Which type of IOS Conference bridge requires all users to use the same video format in order to participate in
Which type of IOS Conference bridge requires all users to use the same video format in order to
participate in a video conference?
Which Cisco Security Manager application collects information about device status and uses it to generate noti
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?
Which two of the following DSPs can be used in heterogeneous conferencing to achieve the required trans-sizing
Which two of the following DSPs can be used in heterogeneous conferencing to achieve the required
trans-sizing and transcoding functionality? (Choose two.)
What is the best practice for URL filtering to solve the problem?
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URL
filtering to solve the problem?
Which of the following simplifies and enhances conference resource management?
Which of the following simplifies and enhances conference resource management?
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?
What is the maximum number of I080p30 HD Conference Participants if an MSE 8000 has four MSE8710 blades cluste
What is the maximum number of I080p30 HD Conference Participants if an MSE 8000 has four MSE8710
blades clustered?
What are the two benefits of using SIP dial rules on an IP phone?
What are the two benefits of using SIP dial rules on an IP phone? (Choose two)
What action can you take to allow the user access to the IP address?
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not
able to access a certain IP address. What action can you take to allow the user access to the IP address?
Which three Cisco Unified CallManager configuration steps are required to support third party SIP phones?
Which three Cisco Unified CallManager configuration steps are required to support third party SIP
phones? (Choose three.)