Which steps resolve this issue?
Refer to the exhibit A collaboration engineer is troubleshooting an issue with Cisco Jabber for Windows deployed in phone-only mode. The users are reporting that they cannot access voicemail services via the Cisco Jabber for Windows client on the corporate LAN. Which steps resolve this issue?A . Add a secondary...
What is a step in the SAML SSO process?
What is a step in the SAML SSO process?A . The IdP redirects the SAML response to the browser. B. The LDAP server extracts the assertion. C. The service provider issues an authentication challenge to the browser. D. The browser issues an HTTPS POST request to the IdP.View AnswerAnswer: A
Which SSO authentication method requires no action from the user when the session token times out?
Which SSO authentication method requires no action from the user when the session token times out?A . web form B. smart card C. external database D. local authenticationView AnswerAnswer: A
When the Cisco IM and Presence publisher node in the Americas fails, to where are the users failed over?
An organization has two Cisco IM and Presence clusters: one in the Americas and one in EMEAR. Both clusters connect via an intercluster peer. Each Cisco IM and Presence cluster has four nodes logically divided into two subclusters with high availability enabled with its local peers. When the Cisco IM...
Which advanced distribute list feature should be used to accomplish this task?
An administrator must configure a system distribution list for the IT staff that must be reachable via voice recognition using either the phrases “service desk” or “Help desk”. Which advanced distribute list feature should be used to accomplish this task?A . Alternate Greeting B. Alternate Extension C. Alternate Name D....
How many links be configured between two Cisco unity connection Clusters?
An engineer is configuring a Cisco Voicemail organization. How many links be configured between two Cisco unity connection Clusters?A . One B. Two C. Three D. FourView AnswerAnswer: A
Under which call handler menu is this task accomplished?
An administrator is configuring Cisco Unity Connection call handlers. The administrator wants to ensure that all outside callers are played a welcome message and then are transferred to a live operator. The administrator wants to restrict the callers from interrupting the welcome message with key presses. Under which call handler...
Which DNS record is used for on-premises service by Jabber clients?
Which DNS record is used for on-premises service by Jabber clients?A . _collab-edge._tcp.<domain> SRV record B. _cisco-uds._tls.<domain> SRV record C. _cisco-uds._tcp.<domain> SRV record D. <tftp server FQDN> A recordView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/Windows/9_7/CJAB_BK_C606D8A9_00_cisco-jabber-dns-configuration-guide/CJAB_BK_C606D8A9_00_cisco-jabber-dns-configuration-guide_chapter_010.html
Which two protocols does the Cisco IM Presence service use to federate with external domains? (Choose two.)
Which two protocols does the Cisco IM Presence service use to federate with external domains? (Choose two.)A . XMPP B. SNMP C. SIP D. SCCP E. SMPPView AnswerAnswer: A,C Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/cucm/im_presence/interdomain_federation/11_5_1/cup0_b_interdomain-federation-guide-imp-115.pdf
In the integration of Cisco Unity Connection using SIP, which SIP trunk security profile option is required for MWI to work correctly?
In the integration of Cisco Unity Connection using SIP, which SIP trunk security profile option is required for MWI to work correctly?A . Accept out-of-dialog refer B. Accept replaces header C. Accept unsolicited notification D. Accept presence subscriptionView AnswerAnswer: C Explanation: Reference: https://community.cisco.com/t5/collaboration-voice-and-video/understanding-troubleshooting-mwi-on-unity-connection/ta-p/3162948 https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/9_0_1/secugd/CUCM_BK_CCB00C40_00_cucm-security-guide-90/CUCM_BK_CCB00C40_00_cucm-security-guide_chapter_011001.pdf