What are two authentication mechanisms for identity provider authentication? (Choose two.)

What are two authentication mechanisms for identity provider authentication? (Choose two.)A . UID B. PKI/CAC C. ACS D. Password only E. KerberosView AnswerAnswer: B,C

June 13, 2023 No Comments READ MORE +

How is this additional requirement met?

An engineer must configure open SIP Federation on cisco IM and presence using cisco Expressways with the additional requirement not to allow a specific list if domains and allow all other domains that are not specified. How is this additional requirement met?A . Configure default static routes for each blocked...

June 13, 2023 No Comments READ MORE +

What happens when a browser-based client attempts to access a protected resource on a service provider?

SAML SSO is enabled in Cisco Unified Communications Manager. What happens when a browser-based client attempts to access a protected resource on a service provider?A . The browser follows the redirect and issues an HTTPS GET request to the IdP. B. The IdP checks for a valid browser session. C....

June 12, 2023 No Comments READ MORE +

Which action resolves this issue?

Refer to the exhibit. An engineer assists a user who reports that the voicemall notifications show correctly on the desk phone are not available in the jabber client. Which action resolves this issue?A . Reset the Jabber client and have the user sign in again B. Set the voicemail profile...

June 12, 2023 No Comments READ MORE +

Which configuration Is necessary to enable the Jabber persistent chat feature on mobile devices?

The persistent chat feature is configured in a Cisco Jabber deployment that is running Cisco Unified IM and Presence 11.5 SU6 Desktop clients are working but mobile clients are not displaying persistent chats. Which configuration Is necessary to enable the Jabber persistent chat feature on mobile devices?A . while logged...

June 12, 2023 No Comments READ MORE +

Which DNS record is used for on-premises service by Jabber clients?

Which DNS record is used for on-premises service by Jabber clients?A . _collab-edge._tcp.<domain> SRV record B. _cisco-uds._tls.<domain> SRV record C. _cisco-uds._tcp.<domain> SRV record D. <tftp server FQDN> A recordView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/Windows/9_7/CJAB_BK_C606D8A9_00_cisco-jabber-dns-configuration-guide/CJAB_BK_C606D8A9_00_cisco-jabber-dns-configuration-guide_chapter_010.html

June 12, 2023 No Comments READ MORE +

How is this accomplished?

An engineer needs to configure the cisco unity connection Auto-attendant feature to transfer calls to a specific destination, maintain control of the transfer, and take a defined administrative action upon failure. How is this accomplished?A . Consult Transfer B. Supervised Transfer C. Release to Switch D. HookFlash TransferView AnswerAnswer: A

June 12, 2023 No Comments READ MORE +

What are two Cisco Jabber 12.6 on-premises deployment types that can be run on a Windows-enabled PC? (Choose two.)

What are two Cisco Jabber 12.6 on-premises deployment types that can be run on a Windows-enabled PC? (Choose two.)A . Contact Center Agent B. IM-only C. multicloud-based D. Full UC E. cloud-basedView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/12_6/cjab_b_on-prem-deployment-cisco-jabber_12-6.pdf

June 12, 2023 No Comments READ MORE +

Which two authentication command line arguments ensure that the client authenticates to a Cisco UCM server?

A collaboration engineer is installing Jabber for Windows via the CLI. Which two authentication command line arguments ensure that the client authenticates to a Cisco UCM server? (Choose two.)A . CCMCIP=10.10.10 99 B. CUP_ADDRESS=10.10.10.98 C. CTI=10.10.10.97 D. REGISTRATION_SERVER=CUCM E. EXCLUDED_SERVICES=WebexView AnswerAnswer: B,D

June 12, 2023 No Comments READ MORE +

Which description of an IdP server is true?

Which description of an IdP server is true?A . authenticates user credentials B. provides user authorization C. is an authentication request that is generated by a Cisco Unified Communications application D. consists of pieces of security information that are transferred to the service provider for user authenticationView AnswerAnswer: A Explanation:...

June 11, 2023 No Comments READ MORE +