网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which preconfiguration task is necessary for VoiceView Express? ()
A
Ensure that the authentication server URL points to Cisco Unity Express.
B
Ensure that authentication server is owned by the JTAPI user on Cisco Unity Express.
C
Ensure that all phones point to the authentication server URL owned by Cisco Unity Express.
D
Ensure that all phones that are owned by the JTAPI user point to the authentication server URL on Cisco Unity Express.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which preconfiguration task is necessary for VoiceView Express? ()A Ensure that the authentication server URL points to Cisco Unity Express. B Ensure that authentication server is owned by the JTAPI user on Cisco Unity Express. C Ensure that all phones point to the authentication server URL owned by Cisco Unity Express. D Ensure that all phones that are owned by the JTAPI user point to the authentication server URL on Cisco Unity Express.” 相关考题
考题
An IT manager is concerned about server administrators having to be cross-trained to work on every server. Which of the following is the BEST way to correct this problem?()
A. Ensure that server baselines are documented for each server.B. Ensure that all server documentation is completed and up to date.C. Ensure that each server is accessible via a KVM over IP.D. Ensure that each server is processed through the change control board.
考题
The Services-Ready Engine is an optional module of the Cisco ISR family. It includes onboard CPU and memory to run advanced applications. Which of these is an example of an advanced application that runs on the Services-Ready Engine?()A、Cisco Express ForwardingB、Cisco Routing ServicesC、Cisco Firewall SecurityD、Cisco Unity Express
考题
The Cisco UC500 component of the Smart Business Communication System provides which three functions?()A、Internet server hostingB、Call Manager Enterprise EditionC、VPN and encryptionD、Cisco Unity voice mailE、Layer 2 switchingF、Auto Attendant
考题
The Prescott Shovel Company wants to upgrade its Cisco Unity Express from a Cisco Unified CallManager Express integration to a Cisco Unified CallManager integration. Which statement is true?()A、A special hybrid license is required. B、The Cisco Unity Express license must be changed. C、The Cisco Unity Express license does not need to be changed. D、The license file names are identical, which allows them to be interchanged as long as the module itself is not being upgraded.
考题
The Cisco CRS Server must be configured to communicate and interoperate with the Cisco CallManager. Which two must be configured on the Cisco CRS Server?()A、Application Management to load applications B、JTAPI Subsystem with the JTAPI Call Control Group C、Database Subsystem communication with LDAP Directory D、JTAPI Subsystem with the JTAPI provider
考题
Which of the following is a new product that is included in the Cisco SMB Support Assistant?()A、Cisco Unified CallManagerB、Cisco Unity ExpressC、Cisco Unified CallManager ExpressD、Cisco Unity
考题
Which of the following is a new product that is included in the Cisco SMB Support Assistant?()A、Cisco Unity ExpressB、Cisco Unified CallManagerC、Cisco UnityD、Cisco Unified CallManager Express
考题
An IT manager is concerned about server administrators having to be cross-trained to work on everyserver. Which of the following is the BEST way to correct this problem?()A、 Ensure that server baselines are documented for each server.B、 Ensure that all server documentation is completed and up to date.C、 Ensure that each server is accessible via a KVM over IP.D、 Ensure that each server is processed through the change control board.
考题
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
考题
You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()A、Ensure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.B、Ensure that the stored procedure and the tables are owned by the same database user.C、Ensure that the stored procedure and the tables use the same database schema.D、Configure the multiuser database option on both databases.E、Configure the cross-database ownership chaining option on both databases.
考题
Which preconfiguration task is necessary for VoiceView Express? ()A、Ensure that the authentication server URL points to Cisco Unity Express. B、Ensure that authentication server is owned by the JTAPI user on Cisco Unity Express. C、Ensure that all phones point to the authentication server URL owned by Cisco Unity Express. D、Ensure that all phones that are owned by the JTAPI user point to the authentication server URL on Cisco Unity Express.
考题
What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A、SSL B、VPN C、Mixed D、SMTP E、HTTPSF、Non-SSL
考题
Which Cisco CRS 4.0 server configuration task enables the Cisco CRS server to fail over to a secondary Cisco Unified CallManager when the primary Cisco Unified CallManager fails?()A、The LDAP directory must have a secondary profile configured. B、No special configuration is required. Cisco Unified CallManager maintains the failover. C、The JTAPI provider on the Cisco CRS server must be configured with the secondary Cisco Unified CallManager IP address following the primary Cisco Unified CallManager IP address. D、There must be a second JTAPI user configured with an alternate range of CTI ports.
考题
An IT manager is concerned about server administrators having to be cross-trained to work on every server. Which of the following is the BEST way to correct this problem?()A、Ensure that server baselines are documented for each server.B、Ensure that all server documentation is completed and up to date.C、Ensure that each server is accessible via a KVM over IP.D、Ensure that each server is processed through the change control board.
考题
An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A、Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B、Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C、Ensure that merge roles is selected in the role-mapping rules.D、Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
考题
You install a new Exchange Server 2010 server.You need to ensure that users can connect from the Internet to the server by using Exchange ActiveSync.What should you do on the Exchange server?()A、Modify the internal URL for the Microsoft-Server-ActiveSync virtual directory.B、Modify the external URL for the Microsoft-Server-ActiveSync virtual directory.C、Enable Anonymous Authentication for the Microsoft-Server-ActiveSync virtual directory.D、Enable Windows Integrated Authentication for the Microsoft-Server-ActiveSync virtual directory.
考题
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
考题
You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()A、Set the appropriate local password policies for all computers on which SQL Server is installed.B、Set the server authentication mode of all SQL Server instances to Windows Authentication mode.C、Install all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.D、Create SQL Server logins that have CHECK_POLICY enabled.
考题
单选题Which preconfiguration task is necessary for VoiceView Express? ()A
Ensure that the authentication server URL points to Cisco Unity Express. B
Ensure that authentication server is owned by the JTAPI user on Cisco Unity Express. C
Ensure that all phones point to the authentication server URL owned by Cisco Unity Express. D
Ensure that all phones that are owned by the JTAPI user point to the authentication server URL on Cisco Unity Express.
考题
单选题An IT manager is concerned about server administrators having to be cross-trained to work on everyserver. Which of the following is the BEST way to correct this problem?()A
Ensure that server baselines are documented for each server.B
Ensure that all server documentation is completed and up to date.C
Ensure that each server is accessible via a KVM over IP.D
Ensure that each server is processed through the change control board.
考题
单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A
a server authentication certificateB
client authentication certificatesC
Digest authenticationD
Windows Integrated authentication
考题
单选题The Prescott Shovel Company wants to upgrade its Cisco Unity Express from a Cisco Unified CallManager Express integration to a Cisco Unified CallManager integration. Which statement is true?()A
A special hybrid license is required. B
The Cisco Unity Express license must be changed. C
The Cisco Unity Express license does not need to be changed. D
The license file names are identical, which allows them to be interchanged as long as the module itself is not being upgraded.
考题
单选题Which Cisco CRS 4.0 server configuration task enables the Cisco CRS server to fail over to a secondary Cisco Unified CallManager when the primary Cisco Unified CallManager fails?()A
The LDAP directory must have a secondary profile configured. B
No special configuration is required. Cisco Unified CallManager maintains the failover. C
The JTAPI provider on the Cisco CRS server must be configured with the secondary Cisco Unified CallManager IP address following the primary Cisco Unified CallManager IP address. D
There must be a second JTAPI user configured with an alternate range of CTI ports.
考题
单选题Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?A
Configure all access points as RADIUS clients to the Remediation ServersB
Configure all access points as RADIUS clients to the Network Policy Server (NPS)C
Create a Network Policy that defines Remote Access Server as a network connection methodD
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
考题
多选题You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()ASet the appropriate local password policies for all computers on which SQL Server is installed.BSet the server authentication mode of all SQL Server instances to Windows Authentication mode.CInstall all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.DCreate SQL Server logins that have CHECK_POLICY enabled.
考题
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A
Store the credential of a user in the data source.B
Configure the infrastructure to support Kerberos authentication.C
Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D
Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
考题
单选题You install a new Exchange Server 2010 server.You need to ensure that users can connect from the Internet to the server by using Exchange ActiveSync.What should you do on the Exchange server?()A
Modify the internal URL for the Microsoft-Server-ActiveSync virtual directory.B
Modify the external URL for the Microsoft-Server-ActiveSync virtual directory.C
Enable Anonymous Authentication for the Microsoft-Server-ActiveSync virtual directory.D
Enable Windows Integrated Authentication for the Microsoft-Server-ActiveSync virtual directory.
考题
单选题What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A
SSL B
VPN C
Mixed D
SMTP E
HTTPSF
Non-SSL
热门标签
最新试卷