Enjoy 15% Discount With Coupon 15off

Monthly Archives - March 2020

Which three statements about configuring an encrypted trunk between Cisco TelePresence Video Communication Server and Cisco Unified Communications Manager are true? (Choose three.)

Which three statements about configuring an encrypted trunk between Cisco TelePresence Video Communication Server and Cisco Unified Communications Manager are true? (Choose three.)A . The root CA of the VCS server certificate must be loaded in Cisco Unified Communications Manager.B . A SIP trunk security profile must be configured with...

Read more...

When configuring asynchronous remote replication, how many internal Unity Snapshots are configured and utilized on the source system by a single replication session?

When configuring asynchronous remote replication, how many internal Unity Snapshots are configured and utilized on the source system by a single replication session?A . 1B . 2C . 3D . 4View AnswerAnswer: B Explanation: Internal Snapshot (Replication Snapshot) are Unity Snapshots created by the system which are part of an...

Read more...

When the LUN Snapshot Attach to Host operation is performed, what does the Unity system optionally do before beginning the attach process?

When the LUN Snapshot Attach to Host operation is performed, what does the Unity system optionally do before beginning the attach process?A . Creates a snapshot of the LUNB . Detaches the host from the snapshots of any other LUNC . Creates a copy of the snapshotD . Deletes all...

Read more...

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?A . a switch with priority 20480B . a switch with priority 8192C . a switch with priority 4096D . a switch with priority 12288View AnswerAnswer: A

Read more...

Which IDPS technique uses a database that contains known attack patterns?

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C Explanation: Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf

Read more...