Which two describe how media resources and audio streams operate with Cisco Unified Communications Manager? (Choose two.)
Which two describe how media resources and audio streams operate with Cisco Unified Communications Manager? (Choose two.)A . Audio streams are terminated differently depending on the signaling protocol, such as SCCP or SIC . Audio streams are always terminated by media resources.D . All media resources register with Cisco Unified...
Which two advanced WLAN options are required when deploying central web authentication with Cisco ISE? (Choose two.)
Which two advanced WLAN options are required when deploying central web authentication with Cisco ISE? (Choose two.)A . P2P Blocking Action set to Drop.B . NAC State RADIUS NACC . NAC State SNMP NAE . DHCP Addr. Assignment disabled.F . Allow AAA override enabled.View AnswerAnswer: BE Explanation: From: http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-webauth-00.html
The terms "bitmap," "b-tree," and "hash" refer to which type of database structure?
The terms "bitmap," "b-tree," and "hash" refer to which type of database structure?A . viewB . functionC . indexD . stored procedureE . triggerView AnswerAnswer: C
Which statement about zone-based firewall configuration is true?
Which statement about zone-based firewall configuration is true?A . Traffic is implicitly denied by default between interfaces the same zoneB . Traffic that is desired to or sourced from the self-zone is denied by defaultC . The zone must be configured before a can be assignedD . You can assign...
Which collection type should you use?
You are developing an application that includes a class named Order. The application will store a collection of Order objects. The collection must meet the following requirements: • Internally store a key and a value for each collection item. • Provide objects to iterators in ascending order based on the...
Which of the following IPsec parameters is a phase 2 configuration setting?
Which of the following IPsec parameters is a phase 2 configuration setting? Response:A . Peer IDB . eXtended Authentication (XAuth)C . Quick mode selectorsD . Authentication methodView AnswerAnswer: C
Does this meet the goal?
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. Solution: You enable the decommissioning...
This action is known as which of the following?
A business has implemented a new online performance management tool that allows functional and project managers to rate employees online. This action is known as which of the following?A . Business process changeB . Organizational changeC . Internal reorganizationD . Business continuity planningView AnswerAnswer: A Explanation: References: Kim Heldman, CompTIA...
Which report should you use?
You observe that the small boxes of a specific product are not selling well compared to the large boxes of the same product. You need to know how many of the small boxes of the product you have on hand and where the boxes are located. Which report should you...
Which option describes how to rank the density of APs needed to support location services versus data and voice services?
When designing a WLAN, AP placement is important. Which option describes how to rank the density of APs needed to support location services versus data and voice services?A . Data services have the lowest density of APs compared to location services, which has the highest density.B . Data services have...