300-810 · Question #292
300-810 Question #292: Real Exam Question with Answer & Explanation
The correct answer is A: Set up a restriction table to block all external calls to do a hairpin call with the pattern ?.*T?. Toll fraud in Cisco Unity Connection occurs when unauthorized users exploit voicemail systems to make outbound calls. In this scenario, a restriction table can help mitigate the risk by controlling which calls Unity Connection can make: 1. Blocking Hairpin Calls with “.T”: The pa
Question
When an engineer configures a Cisco Unity Connection system, they must help prevent toll fraud. The system must be able to receive calls from external parties and allow for unauthenticated users to enter numbers to be transferred to other parties in case of a busy status or other away- status scenarios. Which basic configuration limits the risk of toll fraud in Cisco Unity Connection?
Options
- ASet up a restriction table to block all external calls to do a hairpin call with the pattern ?.*T?
- BThe default restriction table will, by default, block all numbers.
- CBlock all outgoing calls from the Cisco Unity Connection server with the pattern ?
- DSet up a restriction table to block all external calls to do a hairpin call with the pattern ?@*?
Explanation
Toll fraud in Cisco Unity Connection occurs when unauthorized users exploit voicemail systems to make outbound calls. In this scenario, a restriction table can help mitigate the risk by controlling which calls Unity Connection can make: 1. Blocking Hairpin Calls with “.T”: The pattern is used to match all calls that include a period (.) followed by a terminating digit (T), which typically indicates external or transferred calls. Configuring the restriction table to block such patterns ensures that Unity Connection cannot be used to place unauthorized external calls via hairpin dialing. 2. Why This Works: Restriction tables act as call filters in Unity Connection, allowing or denying certain dialing By explicitly blocking potentially risky patterns, the engineer limits the ability of attackers to abuse the system for toll fraud while still allowing valid operations like transferring calls to internal extensions.
Topics
Community Discussion
No community discussion yet for this question.