Which two steps com...
 
Notifications
Clear all

Which two steps complete the configuration of the SIP trunk security profile?

1 Posts
1 Users
0 Likes
155 Views
(@salterslloyd)
Posts: 746
Noble Member
Topic starter
 

Refer to the exhibit.

A collaboration engineer is configuring the Cisco UCM IM and Presence Service.

Which two steps complete the configuration of the SIP trunk security profile? (Choose two.)

  • A . Check the box to enable application-level authorization.
    B. Check the box to allow charging header.
    C. Check the box to accept unsolicited notification.
    D. Check the box to transmit security status.
    E. Check the box to accept replaces header.

Show Answer Hide Answer

Suggested Answer: C, E
 
Posted : 19/11/2022 3:03 pm

Latest 350-801 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: