Which two of the following methods can be used to challenge the identity of a TelePresence endpoint
seenagape
Which two of the following methods can be used to challenge the identity of a TelePresence endpoint from a Cisco Unified Communications Manager servers? (Choose two)