image


61451V Dumps 61451V Braindumps 61451V Real Questions 61451V Practice Test

61451V Actual Questions


killexams.com Avaya 61451V


Administering Avaya Aura® Communication Manager


https://killexams.com/pass4sure/exam-detail/61451V


Question: 547


Which of the following statements is true about the Communication Manager Survivable Core Server (SCS)?


  1. The SCS can only support a single branch office location

  2. The SCS can be used to extend the Communication Manager system to new locations

  3. The SCS can be deployed in a redundant configuration for high availability

  4. The SCS can only be managed through the Avaya Aura® System Manager


Answer: C


Explanation: The Communication Manager Survivable Core Server (SCS) can be deployed in a redundant configuration for high availability. This involves deploying multiple SCS instances at a branch office location to provide redundancy and ensure continuous operation in the event of an SCS failure.


Question: 548


Which of the following SIP trunk configuration parameters is used to specify

the call admission control (CAC) settings for the SIP trunk?


  1. CAC Configuration

  2. Trunk Group

  3. Bandwidth Allocation

  4. IP Network Region Answer: D

Explanation: The IP Network Region configuration in the SIP trunk settings is used to specify the call admission control (CAC) settings for the SIP trunk. This includes parameters like the available bandwidth, codec preferences, and other network-related settings that are used to manage and control the call capacity and quality over the SIP trunk connection.


Question: 549


How do you perform basic maintenance and troubleshooting in Communication Manager?


  1. Basic maintenance and troubleshooting is performed in a separate Network Management application that integrates with Communication Manager.

  2. Basic maintenance and troubleshooting is managed by System Manager, which provides a centralized interface for performing these tasks.

  3. Basic maintenance and troubleshooting is automated by Communication Manager, with no direct administrator intervention required.

  4. Basic maintenance and troubleshooting is performed directly within the Communication Manager administration interface.


Answer: D


Explanation: Basic maintenance and troubleshooting tasks in Communication Manager, such as viewing system logs, monitoring performance metrics, and

performing routine backups, are performed directly within the Communication Manager administration interface. Administrators can access various diagnostic tools and utilities within the Communication Manager management tools to maintain the system and troubleshoot any issues that may arise.


Question: 550


Which parameter in the sshd_config file controls the maximum number of authentication attempts allowed per connection?


  1. MaxLoginAttempts

  2. MaxAuthTries

  3. MaxStartups

  4. PermitRootLogin


Answer: B


Explanation: The MaxAuthTries parameter in the sshd_config file controls the maximum number of authentication attempts allowed per connection on a Communication Manager system.


Question: 551


How do you configure Endpoints in Communication Manager?


  1. Endpoints are managed by System Manager, which provides a centralized interface for configuring endpoint settings.

  2. Endpoints are configured directly within the Communication Manager administration interface.

  3. Endpoints are automatically detected and configured by Communication Manager based on the connected devices.

  4. Endpoints are configured in a separate device management application that

integrates with Communication Manager.


Answer: A


Explanation: Endpoints in Communication Manager, such as IP phones, softphones, and other communication devices, are managed and configured through the System Manager interface. System Manager provides a centralized point of administration for defining and managing endpoint settings, including registration, configuration parameters, and device associations across the Avaya Aura® environment. This allows for consistent endpoint management and provisioning across multiple Communication Manager servers.


Question: 552


Which ARS feature can be used to implement least-cost routing for outgoing calls?


  1. ARS Partition

  2. ARS Digit Conversion

  3. ARS Time of Day Routing

  4. ARS Routing Plan Answer: D

Explanation: The ARS Routing Plan feature can be used to implement least- cost routing for outgoing calls. By prioritizing the trunk groups in the Routing Plan based on their cost, ARS will automatically select the most cost-effective trunk group to route the call, unless the preferred trunk groups are unavailable or exceed the configured capacity.


Question: 553

Which Secure Shell (SSH) protocol version is recommended for Communication Manager administration?


  1. SSH version 1

  2. None of the above

  3. Both SSH version 1 and 2

  4. SSH version 2 Answer: D

Explanation: SSH version 2 is the recommended protocol for Communication Manager administration as it provides enhanced security features compared to SSH version 1, which has known vulnerabilities.


Question: 554


Which of the following parameters in Communication Manager is used to enable media encryption for media servers?


  1. Media Server Encryption

  2. Multimedia Encryption

  3. SRTP Encryption

  4. Media Encryption Answer: D

Explanation: The Media Encryption parameter in Communication Manager is used to enable media encryption for media servers. This parameter allows you to specify the encryption mode (e.g., AES, DES) and encryption type (e.g., 128-bit, 256-bit) for media encryption on media servers.


Question: 555

How do you configure Trunks in Communication Manager?


  1. Trunks are configured in a separate Trunk Gateway application that integrates with Communication Manager.

  2. Trunks are managed by System Manager, which provides a centralized interface for configuring trunk settings.

  3. Trunks are automatically configured by Communication Manager based on the connected telephony equipment.

  4. Trunks are configured directly within the Communication Manager administration interface.


Answer: D


Explanation: Trunks in Communication Manager are configured directly within the Communication Manager administration interface. Administrators can define the various trunk types (such as ISDN, SIP, or analog), configure the trunk parameters (such as channel assignments and signaling protocols), and associate the trunks with the appropriate call routing and dial plan rules. This configuration is done directly within the Communication Manager management tools.


Question: 556


What happens if the Communication Manager Survivable Core Server (SCS) loses connection with the primary Communication Manager server?


  1. The SCS automatically fails over to a redundant SCS instance, if available

  2. The SCS maintains full functionality, continuing to provide communication services to the branch office

  3. The SCS enters a limited functionality mode, restricting certain features and services

  4. The SCS displays a warning message to users and waits for the connection

to be restored


Answer: C


Explanation: If the Communication Manager Survivable Core Server (SCS) loses connection with the primary Communication Manager server, it will enter a limited functionality mode. In this mode, the SCS will continue to provide basic communication services to the branch office, but certain features and services may be restricted or unavailable until the connection to the primary server is restored.


Question: 557


Which encryption algorithm provides the highest level of security for secure SIP signaling in Communication Manager?


  1. AES-256-CBC

  2. CAMELLIA-256-CBC

  3. ARIA-256-CBC

  4. ChaCha20-Poly1305 Answer: D

Explanation: The ChaCha20-Poly1305 encryption algorithm provides the highest level of security for secure SIP signaling in Communication Manager, as it offers both strong encryption and forward secrecy.


Question: 558


What is the primary benefit of using SSH public keys instead of passwords for Communication Manager administration?

  1. Improved performance and reduced latency for remote connections

  2. Easier management of SSH access for multiple administrators

  3. Reduced risk of password guessing or brute-force attacks

  4. All of the above


Answer: C


Explanation: The primary benefit of using SSH public keys instead of passwords for Communication Manager administration is the reduced risk of password guessing or brute-force attacks. Public-key cryptography provides a more secure authentication mechanism, making it much more difficult for unauthorized users to gain access to the system.


Question: 559


What is the default value for the Ciphers parameter in the ssh_config file on a Communication Manager system?


  1. hmac-sha2-256,hmac-sha2-512

  2. aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc

  3. ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman- group-exchange-sha256,diffie-hellman-group14-sha1

  4. All of the above


Answer: B


Explanation: The default value for the Ciphers parameter in the ssh_config file on a Communication Manager system is aes128-ctr,aes192-ctr,aes256- ctr,aes128-cbc,aes192-cbc,aes256-cbc, which specifies the preferred SSH cipher algorithms.

Question: 560


Which of the following SIP trunk configuration parameters is used to enable RTCP monitoring for the media traffic?


  1. RTCP Transmission

  2. RTCP Parameters

  3. RTCP Monitoring

  4. RTCP Mode


Answer: C


Explanation: The RTCP Monitoring parameter in the SIP trunk configuration is used to enable RTCP (Real-time Transport Control Protocol) monitoring for the media traffic over the SIP trunk. RTCP provides feedback on the quality and performance of the media transmission, allowing for better monitoring and troubleshooting of the SIP trunk connection.