Which two role types have access to CUIC reporting objects maintained through a system of Roles and Permissions? (Choose two.)
Which two role types have access to CUIC reporting objects maintained through a system of Roles and Permissions? (Choose two.)A . Report DesignerB . Dashboard AdministratorC . Security AdministratorD . Report Definition DesignerE . Security Configuration DesignerView AnswerAnswer: A, D
How does Precision Queue allow callers to reach an Agent that is different from Skill groups?
How does Precision Queue allow callers to reach an Agent that is different from Skill groups?A . the number of calls the agent has takenB . the Weight of the attributeC . the agent with the Most AttributesD . Longest AvailableView AnswerAnswer: B
Which configuration by an administrator in Agent Desk Settings allows this action?
In a contact center, agents must select the Reason Code when they go to the "Not Ready" state. Which configuration by an administrator in Agent Desk Settings allows this action?A . Wrap-up on Incoming, set to RequiredB . Enable "Require Logout Reason"C . Enable "Require Idle Reason"D . Wrap-up on...
Which two servers can be accessed from the Web Administration tool? (Choose two.)
Which two servers can be accessed from the Web Administration tool? (Choose two.)A . RoggerB . PGC . DCCMPD . CVPE . FinesseView AnswerAnswer: D, E
How are additional ICM Tools added?
How are additional ICM Tools added?A . Script Editor is available in the PG and ICM Router server.B . PG Server node will add the additional tools provided in the Administration Tools folder.C . Admin Server node will add the additional tools provided in the Administration Tools folder.D . The...
How can the Extension Mobility feature be described?
How can the Extension Mobility feature be described?A . As part of the configuration, the Device profile needs to be created in CCE and associate each Device Profile with the appropriate Agent.B . As part of the configuration, both device profiles and phones need to be added to the pg...
Users should be associated as members of a Security Group to access Configuration Manager or Script Editor. Where can this task be accomplished?
Users should be associated as members of a Security Group to access Configuration Manager or Script Editor. Where can this task be accomplished?A . CCE Admin pageB . Domain ManagerC . Active DirectoryD . Configuration ManagerView AnswerAnswer: C
Which two functionalities provide an Interactive Voice Response system (IVR) in a Contact Center environment? (Choose two.)
Which two functionalities provide an Interactive Voice Response system (IVR) in a Contact Center environment? (Choose two.)A . access a database and provide the caller with all the needed information to complete the transaction (Self Service)B . TCP/IP connections through the networkC . reportingD . heartbeat mechanism between Contact Center...
In a CCE Call Flow, which step comes after the call arrives and is held on a port on the Ingress Gateway?
In a CCE Call Flow, which step comes after the call arrives and is held on a port on the Ingress Gateway?A . ICM responds to the Route Request by running a Routing Script.B . CVP delivers a Route Request to the ICM Central Controller.C . CVP establishes an HTTP...
How many Workflows are supported by Finesse?
How many Workflows are supported by Finesse?A . up to 20 Workflows with 5 per TeamB . up to 100 Workflows with 5 per TeamC . up to 100 Workflows with 20 per TeamD . up to 200 Workflows with 20 per TeamView AnswerAnswer: C