When neither the active or standby Location Bandwidth Manager in the configured LBM group is available, what will the Cisco CallManager service on a subscriber Cisco Unified Communications Manager server do to make location CAC decisions?
When neither the active or standby Location Bandwidth Manager in the configured LBM group is available, what will the Cisco CallManager service on a subscriber Cisco Unified Communications Manager server do to make location CAC decisions?A . It will attempt to communicate with the first configured member in the Location...
What should you install on Server1 before you run the Configure NAP wizard?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed. You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using...
Where in the TMS application does an engineer enter system license keys?
Where in the TMS application does an engineer enter system license keys?A . DiagnosticsB . Administrative SettingsC . MaintenanceD . General SettingsView AnswerAnswer: D
RPO sign system can tolerate the largest amount of data loss. the smaller the amount of data of system to tolerate the loss, the smaller the value of the RPO.
RPO sign system can tolerate the largest amount of data loss. the smaller the amount of data of system to tolerate the loss, the smaller the value of the RPO.A . TRUEB . FALSEView AnswerAnswer: A
Which three options are attack vectors protected by Email Security? (Choose three)
Which three options are attack vectors protected by Email Security? (Choose three)A . EndpointsB . Offline DevicesC . MobileD . E-mailE . VoicemailF . BackupsView AnswerAnswer: ACD
Which three actions should you perform in sequence?
DRAG DROP You administer a Microsoft SQL Server 2012 database. The database uses SQL Server Agent jobs to perform regular FULL and LOG backups. The database uses the FULL recovery model. You plan to perform a bulk import of a very large text file. You need to ensure that the...
Where in Cisco Unified Communications Manager is BFCP enabled?
Where in Cisco Unified Communications Manager is BFCP enabled?A . enterprise phone configurationB . SIP trunk security profileC . SIP profileD . common phone profileE . common device configurationView AnswerAnswer: C
What two commands enable port security and allow the switch to dynamically learn the connected MAC address? (Choose two.)
What two commands enable port security and allow the switch to dynamically learn the connected MAC address? (Choose two.)A . switch5 (config-if) #switchport port-securityB . switch5 (config) #switchport port-securityC . switch5 (config-if) #switchport port-security mac-address stickyD . switch5 (config) #switchport port-security mac-address stickyE . switch5 (config-if) #switchport port-security mac-address dynamicF...
Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)
Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)A . Cisco Defense OrchestratorB . Cisco UmbrellaC . Cisco Identity Services EngineD . Cisco Web Security ApplianceE . Cisco Email Security ApplianceView AnswerAnswer: B, D
A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?
A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?A . Insecure direct object references, CSRF, SmurfB . Privilege escalation, Application DoS, Buffer...