There are two GUI-based access tools available: Avaya site administration (ASA) and system management interface (SMI). Which statement correctly differentiates between ASA and SMI?
A. Both SMI and ASA can perform the same administration tasks but ASA is being replaced by SMI.
B. Both SMI and ASA can perform the same administration tasks but SMI is for technicians and ASA is for customers.
C. SMI provides access to less frequent administration, installation and upgrade functions, while ASA provides access to day-to-day administration functions.
D. Old hardware and software (Pre ?5.x) is administered using SMI, while current hardware and software (5.x and later) is administered using ASA.
Communication Manager Backups are done through the system management interface (SMI). Which three statements about the Communication Manager backup function are correct? (Choose three)
A. The backup function creates two complete files on the internal hardware drive.
B. The backup function can create a file on a network device using protocols: SCP, SFTP, or FTP.
C. The backup function can encrypt the file with a pass phrase.
D. The backup is done dynamically and cannot be scheduled in advance.
E. The full Backup option does not do Save Transaction Command Automatically before creating the backup file.
Which user's does Call Park best serve?
A. users who travel domestically using smartphones for basic communication
B. users who need to pick up calls from any extension In the system when the call Is placed on hold
C. users who travel internationally using smartphones for basic communication
D. users who need to pick up calls from their smartphones while traveling
Which statement most accurately describes the function of automatic call back feature?
A. It allows internal users who placed a call to a busy or unanswered external telephone to be called back when the called telephone becomes available.
B. It allows internal users who placed a call to a busy or unanswered internal telephone to be called back when the called telephone becomes available.
C. It allows internal users who are called when they are busy to activate a feature to automatically call back that second caller, once the first call is finished.
D. It allows internal users who are called when they are busy to place the second call on hold until the first call is finished.
Which two Statements are true about Automatic Route Selection (ARS)? (Choose two)
A. ARS routes calls only across tie trunks to local switching equipment.
B. ARS routes calls to remote company locations in the absence of a private network.
C. ARS allows Communication Manager to use an ISDN trunk to connect to the PSTN.
D. ARS mutes calls across all trunk types but only to remote switching equipment
The station lock feature manually or automatically changes the COR of a station to block outgoing calls recently, extensions at a customer's site have been used for out of hours outgoing calls. IT would like to activate this feature automatically on the telephone on site. To address safety concerns, what do you tell the site manager regarding outgoing emergency calls and incoming or outgoing calls if staff needs to work overtime?
A. The station lock feature does not block incoming calls and using a code they can make emergency or outgoing calls.
B. The station lock features does not block outgoing emergency calls and using a code they can receive incoming calls and make outgoing calls.
C. The station lock feature does not block incoming calls or emergency outgoing calls and the telephone can be unlocked from designated telephone(s) by inputting a code.
D. The station lock feature does not block incoming calls or emergency outgoing calls and the telephone can be unlocked by inputting a code.
Security Violation show valid and invalid attempts to access the system using three types of codes. In addition to station security codes, which two types of codes are measured in security Violation reports? (Choose two)
A. barrier codes
B. access security gateway (ASG) codes
C. dial access codes (DAC)
D. authorization codes
E. administrative login codes
You must set the calling privileges for a user so that the user can make calls but not receive calls. You assign COR to the user's station. What other settings must be completed?
A. In COR 5, set calling party restriction = `origination' and called party restriction = `none'
B. In COR 5, set calling party restriction = `outward' and called party restriction = `termination'
C. In COR 5, set calling party restriction = `origination' and called party restriction = `termination'
D. In COR 5, set calling party restriction = `none' and called party restrictions = `termination'
Which parameters must be configured to implement Automatic Route Selection (ARS)?
A. Dial Plan, Codec Set, Private Numbering, Network Region
B. Far-End Node, Near-End Node, Coverage Path, Call Forwarding
C. Feature Access Code, Digit Analysis, Digit Conversion, Route Pattern, Trunk Group
D. MGC List, H 2<18 Link Timer, Call Admission Control. Feature Access Code
Which trunk type is supported by media module MM710, and circuit packs TN767E, TN464HP, TN2464CP, and TN2207?
A. An IP trunk
B. A DSI trunk
C. A SIP trunk
D. An analog trunk