Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-801 Topic 13 Question 90 Discussion

Actual exam question for Cisco's 350-801 exam
Question #: 90
Topic #: 13
[All 350-801 Questions]

The security department will audit an IT department to ensure that the proper guidelines are being followed. The reports of the call detail records show unauthorized access to PSTN. Which two actions should an administrator check to prevent the unauthorized use of the telephony system? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

When building a variable-length route pattern, you need to create a second route pattern followed by the # wildcard. This will allow the user to indicate the end of the number by dialing #. For example, if you want to create a route pattern for international calls, you would create a route pattern like this:

9.011!#

This route pattern will match any number that starts with 9.011, followed by any number of digits, and then ends with #.

The other options are incorrect because:

Configuring a single route pattern for international calls will not allow the user to indicate the end of the number.

Setting up all international route patterns to 0.! will not allow the user to indicate the end of the number.

Reducing the T302 timer to less than 4 seconds will not allow the user to indicate the end of the number.


Contribute your Thoughts:

Anna
1 months ago
Wait, so they're auditing the IT department to make sure they're following the guidelines? I thought the IT department was the one making the guidelines! Talk about role reversal.
upvoted 0 times
Janet
19 days ago
A) Ensure that ad hoc conference calls are dropped if an external user is add.
upvoted 0 times
...
...
Casie
1 months ago
A is a bit of a head-scratcher. Why would you drop conference calls just because an external user is added? That seems like it would cause more problems than it solves.
upvoted 0 times
...
Amie
1 months ago
D is interesting, but I'm not convinced it's the right approach. Restricting extension mobility CSS is more about user management than telephony security.
upvoted 0 times
Denise
4 days ago
C) Add an additional firewall between the Cisco UCM server and the Expressway Core server.
upvoted 0 times
...
Tamesha
14 days ago
B) Call forward settings (ALL/Busy/No Answer) are restricted to internal extensions in the network
upvoted 0 times
...
Earnestine
16 days ago
A) Ensure that ad hoc conference calls are dropped if an external user is add.
upvoted 0 times
...
...
Yolando
2 months ago
I'm not sure about C. Adding a firewall between the UCM and Expressway servers seems like overkill for this specific issue.
upvoted 0 times
Markus
1 months ago
D) For extension mobility, logged-out CSS is restricted to internal extensions and emergencies.
upvoted 0 times
...
Stefany
1 months ago
B) Call forward settings (ALL/Busy/No Answer) are restricted to internal extensions in the network
upvoted 0 times
...
Zena
1 months ago
A) Ensure that ad hoc conference calls are dropped if an external user is add.
upvoted 0 times
...
...
Winfred
2 months ago
B and E seem like the best options to prevent unauthorized PSTN access. Restricting call forwarding and using forced authorization codes are effective security measures.
upvoted 0 times
Valentin
24 days ago
I think implementing these security measures will greatly reduce the risk of unauthorized access to the telephony system. It's important to stay vigilant and proactive in protecting our network.
upvoted 0 times
...
Cecil
25 days ago
Agreed, those measures will help ensure only authorized users can make PSTN calls. We should implement them as soon as possible.
upvoted 0 times
...
Fairy
1 months ago
B and E are definitely important to prevent unauthorized access. We need to restrict call forwarding and use authorization codes.
upvoted 0 times
...
...
Amira
2 months ago
Adding an additional firewall between the servers could also be a good idea for extra security.
upvoted 0 times
...
Dan
2 months ago
I agree, those two actions can help prevent unauthorized access to the telephony system.
upvoted 0 times
...
Josphine
2 months ago
I think we should check the call forward settings and the forced authorization code.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77