager. These solutions are designed to enhance collaboration and communication within an organization by providing seamless integration with the Unified Communications Manager platform. By optimizing these tools for deployment with Unified Communications Manager, Cisco aims to provide a comprehensive and efficient communication ecosystem for businesses.
8.
Which are true statements regarding Cisco Unified Communications mode?
Correct Answer(s)
A. IM and Presence Service integrates into a full Cisco Unified Communications environment.
B. IM and Presence Service supports Cisco Jabber platform
Explanation
The IM and Presence Service integrates into a full Cisco Unified Communications environment, meaning that it can seamlessly work with other Cisco Unified Communications components. Additionally, it supports the Cisco Jabber platform, allowing users to use the Jabber client for instant messaging and presence features.
9.
Which two Collaboration Webex Room systems support the quad camera?
Correct Answer(s)
A. Cisco Webex Room Kit Plus
B. Cisco Webex Room Kit Pro
Explanation
The Cisco Webex Room Kit Plus and Cisco Webex Room Kit Pro are the two Collaboration Webex Room systems that support the quad camera.
10.
Which of the following does Cisco Webex Room 55 Dual support?
Correct Answer(s)
C. 4x lenses, speaker track
D. 3 micropHone inputs and 2 video outputs
Explanation
The Cisco Webex Room 55 Dual supports 4x lenses, speaker track, 3 microphone inputs, and 2 video outputs. This means that it is capable of using four lenses for enhanced video quality, has a speaker tracking feature to focus on the active speaker, can connect three microphones for better audio input, and has two video outputs for connecting to multiple displays or devices.
11.
Which two statements are correct about using Secure File Transfer Protocol (SFTP) protocol on a Cisco router?
Correct Answer(s)
A. SSH must be enabled on the device first before using SFTP.
C. It supports the full security and authentication functionality of SSH.
12.
Which of the following is a media-independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby?
Correct Answer
D. Cisco Discovery Protocol (CDP)
Explanation
Cisco Discovery Protocol (CDP) is a media-independent and network-independent protocol that runs on Cisco devices. It allows networking applications to learn about directly connected devices nearby. CDP helps in discovering and gathering information about neighboring devices, such as their IP addresses, capabilities, and platform information. This information is useful for network administrators to troubleshoot and manage the network effectively. DHCP is used for dynamically assigning IP addresses, NTP is used for time synchronization, and DNS is used for domain name resolution, but none of these protocols provide the same functionality as CDP in terms of discovering directly connected devices.
13.
What is true about subnetting?
Correct Answer(s)
A. Network traffic is reduced
C. It equals to a broadcast domain
Explanation
Subnetting helps to reduce network traffic by dividing a large network into smaller subnets, which allows for more efficient use of network resources. Each subnet operates as its own broadcast domain, meaning that broadcasts are contained within the subnet and not propagated to other subnets. Therefore, the statement "Network traffic is reduced" is true. Additionally, subnetting does indeed equal to a broadcast domain, as each subnet has its own unique network address and broadcasts are limited within that subnet.
14.
Which of the following is true about Switch port security blocking MAC address?
Correct Answer(s)
B. The secure port does not forward packets with source addresses outside the group of defined addresses.
D. If you limit the number of secure MAC address to one and assign a single MAC address, the workstation attached to that port is assured the full bandwidth of the port.
Explanation
When switch port security is enabled and configured, it prevents unauthorized devices from accessing the network by blocking packets with source addresses outside the defined group of addresses. This means that only devices with MAC addresses that have been configured or learned on the secure port will be allowed access. Additionally, if the switch is configured to limit the number of secure MAC addresses to one and assign a single MAC address to a workstation attached to that port, it guarantees that the workstation will have the full bandwidth of the port available to it.
15.
From the Diagnostics page, what does it mean when the issue is clearly marked red?
Correct Answer(s)
B. Errors
C. Critical
Explanation
When the issue is clearly marked red on the Diagnostics page, it means that there are errors that are classified as critical. This indicates that there are significant problems or malfunctions that need immediate attention and resolution. The red marking serves as a clear indication to the user that urgent action is required to address the identified errors and prevent any further issues or disruptions.
16.
Where in the web interface can you find detail IP information of Webex Endpoint Devices?
Correct Answer
B. Status option of the Setup tab
Explanation
In the web interface, the detailed IP information of Webex Endpoint Devices can be found in the "Status" option of the "Setup" tab.
17.
Which one of the following options can be used to find the IP address of the Cisco Webex Room 70D system?
Correct Answer
C. On the Touch 10 controller screen, tap system name in the upper left corner and tap Settings followed by About this device.
Explanation
To find the IP address of the Cisco Webex Room 70D system, the user should tap on the system name in the upper left corner of the Touch 10 controller screen. Then, they should select "Settings" and navigate to "About this device". This option will provide the necessary information about the IP address of the system.
18.
Which component shown in the picture can be found in the Cisco Webex Room 70D system left screen?
Correct Answer
D. Codec
Explanation
The component shown in the picture that can be found in the Cisco Webex Room 70D system left screen is the Codec.
19.
What task should always be taken first when performing the replacement procedures for a Cisco product?
Correct Answer
A. Save device configuration.
Explanation
When performing replacement procedures for a Cisco product, the first task that should always be taken is to save the device configuration. This is important because the device configuration contains all the settings and customizations that have been made to the device. By saving the configuration, it ensures that these settings are not lost during the replacement process. Additionally, saving the configuration allows for easy restoration of the device to its previous state if any issues arise during the replacement.
20.
Which feature you can turn on from the Touch 10 controller to check camera Pan, Tilt, Zoom, maximized, and minimized view to verify that the Cisco TelePresence MX800 Dual system camera movement operates correctly?
Correct Answer
A. Selfview.
Explanation
Selfview is the feature that can be turned on from the Touch 10 controller to check camera Pan, Tilt, Zoom, maximized, and minimized view to verify that the Cisco TelePresence MX800 Dual system camera movement operates correctly. This feature allows the user to see their own video feed on the screen, giving them the ability to adjust the camera and ensure that it is functioning properly.
21.
What does the status LED around the power button on the DX80 mean when it repeatedly flashes twice?
Correct Answer
C. No network connection
Explanation
The status LED around the power button on the DX80 flashing twice repeatedly indicates that there is no network connection. This means that the device is unable to establish a connection to the network, which could be due to various reasons such as network cable issues, Wi-Fi connectivity problems, or network configuration errors. It is important to troubleshoot and resolve the network connection problem in order to ensure the proper functioning of the DX80.
22.
Which tracking method uses two cameras working together with a built-in microphone array to switch and focus on the person speaking in the room?
Correct Answer
C. Speaker Tracking
Explanation
Speaker Tracking is the tracking method that uses two cameras working together with a built-in microphone array to switch and focus on the person speaking in the room. This method allows for seamless tracking of the speaker, ensuring that the camera captures their movements and actions accurately. By using the built-in microphone array, the system can also detect the direction of the speaker's voice and adjust the focus accordingly. This tracking method is particularly useful in scenarios such as video conferences or presentations, where the speaker's movements and actions need to be highlighted and captured effectively.
23.
What is the name of the feature that allows the camera of the webex device to automatically frames both the person and the whiteboard when a person next to the whiteboard is speaking?
Correct Answer
A. Snap to Whiteboard
Explanation
The correct answer is "Snap to Whiteboard." This feature allows the camera of the Webex device to automatically frame both the person and the whiteboard when a person next to the whiteboard is speaking. It ensures that the camera focuses on the relevant content and provides a clear view of both the speaker and the whiteboard during presentations or discussions.
24.
Fer to the following picture: Which loudspeakers need to be removed to replace the Cisco TelePresence MX800 Dual system camera?
Correct Answer
D. Five speakers: position 4, 5, and 6 above left monitor and position 2 and 3 above right camera
Explanation
The correct answer states that five speakers need to be removed in order to replace the Cisco TelePresence MX800 Dual system camera. These speakers are located at position 4, 5, and 6 above the left monitor, and position 2 and 3 above the right camera.
25.
What is the purpose of Intelligent Proximity?
Correct Answer
A. Content Sharing
Explanation
Intelligent Proximity is used for content sharing. This feature allows users to wirelessly share their screen or presentations with other devices, such as projectors or displays. It enables seamless and efficient collaboration by eliminating the need for cables and physical connections. With Intelligent Proximity, users can easily share their content and engage with their audience in a more interactive and dynamic way.
26.
Which option is not used for powering up Cisco IP phone?
Correct Answer
A. Cisco voice gateway
Explanation
The Cisco voice gateway is not used for powering up Cisco IP phones. Cisco voice gateways are devices that connect traditional telephony networks, such as the public switched telephone network (PSTN), to IP-based networks. They are responsible for converting voice signals into digital packets for transmission over the IP network. However, they do not provide power to Cisco IP phones. Cisco IP phones can be powered using a Cisco switch with a Power over Ethernet (PoE) port, a TelePresence codec, or an external power supply.
27.
Where can you find basic IP address of Webex Endpoint Devices?
Correct Answer
C. By selecting Settings> About this device from the Endpoint Device Controller.
Explanation
By selecting Settings> About this device from the Endpoint Device Controller, you can find the basic IP address of Webex Endpoint Devices. This option allows you to access the device settings and view detailed information about the device, including its IP address.
28.
Cisco provides factory reset option on every IP phone model for phone recovery and troubleshooting. What key on the phone needs to be pressed and hold when plug the phone power back in to start 7800 or 8800 series IP phone reset process?
Correct Answer
A. # Key
Explanation
To start the reset process on a Cisco 7800 or 8800 series IP phone, the "#" key needs to be pressed and held when plugging the phone power back in. This will initiate the factory reset option and allow for phone recovery and troubleshooting.
29.
After replacing a Webex endpoint device codec, which common task are to be performed for operation verification? (Choose three.)
Correct Answer(s)
A. Test Call
C. Camera Operation
E. Content Sharing
Explanation
After replacing a Webex endpoint device codec, three common tasks that need to be performed for operation verification are: Test Call, Camera Operation, and Content Sharing. A test call is necessary to ensure that the new codec is functioning properly and can establish a connection. Camera operation needs to be checked to ensure that the video feed is working correctly. Content sharing should be tested to verify that the device can display and share content effectively. Adjusting display settings and conducting a network connection speed test are not mentioned as necessary tasks for operation verification after replacing the codec.
30.
While performing the remedial procedures on the Cisco Webex DX80, an option key is required to activate optional functionality such as MultiSite on the Cisco Webex DX80. What are the numbers customer administrator needs to transfer license and generate option key? (Choose two)
Correct Answer(s)
B. The serial numbers of the new DX80 and replaced DX80.
D. RMA number.
Explanation
To transfer the license and generate the option key for the Cisco Webex DX80, the customer administrator needs to provide the serial numbers of the new DX80 and the replaced DX80, as well as the RMA number. These details are necessary to ensure that the license is correctly transferred from the old device to the new one and to generate the option key for activating optional functionalities such as MultiSite on the Cisco Webex DX80. The DX80 part number, current option key, and customer license account number are not required for this specific process.
31.
Which phrase is correct about the TFTP file transfer protocol?
Correct Answer
A. TFTP is a good choice for small file transfer
Explanation
TFTP is a good choice for small file transfer because it is a simple and lightweight protocol that does not require a lot of resources. It is commonly used for transferring small files such as firmware updates or configuration files in network devices. However, it may not be suitable for transferring large files or for situations where security and authentication are important.
32.
Which phrases are correct about the TFTP file transfer protocol? (Choose two.)
Correct Answer(s)
C. TFTP client listens on TFTP server write requests for file download.
E. TFTP uses UDP transport.
Explanation
The first correct phrase states that a TFTP client listens for write requests from a TFTP server for file download. This means that the client is actively waiting for the server to request a file transfer.
The second correct phrase states that TFTP uses UDP transport. UDP (User Datagram Protocol) is a connectionless protocol that is commonly used for fast and efficient transmission of data over a network. TFTP utilizes UDP for its simplicity and low overhead, making it suitable for applications where reliability is not as critical as speed.
33.
Certificate Trust List (CTL) file is an important file Cisco IP phone download during the boot up process. What information is defined in the CTL file?Certificate Trust List (CTL) file is an important file Cisco IP phone download during the boot up process. What information is defined in the CTL file?
Correct Answer
A. CTL contains a list of Cisco Unified CM and TFTP servers the IP pHone is authorized to connect to.
Explanation
The CTL file contains a list of Cisco Unified CM and TFTP servers that the IP phone is authorized to connect to. This information is important for the boot-up process of the Cisco IP phone as it allows the phone to establish a secure connection with the authorized servers. By defining the authorized servers in the CTL file, the IP phone can ensure that it is connecting to trusted and authorized sources for communication and configuration updates.
34.
Latency is the technically more correct term to call this command.
Correct Answer
A. Ping
Explanation
Ping is a command used to test the reachability and round-trip time of a network host. It sends an ICMP echo request message to the destination host and waits for an ICMP echo reply. The term "latency" refers to the time delay in transmitting data over a network. Since the ping command measures the round-trip time, which includes both the time taken for transmission and the time taken for a reply, it is more technically correct to refer to it as "latency".
35.
Which of the following can cause MAC address mismatched when endpoint fails to register to Cisco Unified CM? (Choose two)
Correct Answer(s)
A. Endpoint is unplugged
C. MAC address is entered incorrectly
Explanation
When an endpoint fails to register to Cisco Unified CM, two possible causes for MAC address mismatch are the endpoint being unplugged and the MAC address being entered incorrectly. If the endpoint is unplugged, the registration process cannot take place, leading to a mismatch in the MAC address. Similarly, if the MAC address is entered incorrectly, the registration will fail and result in a mismatch. The other options, such as the gateway address missing or DNS server not available, do not directly impact the MAC address registration process.
36.
Which of the following is true about Switch port security blocking MAC address? (Choose two)
Correct Answer(s)
B. The secure port does not forward packets with source addresses outside the group of defined addresses.
D. If you limit the number of secure MAC address to one and assign a single MAC address, the workstation attached to that port is assured the full bandwidth of the port.
Explanation
Switch port security blocking MAC address is a feature that allows network administrators to control which devices can access a specific switch port based on their MAC addresses.
The statement "The secure port does not forward packets with source addresses outside the group of defined addresses" is true because when port security is enabled, the switch only allows packets with source addresses that are within the defined group of MAC addresses to be forwarded.
The statement "If you limit the number of secure MAC address to one and assign a single MAC address, the workstation attached to that port is assured the full bandwidth of the port" is also true. By limiting the number of secure MAC addresses to one and assigning a single MAC address, the workstation connected to that port is guaranteed to have the entire bandwidth of the port available for its use.
37.
Which devices can provide IP phone the network connection and power in order for the Cisco IP phone to function in the IP telephony network? (Choose two)
Correct Answer(s)
B. Cisco Catalyst PoE switch.
E. Cisco TelePresence codec.
Explanation
The Cisco Catalyst PoE switch can provide both network connection and power to the IP phone, allowing it to function in the IP telephony network. The switch supports Power over Ethernet (PoE) technology, which enables it to deliver power to connected devices, including IP phones, through the Ethernet cables. The Cisco TelePresence codec, on the other hand, is a video conferencing device and not specifically designed to provide power to IP phones. However, it can still be used to connect an IP phone to the network, but an additional power source would be required for the IP phone to function properly.
38.
Which VoIP component provides translation between VoIP and non-VoIP networks? (Choose one.)
Correct Answer
B. Gateway
Explanation
A gateway is a VoIP component that provides translation between VoIP and non-VoIP networks. It acts as a bridge between different types of networks, allowing communication between them by converting the protocols and formats used. In the context of VoIP, a gateway enables communication between VoIP networks and traditional telephone networks, allowing calls to be made and received between the two.
39.
What is the name of one of the first immersive video conferencing products created by Cisco? (Choose one.)
Correct Answer
C. Cisco TelePresence System
Explanation
The correct answer is Cisco TelePresence System. Cisco TelePresence System was one of the first immersive video conferencing products created by Cisco. It offered high-definition video and audio quality, creating a lifelike meeting experience for participants.
40.
To which Cisco product can endpoints register? (Choose one.)
Correct Answer
A. Cisco Office Manager
Explanation
Endpoints can register to the Cisco Office Manager. This product allows users to manage and control their Cisco endpoints, such as phones and video devices, from a single interface. It provides a centralized platform for configuring and monitoring these endpoints, making it easier for administrators to manage their Cisco devices efficiently. Cisco Webex is a separate product that offers online meetings, video conferencing, and collaboration tools, but it is not specifically designed for endpoint registration. Cisco Collaboration is a broader term that encompasses various Cisco products and solutions for communication and collaboration, but it does not specifically refer to endpoint registration.
41.
What is the purpose of the Cisco TMS Network Integration Extension (NETINT)
Correct Answer
C. It enables Cisco TMS to integrate Cisco and third-party unmanaged conferencing bridges.
Explanation
The Cisco TMS Network Integration Extension (NETINT) enables Cisco TMS to integrate Cisco and third-party unmanaged conferencing bridges. This means that the NETINT allows Cisco TMS to connect and manage video conferencing systems from different vendors, providing a centralized management platform for administrators. It streamlines the process of integrating and managing conferencing bridges, making it easier for organizations to set up and maintain their video conferencing network.
42.
Which option is not part of VoIP functions?
Correct Answer
B. Standard cabling
Explanation
The option "Standard cabling" is not part of VoIP functions because VoIP (Voice over Internet Protocol) is a technology that allows voice communication over the internet, using IP networks. It does not rely on traditional telephone cabling infrastructure. Instead, it uses data networks to transmit voice packets. Codecs are responsible for encoding and decoding the voice signals, signalling manages call setup and control, and database services may be used for storing and retrieving user information.
43.
What was Cisco Webex Teams previously called
Correct Answer
B. Cisco Spark
Explanation
Cisco Webex Teams was previously called Cisco Spark.
44.
Which type of component of the Cisco Collaboration solution does Cisco Unified CM serve as
Correct Answer
C. Call control
Explanation
Cisco Unified CM serves as the call control component of the Cisco Collaboration solution. It is responsible for managing and controlling all voice and video calls within the network. It handles call setup, termination, and routing, as well as providing features such as call forwarding, conferencing, and call queuing. Cisco Unified CM ensures efficient and reliable call management, allowing users to communicate seamlessly across the network.
45.
Which statements is true?
Correct Answer
A. Packet Loss is a relative measure of the number of packets that were not received compared to the total number of packets transmitted.
Explanation
The correct answer is "Packet Loss is a relative measure of the number of packets that were not received compared to the total number of packets transmitted." This statement accurately describes packet loss as a measure of the percentage of packets that were not successfully delivered compared to the total number of packets sent.
46.
Which statement is true about converged network
Correct Answer
B. It can transmit data, voice, and video, or any combination of these services over the same networks.
Explanation
A converged network refers to a network infrastructure that can transmit data, voice, and video, or any combination of these services over the same networks. This means that instead of having separate networks for each service, a converged network allows for the integration and sharing of resources, resulting in cost savings and increased efficiency. With a converged network, organizations can transmit various types of communication seamlessly over a single network infrastructure. This enables the delivery of multiple services without the need for separate communication channels or network structures.
47.
Which statements are true about configuring Cisco IOS voice features? (Choose two)
Correct Answer(s)
A. Dial peers define the virtual interfaces to and from which a call is established.
B. Voice ports on routers pHysically connect the router to telepHony devices such PSTN central office (CO) switches.
Explanation
Dial peers define the virtual interfaces to and from which a call is established, meaning they specify the routing and signaling information for a call. Voice ports, on the other hand, physically connect the router to telephony devices such as PSTN central office switches, allowing the router to send and receive voice traffic. These two statements accurately describe the roles of dial peers and voice ports in configuring Cisco IOS voice features.
48.
Select the ones you like
Correct Answer
A. Option 1
49.
What is the network that can transmit data, voice, and video, or any combination of these services over the same networks?
Correct Answer
B. Converged Network
Explanation
A converged network is capable of transmitting data, voice, and video, or any combination of these services over the same network. This means that multiple types of communication can be carried out simultaneously, allowing for more efficient and cost-effective communication.
50.
Which statement is true about digital voice network?
Correct Answer
C. The analog signal from the telepHone is digitized into PCM signals by the voice codec.
Explanation
The correct answer is "The analog signal from the telephone is digitized into PCM signals by the voice codec." This statement explains the process in which the analog signal from the telephone is converted into digital signals using PCM (Pulse Code Modulation) by the voice codec. This conversion allows for efficient transmission and processing of the voice signal in a digital voice network.