If two phones share a line between them, what happens if the user of the first phone is using the line and the user of the second phone uses the Barge feature?
A. The user of the first phone is notified of the Barge request.
B. A three-way conference begins.
C. The call is discontinued, but the first phone user and the second phone user are able to talk.
D. The user on the first phone is knocked off the line, and the second phone user takes over the line.
Correct Answer: B Section: IP Phone Explanation
Barge and Privacy
The Single Button Barge/cBarge, Barge, Privacy, and Privacy on Hold features work with each other. These features work with only shared lines.
Barge adds a user to a call that is in progress. Pressing a softkey automatically adds the user (initiator) to the shared-line call (target), and the users currently on the call receive a tone (if configured). Barge supports built-in conference and shared conference bridges.
The Single Button Barge/cBarge feature allows the user to simply press the shared-line button to be added to the call. The Single Button Barge/cBarge feature supports built-in conferences and shared conference bridges.
The administrator enables or disables privacy and privacy on hold features. Privacy must be enabled for a device to activate privacy on hold. Users toggle the privacy feature on or off.
The administrator enables or disables Privacy setting. When Privacy is enabled, the system removes the call information from all phones that share lines and blocks other shared lines from barging in on its calls. When Privacy is disabled, the system displays call information on all phones that have shared line appearances and allows other shared lines to barge in on its calls. Administrators can configure Privacy for all devices or configure Privacy for each device. Users toggle the Privacy feature on or off.
The privacy on hold feature preserves privacy when a private call on a shared line is put on hold. When privacy on hold is enabled, the calling name and number that are blocked when privacy is enabled remain blocked when the call is put on hold, and the system blocks other shared lines from resuming the held call. When privacy on hold is disabled and a private call is put on hold, the system displays calling name and number on all phones that have shared line appearances and allows other shared lines to resume the held call.
If privacy on hold is enabled, users can activate the feature while the call is on hold by toggling privacy on; likewise, users can deactivate privacy on hold by toggling privacy off while the call is on hold. If privacy on hold is disabled, toggling privacy on or off does not affect the held call.
If a private call is put on hold, retrieved at the same phone, and privacy is then toggled off, the system displays the call information on all phones that have shared line appearances but does not allow another phone to resume or barge the held call.
Administrators can configure privacy for all devices or for each device. Administrators configure privacy on hold for the cluster.
Which protocol is being used when you are utilizing the chat feature of Cisco Unified Personal Communicator?
Correct Answer: C Section: Unified Personal Communicator Explanation
Quickly Communicate with Borderless Enterprise-Class Instant Messaging
Instant messaging is an important communication option that lets you efficiently interact in today’s multitasking business environment. Cisco Unified Personal Communicator delivers enterprise-class instant messaging capabilities that are based on the Extensible Messaging and Presence Protocol (XMPP) open standard and technology from the Jabber, Inc. acquisition. The solution provides personal chat, group chat, and persistent chat rooms so you can quickly connect with individuals and groups and conduct ongoing conversations. Client-side history and server-based logging capabilities allow you to view the content of prior chats and to store messages for convenience, compliance, and regulation purposes. Instant messaging is smoothly integrated with other communication capabilities so you can simply move between individual and group chats to audio and video conversations and web conferences.
Cisco Unified Personal Communicator lets you securely communicate with other organizations that use Cisco Unified Personal Communicator, Cisco WebEx. Connect, Microsoft Office Communicator, IBM Lotus Sametime, GoogleTalk, AOL, or any XMPP-based service. The enterprise-class instant messaging capabilities of Cisco Unified Personal Communicator provide more-efficient, secure, flexible, and borderless collaboration.
When deploying Cisco Unified Presence, which service is a basic service that can be considered as optional?
A. Cisco Unified Presence Engine
B. Cisco Unified Presence Sync Agent
C. Cisco Unified Presence Session Initiation Protocol Proxy
D. Cisco Unified Protocol Extensible Messaging Presence and Protocol Agent
Correct Answer: D Section: Unified Presence Explanation
Which option should you use in the Cisco Unified Communications Manager End Users Configuration page to ensure that a user can use a desk phone both for calls and for Cisco Unified Presence?
A. Enable Cisco Unified Presence Communicator
B. Allow Control of Device from Cisco Computer Telephony Integration
C. Allow Cisco Unified Personal Communicator Integration
D. Allow Cisco Unified Presence Control over IP Phone
Correct Answer: B Section: CUCM Explanation
Computer Telephony Integration
Computer telephony integration (CTI) enables you to leverage computer-processing functions while making, receiving, and managing telephone calls. CTI applications allow you to perform such tasks as retrieving customer information from a database on the basis of information that caller ID provides. CTI applications can also enable you to use information that an interactive voice response (IVR) system captures, so the call can be routed to the appropriate customer service representative or so the information is provided to the individual who is receiving the call.
Computer Telephony Integration Applications
The following list contains descriptions of some Cisco CTI applications that are available:
Cisco IP CommunicatorCisco IP Communicator, a desktop application, turns your computer into a full-feature telephone with the added advantages of call tracking, desktop collaboration, and one-click dialing from online directories. You can also use Cisco IP Communicator in tandem with a Cisco Unified IP Phone to place, receive, and control calls from your desktop PC. All features function in both modes of operation.
Cisco Unified Communications Manager Auto-AttendantThe Cisco Unified Communications Manager Auto-Attendant application works with Cisco Unified Communications Manager to receive calls on specific telephone extensions and to allow the caller to choose an appropriate extension.
Cisco Web DialerCisco Web Dialer, which is installed on a Cisco Unified Communications Manager server and is used in conjunction with Cisco Unified Communications Manager, allows Cisco Unified IP Phone users to make calls from web and desktop applications.
Cisco Unified Communications Manager AssistantThe Cisco Unified Communications Manager Assistant feature enables managers and their assistants to work together more effectively. The feature comprises a call-routing service, enhancements to phone capabilities for the manager and the assistant, and assistant console interfaces that are primarily used by the assistant.
Which protocol should you use to configure Cisco Unified Personal Communicator for secure voice messaging with Cisco Unity Connection?
Correct Answer: C Section: Unified Personal Communicator Explanation
Transport Layer Security (TLS).
TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption problems related to TLS.
The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. When a server and client communicate, TLS protocol ensures that no third party may eavesdrop, tamper with any message, and message forgery. A TLS message may span multiple TLS records.
Ensurepass offers Latest 2013 640-461 Real Exam Questions , help you to pass exam 100%.