Which of the following is most likely the reason that Cisco Jabber cannot connect to the user’s desk pho
You are the administrator for your company’s UCM network. Examine the exhibit below, and answer the question: Which of the following is most likely the reason that Cisco Jabber cannot connect to the user’s desk phone? A. The Cisco Unity Connection server is not running. B. A workstation firewall is preventing Cisco Jabber from connecting […]
Which of the following is most likely the reason?
The user named Joe Cambers is not able to use Cisco Jabber’s IM or Presence functionality. Which of the following is most likely the reason? A. The softphone has no SIP profile. B. The softphone’s profile does not allow CTI control. C. The SIP trunk to the CUPS server is down. D. The Cisco Unity […]
Which of the following is not a service provided by UCM media resources?
Which of the following is not a service provided by UCM media resources? A. annunciator B. conferencing C. media termination D. MOH E. transcoding F. voice mail Explanation: Of the available choices, voice mail is not a service provided by Cisco Unified Communications Manager (UCM)media resources. Voice mail services can be provided to a UCM […]
Which of the following line appearance fields should you modify in UCM?
You want to configure caller ID to display a user name instead of a dn for internal callers. Which of the following line appearance fields should you modify in UCM? A. Display B. External Phone Number Mask C. Line Text Label D. Visual Message Waiting Indicator Policy Explanation: You should modify the Display (Internal Caller […]
Which of the following could be best described as an advanced persistent attack? (Select the best answer.)
Which of the following could be best described as an advanced persistent attack? (Select the best answer.) A. a DDoS attack B. Operation Aurora C. the Heartbleed vulnerability D. POODLE Explanation: Of the available choices, Operation Aurora could be best described as an advanced persistent threat. An advanced persistent threat is an intrusion in which […]
Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match t
Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match the policy proposed by the remote peer? (Select the best answer.) A. AG_NO_STATE B. MM_NO_STATE C. AG_AUTH D. MM_KEY_AUTH E. QM_IDLE Explanation: Of the available choices, the MM_NO_STATE state is most likely to indicate that the […]
Which of the following is true? (Select the best answer.)
You issue the show ntp associations detail command on Router2 and receive the following output: Router2#show ntp associations detail 10.0.12.1 configured, authenticated, our_master, sane, valid, stratum 3 ref ID 127.127.1.1, time BF6C06E0.55040FD5 (09:02:04.717 UTC Thu Jul 25 2013) Which of the following is true? (Select the best answer.) A. Router2 has successfully authenticated the NTP […]
EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the bes
EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the best answer.) A. TLS 1.0 B. TLS 1.1 C. TLS 1.2 D. TLS 1.3 Explanation: Extensible Authentication ProtocolFlexible Authentication via Secure Tunneling Version 2 (EAPFASTv2) implemented a requirement to support Transport Layer Security (TLS) 1.2. EAPFAST is an authentication protocol that […]
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You i
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You issue the following commands on Router1: interface serial 0/0 ip ospf authenticationkey b0s0n router ospf 1 routerid 1.1.1.1 network 10.10.10.0 0.0.0.255 area 1 network 192.168.51.48 0.0.0.3 area 1 area 0 authentication You issue the following commands on Router2: interface […]
Which of the following is a type of phishing attack that specifically targets highranking corporate executives
Which of the following is a type of phishing attack that specifically targets highranking corporate executives? (Select the best answer.) A. vishing B. pharming C. whaling D. dumpster diving Explanation: Whaling is a type of spear phishing attack used to retrieve sensitive information from highranking executives of a corporation. Phishing is a social engineering technique […]