Avaya 72301X Exam Dumps & Practice Test Questions

Question 1:

A customer is attempting to configure a new Branch Session Manager (BSM) within Avaya Aura® System Manager (SMGR) but encounters an issue where the SIP Entity Name does not appear during the BSM setup process. Upon reviewing the SIP Entity configuration. 

What SIP Entity Type must be selected to ensure proper visibility and selection?

A. Branch Session Manager (BSM)
B. LSP
C. Avaya Aura Session Manager (SM)
D. SIP Trunk

Correct Answer: A

Explanation:

When configuring Avaya Aura® environments, especially in distributed or branch office scenarios, the Branch Session Manager (BSM) plays a critical role. It operates similarly to a core Session Manager but is tailored for branch survivability, allowing SIP call control continuity even when the main data center or core Session Manager is unavailable.

A common issue that arises during BSM deployment is that the SIP Entity needed for the configuration doesn't show up in the System Manager interface. This typically happens because the SIP Entity was not created using the correct Entity Type. In System Manager, when you define a SIP Entity, you must choose from predefined types—each with unique behaviors, visibility rules, and integration paths.

To configure a BSM correctly, the SIP Entity Type must be explicitly set to "Branch Session Manager (BSM)". This selection informs System Manager that this SIP Entity is a specialized version of Session Manager meant for branch deployments. If a different type is chosen, even one closely related (like a standard Session Manager), the SIP Entity will not appear in the dropdown list when trying to add the BSM under the Branch Session Manager configuration.

Let’s evaluate the incorrect choices:

  • B. LSP (Local Survivable Processor): While often deployed alongside BSM for redundancy, the LSP is a separate component and is not a SIP entity used to route SIP signaling traffic. Choosing LSP as the entity type won't meet the BSM configuration criteria.

  • C. Avaya Aura Session Manager (SM): Though a BSM behaves similarly to a Session Manager, this option is reserved for core SMs, not branch-level instances. Selecting this type will prevent the system from recognizing it as a BSM.

  • D. SIP Trunk: This is used to configure SIP connections to other systems or providers and has no relevance to Session Manager roles.

In conclusion, to properly define and register a Branch Session Manager within System Manager, the SIP Entity Type must be set to Branch Session Manager (BSM). This ensures it is available during the setup process and functions correctly within the SIP environment.

Question 2:

Which specific configuration on the Avaya Session Border Controller for Enterprise (ASBCE) enables remote Avaya phones to download the 46xxsettings.txt file during their startup process?

A. File Transfer Server Flow
B. PPM Mapping Profile
C. File Transfer Mapping Profile
D. Reverse Proxy

Correct Answer: D

Explanation:

Remote Avaya endpoints, such as desk phones and softphones, require several files during their boot-up sequence, with 46xxsettings.txt being one of the most critical. This file contains key configuration settings like SIP server addresses, backup server details, VLAN information, and feature parameters. For phones connected inside the corporate LAN, accessing this file is straightforward. However, when phones are deployed remotely—outside the internal network—secure access to internal resources must be facilitated through the Avaya Session Border Controller for Enterprise (ASBCE).

The core feature that enables this secure access is the Reverse Proxy. A reverse proxy in ASBCE allows external devices (like remote phones) to make HTTP or HTTPS requests to a public-facing URL, which the ASBCE then translates and forwards to the correct internal web server hosting the configuration files, such as the 46xxsettings.txt.

Here’s how each option stacks up:

  • A. File Transfer Server Flow: While this helps define traffic handling for file transfers, it does not enable the external accessibility needed for remote devices to fetch internal configuration files. It is a supporting feature, not the mechanism that provides access.

  • B. PPM Mapping Profile: This is related to Personal Profile Manager data (button assignments, features, user profiles) that Avaya phones download after registration. It is not used during the initial file fetch process at boot.

  • C. File Transfer Mapping Profile: This sounds related but is not the component that handles the external routing of HTTP requests. It may play a role internally but won’t expose the file to a remote device.

  • D. Reverse Proxy: This is correct. A reverse proxy allows the ASBCE to safely route requests from the internet to internal resources while ensuring security, session awareness, and appropriate NAT (Network Address Translation). This is what allows a remote phone to access http://external.domain.com/46xxsettings.txt and have it served from an internal web server.

Thus, the Reverse Proxy is the essential configuration step that bridges external requests to internal file servers, making D the correct answer.

Question 3:

To enable remote users using Avaya One-X Communicator to access instant messaging (IM) and presence features provided by Avaya Breeze's Presence Services. 

Which configuration must be implemented on the Avaya Session Border Controller for Enterprise (ASBCE)?

A. Create an XMPP Mapping Profile
B. Set up a Reverse Proxy for Avaya Breeze
C. Configure XMPP Relay
D. Establish a Server Flow for Avaya Breeze

Correct Answer: B

Explanation:

When supporting remote workers using Avaya One-X Communicator, it’s essential to provide them with secure access to internal services such as instant messaging (IM) and presence, which are hosted on Avaya Breeze with the Presence Services snap-in. These remote users are typically outside the organization’s secure network and must pass through a security boundary—this is where the Avaya Session Border Controller for Enterprise (ASBCE) comes into play.

The ASBCE acts as a secure intermediary between internal applications and external clients. It handles NAT traversal, TLS security, and traffic proxying for remote Avaya applications. To provide access to Avaya Breeze’s web-based presence services, HTTP/HTTPS traffic must be routed through a reverse proxy.

Therefore, to enable remote access to Breeze Presence Services, the ASBCE must be configured with a Reverse Proxy for Avaya Breeze. This allows One-X Communicator clients to reach Breeze via HTTPS requests securely. Presence and IM functionality—particularly in modern Avaya environments—is delivered through REST and WebSocket APIs over HTTPS, not traditional XMPP-based communication.

Let’s look at why the other options are incorrect:

  • A. XMPP Mapping Profile: This is outdated. While XMPP was previously used for IM services, modern Breeze Presence Services rely on HTTPS-based APIs, making this option irrelevant in current Avaya Aura architectures.

  • C. XMPP Relay: Again, this refers to legacy XMPP communication methods used in older IM solutions. The current implementation of Presence Services in Breeze does not require an XMPP relay mechanism and instead uses web technologies.

  • D. Server Flow for Avaya Breeze: Server flows in ASBCE are typically used for SIP signaling and media routing, not for web-based traffic like IM and presence. Server flows define how voice or signaling sessions are handled, not web service access.

In conclusion, the correct and necessary configuration on the ASBCE to enable One-X Communicator users to connect to Avaya Breeze Presence Services is to configure a Reverse Proxy for Avaya Breeze. This ensures that remote users can access IM and presence features securely and reliably over HTTPS.

Question 4:

You receive an alert indicating the Branch Session Manager (BSM) is failing to work with the Local Survivable Processor (LSP) that's connected to Communication Manager (CM). You suspect the issue lies in the BSM SIP Entity IP configuration. 

What is the correct way to verify the BSM IP address on the LSP?

A. Use System Manager’s Element Cut-Through to run display lsp XXXX on CM and verify the BSM SIP IP on the first page
B. Log into the LSP's System Management Interface (SMI) and check the Optional BSM IP Address under Server Role settings
C. Use System Manager’s Element Cut-Through to run display survivable-processor XXXX on CM and check the IP address listed
D. Log into the main CM server’s SMI and inspect the Server Role configuration for BSM IP settings

Correct Answer: B

Explanation:

In Avaya Aura environments, Branch Session Manager (BSM) works with the Local Survivable Processor (LSP) to maintain telephony services during WAN outages or failures in the primary site. For this functionality to operate correctly, the BSM’s SIP Entity IP Address must be configured and recognized by the LSP.

The most accurate way to verify or modify the BSM IP configuration is through the System Management Interface (SMI) of the LSP server itself. After logging into the LSP’s SMI, navigate to:

Administration > Server (Maintenance) > Server Role

Here, under Optional BSM IP Address, you can view the configured SIP Entity IP address for the BSM. This IP address must match the one defined for the Branch Session Manager in System Manager, allowing proper SIP registration and failover capability.

Let’s assess the incorrect options:

  • A. display lsp XXXX in System Manager’s Element Cut-Through:
    This command shows general LSP details but does not include the BSM SIP IP Address. It is useful for status checks but not for verifying BSM-related configuration.

  • C. display survivable-processor XXXX in Element Cut-Through:
    While this command also deals with LSP configurations, it focuses more on survivable processor relationships, not SIP interconnectivity with BSM. Again, it won’t display the required BSM IP.

  • D. Logging into the main CM server's SMI:
    This is incorrect because BSM IP settings must be configured locally on the LSP, not on the primary CM. The main server does not control or reflect this specific configuration for survivability.

In summary, the most reliable method to verify the BSM SIP Entity IP address for an LSP is through the LSP’s own SMI interface, under the Optional BSM IP Address field in the Server Role configuration. This ensures the LSP knows where to direct SIP traffic in survivability scenarios, making Option B the correct choice.

Question 5:

A technician needs to confirm the deployment type of the Avaya Aura Web Gateway (AAWG) to ensure it is compatible with an Avaya Spaces Calling extension client. 

Which two methods can be used to verify the deployment type, and what should its value be for this integration to work? (Select two.)

A. Connect to AAWG using SSH, run the app configure command, navigate to deployment settings, and verify that the deployment type is set to Team Engagement.
B. Use SSH access, run app configure, navigate to Clustering Configuration, and check that the deployment type is set to Team Engagement.
C. Log into the AAWG web interface, go to System Information, and verify that the deployment type is Conference Only.
D. Access the AAWG web GUI, check the System Overview section, and confirm the deployment type is Team Engagement.

Correct Answers: A, D

Explanation:

Avaya Aura Web Gateway (AAWG) supports various deployment modes depending on the services being provided. When integrating Avaya Spaces Calling with the Avaya Aura platform, the correct deployment type must be configured and verified. The deployment type determines how AAWG interacts with the broader communication environment—either in a limited role or in full unified communication mode.

To support Avaya Spaces Calling, the required deployment mode is Team Engagement, which enables full integration with services like Session Manager, System Manager, and SIP trunks. There are two supported methods to verify this configuration:

  1. SSH Command-Line Access (Option A):
    Administrators can use an SSH client to connect to the AAWG server and run the app configure utility. This tool launches a menu-driven configuration interface where administrators can navigate to the deployment settings section. Here, the deployment type is explicitly shown. For Avaya Spaces Calling compatibility, it must be Team Engagement.

  2. Web Interface - System Overview (Option D):
    Alternatively, technicians can log into the AAWG’s web-based interface using a browser. From the dashboard, navigating to System Overview reveals the current deployment mode. If correctly configured for Spaces Calling, the deployment type displayed should again be Team Engagement.

Let’s review why the other two options are incorrect:

  • Option B: Although it refers to the correct CLI tool (app configure), it incorrectly suggests checking under Clustering Configuration. The deployment type is not found there—it resides in Deployment Settings, making this option partially misleading.

  • Option C: This suggests the deployment type should be Conference Only, which is not suitable for Avaya Spaces Calling. That mode is used for conference-only environments and does not support broader UC functions.

To confirm AAWG is properly configured for Avaya Spaces Calling, the deployment type must be verified as Team Engagement using either SSH (app configure) or the web GUI (System Overview). Therefore, the correct answers are A and D.

Question 6:

A customer reports they are unable to place SIP calls to the public network through their ISP after recent changes were made to the Avaya Session Border Controller for Enterprise (ASBCE). 

Which three configuration areas should a technician check for possible misconfigurations? (Choose three.)

A. Media Interface under Network & Flows
B. Signaling Interface under Network & Flows
C. SIP Servers under Services
D. Subscriber Flows under End Point Flows
E. TURN/STUN under DMZ Services

Correct Answers: A, B, C

Explanation:

When SIP calls to the public network stop working after modifications on the Avaya Session Border Controller for Enterprise (ASBCE), the most efficient way to troubleshoot is to focus on configuration areas that directly impact call signaling, routing, and media flow.

  1. Media Interface (Option A):
    The Media Interface determines how RTP (media) streams are routed through the SBC. If this interface is misconfigured—such as incorrect IP addresses, VLANs, or ports—calls may experience no audio, one-way audio, or even complete failure. It's essential that this interface matches the network design and SIP trunk requirements.

  2. Signaling Interface (Option B):
    This governs how SIP messages (such as INVITE, BYE, and REGISTER) are processed. If the Signaling Interface has the wrong IP, port, or protocol (UDP/TCP/TLS), SIP messages will either be blocked or misrouted. This would result in call setup failures, dropped calls, or unreachable external numbers.

  3. SIP Servers (Option C):
    Under Services > SIP Servers, technicians configure the endpoints or systems the SBC communicates with—such as Avaya Session Manager, PBXs, or ISP SIP trunks. A wrong server IP, incorrect port, or disabled entry can prevent outbound calls from reaching the SIP provider.

Now let’s look at the incorrect options:

  • Subscriber Flows (Option D):
    These define how internal SIP clients (like phones or soft clients) interact with the SBC. While important for internal registrations, they do not govern routing to the ISP or public network, so they aren’t a top priority when dealing with outbound SIP issues.

  • TURN/STUN Services (Option E):
    These services are used for NAT traversal, especially with WebRTC or remote workers. They’re unrelated to SIP trunk configuration and won’t affect standard calls to the public network made via an ISP.

For issues related to SIP call failures to the public network, the technician should focus on the Media Interface, Signaling Interface, and SIP Server settings. These directly control the path and rules for outbound call signaling and media handling. Therefore, the correct answers are A, B, and C.

Question 7:

A customer has deployed an Internet Friendly Gateway (IFG), but it fails to register with Avaya Aura® Communication Manager (CM). You are checking the configuration on the Avaya Session Border Controller for Enterprise (ASBCE) to confirm that the correct Media Gateway Controller (MGC) address is specified under the H.248 Servers.

What is the correct interface location and value to verify?

A. Access the ASBCE from the EMS web interface. Go to the ASBCE device menu, then navigate to Services > H.248 Servers, and ensure the CM IP address is listed under Server Type: Media Gateway Controller.
B. Open the EMS web interface, navigate to the ASBCE device menu, and go to Configuration Profiles > H.248 Profile. Confirm that the ASBCE Public IP is set under Media Gateway Controller.
C. From the EMS interface, select the ASBCE device, go to Services > H.248 Servers, and check that the ASBCE Public IP is configured as the Media Gateway Controller.
D. From the EMS interface, select the ASBCE device and navigate to Services > H.248 Servers to ensure the Media Gateway’s public IP is entered under the Media Gateway Controller field.

Correct Answer: A

Explanation:

In an Internet Friendly Gateway (IFG) configuration, media gateways connect securely to Avaya Aura® Communication Manager (CM) using the H.248 protocol, often through the Avaya Session Border Controller for Enterprise (ASBCE). A critical step in this setup is ensuring the correct Media Gateway Controller (MGC) is defined—this tells the gateway where to send its control signaling.

In the Avaya ecosystem, the CM serves as the MGC. Therefore, the ASBCE must be properly configured to relay H.248 messages from the Internet-facing gateway toward CM. To do this, you need to confirm that CM's IP address is registered correctly within ASBCE.

  • Option A is correct. The administrator must access the Element Management System (EMS) web interface for the ASBCE, navigate to the specific ASBCE device menu, then go to Services > H.248 Servers. Here, under Server Type: Media Gateway Controller, the IP address of CM must be configured. This setup ensures that all H.248 signaling is routed correctly, enabling successful registration of the IFG.

The following options reflect common misconfigurations:

  • Option B is incorrect. While it references the H.248 Profile configuration area, entering ASBCE’s own public IP as the MGC is a mistake. ASBCE is a signaling pass-through device, not a controller.

  • Option C is incorrect for the same reason as B—it mistakenly suggests assigning ASBCE’s IP address to the MGC role, which does not enable successful endpoint registration.

  • Option D is incorrect. Adding the Media Gateway’s own public IP in the MGC field is illogical. The gateway needs to find and communicate with the controller (CM), not itself.

In summary, for the IFG to work properly, ASBCE must forward H.248 messages to the correct MGC—CM. The key to achieving this lies in verifying that CM’s IP address is configured under the H.248 Servers section, which is only done correctly in Option A.

Question 8:

Which two models of Avaya Media Gateways are compatible for use as an Internet Friendly Gateway (IFG)? (Choose two.)

A. G550
B. G450
C. G430
D. G700

Correct Answers: B, C

Explanation:

An Internet Friendly Gateway (IFG) provides a secure and flexible way for remote Avaya SIP endpoints to connect to the corporate voice network over the internet. It enables NAT traversal, secure signaling, and media anchoring, typically used in remote work environments where users are located outside the enterprise firewall.

Not all Avaya Media Gateways are capable of functioning as IFGs. To be eligible, a media gateway must support modern SIP features, integrate seamlessly with Avaya Aura® Communication Manager, and offer the performance and security needed for internet-facing deployments.

  • Option B – G450: This model is fully compatible with IFG. It is designed for high-capacity branches or regional offices and supports advanced SIP functionality. It includes the necessary firmware and media services to act as a reliable IFG, handling remote user traffic, encryption, and session management.

  • Option C – G430: Like the G450, this gateway supports IFG capabilities. Though smaller and more suited to mid-sized branch offices, the G430 includes the software and SIP features necessary for anchoring media and facilitating secure SIP registration through the ASBCE.

The following models do not support IFG functionality:

  • Option A – G550: While once considered a flagship model, the G550 has not been updated to support IFG features. It lacks the newer firmware enhancements and SIP gateway capabilities required for secure internet-facing configurations.

  • Option D – G700: This is an outdated model from a legacy generation of Avaya products. It does not support the SIP features or software compatibility required to serve as an IFG. Its architecture is not designed for modern SIP trunking, encryption, or NAT traversal.

Choosing unsupported gateways like the G550 or G700 could lead to failed SIP registrations, insecure communication, or inability to traverse firewalls—all of which would negate the purpose of deploying an IFG.

In conclusion, the only gateways listed that meet the hardware and software requirements for IFG deployment are the G450 (B) and G430 (C). These models enable secure, scalable connectivity for remote users and are fully supported in Avaya Aura® infrastructures.

Question 9:

Which of the following accurately highlights a key benefit provided by the Avaya Session Border Controller for Enterprise (ASBCE) when supporting remote employees?

A. Remote users can connect without relying on a VPN when ASBCE is used
B. Remote users have access to fewer telephony features than those in the office
C. Firmware updates for endpoints require remote users to be connected inside the corporate network
D. Remote users must use a separate set of dialing rules than internal employees

Correct Answer: A

Explanation:

The Avaya Session Border Controller for Enterprise (ASBCE) plays a pivotal role in facilitating secure remote connectivity for enterprise communication systems. It acts as a secure interface between the internal Avaya infrastructure and external networks, ensuring that employees working from remote locations can access enterprise telephony services without requiring a Virtual Private Network (VPN).

Option A is correct because one of ASBCE’s primary design advantages is to eliminate the need for VPN connections for remote users. It achieves this through support for protocols such as SIP, TLS, and SRTP, which provide secure signaling and media encryption over the public internet. Additionally, ASBCE handles NAT traversal and provides reverse proxy services, enabling endpoint devices—like Avaya One-X Communicator, Equinox, and J-Series phones—to register and operate as if they were on the internal network, all while being located remotely.

Option B is incorrect because ASBCE enables feature parity between remote and in-office users. Remote employees retain access to core features such as voicemail, conferencing, call forwarding, hold, transfer, and even presence. The registration through ASBCE ensures that remote users are fully integrated into the corporate communication system.

Option C is also incorrect. Firmware updates for Avaya endpoint devices do not require connection to the internal enterprise network if ASBCE’s reverse proxy is properly configured. These devices can securely access update files hosted on internal servers through ASBCE, meaning updates can occur over the internet just as they would within the office.

Option D is incorrect because dialing rules are centrally managed by systems like Session Manager and Communication Manager, and these rules apply universally, regardless of user location. Both remote and on-site users follow the same dial plan, call routing policies, and feature codes, ensuring a consistent communication experience.

In summary, the Avaya Session Border Controller for Enterprise significantly simplifies the deployment of remote users by removing the requirement for VPN, maintaining feature consistency, and supporting secure, remote firmware management. These capabilities are essential for enabling flexible, modern work environments, and they make Option A the most accurate answer.

Question 10:

What is the correct signaling protocol used for communication between Application Enablement Services (AES) and Avaya Aura Communication Manager (CM)?

A. REST
B. ASAI
C. SIP
D. CTI

Correct Answer: B

Explanation:

In the Avaya Aura ecosystem, Application Enablement Services (AES) acts as the bridge between Communication Manager (CM) and external software applications, enabling advanced Computer Telephony Integration (CTI) capabilities such as screen pops, call control, and call tracking. The protocol that facilitates direct communication between AES and CM is called ASAI, or Adjunct Switch Application Interface.

ASAI is a proprietary, Avaya-developed protocol specifically designed for real-time signaling between the switch (CM) and adjunct servers (like AES). This protocol enables bidirectional communication, allowing AES to both monitor events (e.g., call state changes, agent status) and issue commands (e.g., transfer, conference, hold) to the switch.

Why ASAI is correct:
When configuring AES, a Switch Connection must be defined, which corresponds to a CTI Link on the CM side. This link leverages the ASAI protocol to manage communication. Once the link is established, applications interfacing with AES—such as contact center software, CRM integrations, or custom CTI applications—can access a rich set of call control features in real time.

Let’s examine why the other options are incorrect:

  • A. REST:
    While AES does support REST APIs for client-side application integration, REST is not used for communication between AES and CM. REST is primarily used between client applications and AES, not for internal signaling with the Communication Manager.

  • C. SIP:
    SIP (Session Initiation Protocol) is essential in VoIP environments for establishing, managing, and terminating multimedia sessions. However, SIP is used primarily between endpoints, CM, and Session Manager—not for signaling between AES and CM.

  • D. CTI:
    CTI stands for Computer Telephony Integration, which is a general concept rather than a protocol. While AES is a CTI platform, the question asks for the specific signaling protocol, not the category of service. Using "CTI" as an answer is too vague and lacks the required specificity.

In conclusion, ASAI is the actual protocol that forms the signaling backbone between AES and Communication Manager. It enables the rich CTI features businesses depend on for integrating their voice infrastructure with customer service, automation, and analytics platforms. The only correct and precise answer is B.


SPECIAL OFFER: GET 10% OFF

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |