Question: 547 Which of the following statements is true about the Communication Manager Survivable Core Server (SCS)? A. The SCS can only support a single branch office location B. The SCS can be used to extend the Communication Manager system to new locations C. The SCS can be deployed in a redundant configuration for high availability D. The SCS can only be managed through the Avaya Aura® System Manager Answer: C Explanation: The Communication Manager Survivable Core Server (SCS) can be deployed in a redundant configuration for high availability. This involves deploying multiple SCS instances at a branch office location to provide redundancy and ensure continuous operation in the event of an SCS failure. Question: 548 Which of the following SIP trunk configuration parameters is used to specify the call admission control (CAC) settings for the SIP trunk? A. CAC Configuration B. Trunk Group C. Bandwidth Allocation D. IP Network Region Answer: D Explanation: The IP Network Region configuration in the SIP trunk settings is used to specify the call admission control (CAC) settings for the SIP trunk. This includes parameters like the available bandwidth, codec preferences, and other network-related settings that are used to manage and control the call capacity and quality over the SIP trunk connection. Question: 549 How do you perform basic maintenance and troubleshooting in Communication Manager? A. Basic maintenance and troubleshooting is performed in a separate Network Management application that integrates with Communication Manager. B. Basic maintenance and troubleshooting is managed by System Manager, which provides a centralized interface for performing these tasks. C. Basic maintenance and troubleshooting is automated by Communication Manager, with no direct administrator intervention required. D. Basic maintenance and troubleshooting is performed directly within the Communication Manager administration interface. Answer: D Explanation: Basic maintenance and troubleshooting tasks in Communication Manager, such as viewing system logs, monitoring performance metrics, and performing routine backups, are performed directly within the Communication Manager administration interface. Administrators can access various diagnostic tools and utilities within the Communication Manager management tools to maintain the system and troubleshoot any issues that may arise. Question: 550 Which parameter in the sshd_config file controls the maximum number of authentication attempts allowed per connection? A. MaxLoginAttempts B. MaxAuthTries C. MaxStartups D. PermitRootLogin Answer: B Explanation: The MaxAuthTries parameter in the sshd_config file controls the maximum number of authentication attempts allowed per connection on a Communication Manager system. Question: 551 How do you configure Endpoints in Communication Manager? A. Endpoints are managed by System Manager, which provides a centralized interface for configuring endpoint settings. B. Endpoints are configured directly within the Communication Manager administration interface. C. Endpoints are automatically detected and configured by Communication Manager based on the connected devices. D. Endpoints are configured in a separate device management application that integrates with Communication Manager. Answer: A Explanation: Endpoints in Communication Manager, such as IP phones, softphones, and other communication devices, are managed and configured through the System Manager interface. System Manager provides a centralized point of administration for defining and managing endpoint settings, including registration, configuration parameters, and device associations across the AvayaAura® environment. This allows for consistent endpoint management and provisioning across multiple Communication Manager servers. Question: 552 Which ARS feature can be used to implement least-cost routing for outgoing calls? A. ARS Partition B. ARS Digit Conversion C. ARS Time of Day Routing D. ARS Routing Plan Answer: D Explanation: The ARS Routing Plan feature can be used to implement least-cost routing for outgoing calls. By prioritizing the trunk groups in the Routing Plan based on their cost, ARS will automatically select the most cost-effective trunk group to route the call, unless the preferred trunk groups are unavailable or exceed the configured capacity. Question: 553 Which Secure Shell (SSH) protocol version is recommended for Communication Manager administration? A. SSH version 1 B. None of the above C. Both SSH version 1 and 2 D. SSH version 2 Answer: D Explanation: SSH version 2 is the recommended protocol for Communication Manager administration as it provides enhanced security features compared to SSH version 1, which has known vulnerabilities. Question: 554 Which of the following parameters in Communication Manager is used to enable media encryption for media servers? A. Media Server Encryption B. Multimedia Encryption C. SRTP Encryption D. Media Encryption Answer: D Explanation: The Media Encryption parameter in Communication Manager is used to enable media encryption for media servers. This parameter allows you to specify the encryption mode (e.g., AES, DES) and encryption type (e.g., 128-bit, 256-bit) for media encryption on media servers. Question: 555 How do you configure Trunks in Communication Manager? A. Trunks are configured in a separate Trunk Gateway application that integrates with Communication Manager. B. Trunks are managed by System Manager, which provides a centralized interface for configuring trunk settings. C. Trunks are automatically configured by Communication Manager based on the connected telephony equipment. D. Trunks are configured directly within the Communication Manager administration interface. Answer: D Explanation: Trunks in Communication Manager are configured directly within the Communication Manager administration interface. Administrators can define the various trunk types (such as ISDN, SIP, or analog), configure the trunk parameters (such as channel assignments and signaling protocols), and associate the trunks with the appropriate call routing and dial plan rules. This configuration is done directly within the Communication Manager management tools. Question: 556 What happens if the Communication Manager Survivable Core Server (SCS) loses connection with the primary Communication Manager server? A. The SCS automatically fails over to a redundant SCS instance, if available B. The SCS maintains full functionality, continuing to provide communication services to the branch office C. The SCS enters a limited functionality mode, restricting certain features and services D. The SCS displays a warning message to users and waits for the connection to be restored Answer: C Explanation: If the Communication Manager Survivable Core Server (SCS) loses connection with the primary Communication Manager server, it will enter a limited functionality mode. In this mode, the SCS will continue to provide basic communication services to the branch office, but certain features and services may be restricted or unavailable until the connection to the primary server is restored. Question: 557 Which encryption algorithm provides the highest level of security for secure SIP signaling in Communication Manager? A. AES-256-CBC B. CAMELLIA-256-CBC C. ARIA-256-CBC D. ChaCha20-Poly1305 Answer: D Explanation: The ChaCha20-Poly1305 encryption algorithm provides the highest level of security for secure SIP signaling in Communication Manager, as it offers both strong encryption and forward secrecy. Question: 558 What is the primary benefit of using SSH public keys instead of passwords for Communication Manager administration? A. Improved performance and reduced latency for remote connections B. Easier management of SSH access for multiple administrators C. Reduced risk of password guessing or brute-force attacks D. All of the above Answer: C Explanation: The primary benefit of using SSH public keys instead of passwords for Communication Manager administration is the reduced risk of password guessing or brute-force attacks. Public-key cryptography provides a more secure authentication mechanism, making it much more difficult for unauthorized users to gain access to the system. Question: 559 What is the default value for the Ciphers parameter in the ssh_config file on a Communication Manager system? A. hmac-sha2-256,hmac-sha2-512 B. aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc C. ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellmangroup-exchange-sha256,diffie-hellman-group14-sha1 D. All of the above Answer: B Explanation: The default value for the Ciphers parameter in the ssh_config file on a Communication Manager system is aes128-ctr,aes192-ctr,aes256ctr,aes128-cbc,aes192-cbc,aes256-cbc, which specifies the preferred SSH cipher algorithms. Question: 560 Which of the following SIP trunk configuration parameters is used to enable RTCP monitoring for the media traffic? A. RTCP Transmission B. RTCP Parameters C. RTCP Monitoring D. RTCP Mode Answer: C Explanation: The RTCP Monitoring parameter in the SIP trunk configuration is used to enable RTCP (Real-time Transport Control Protocol) monitoring for the media traffic over the SIP trunk. RTCP provides feedback on the quality and performance of the media transmission, allowing for better monitoring and troubleshooting of the SIP trunk connection.