642-456




QUESTION 1:
What is the best practice to employ when using certificates between a browser and the Cisco Unified Communications Manager server?
A. Install thumbprint readers on the devices that need to connect to the Cisco Unified Communications Manager servers via HTTPS.
B. Use either SSH or CLI to view the thumbprint of the certificate and then communicate the information to all Web browser users so they already have it available when they receive the security alert.
C. Use SSH exclusively to verify the thumbprint of the certificate and then send the certificate to all Web browser users that require access to the server.
D. Accept the certificate when the security alert pop-up window appears.
E. Note the thumbprint of the Cisco Unified Communications Manager certificates after installation and then communicate the information to all Web browser users so they have it available when they receive the security alert.
Answer: E

QUESTION 2:
A branch site has a group of salespeople that take orders from customers. The site needs to be able to distribute calls evenly to the salespeople when connectivity to the main site is lost. Which two configurations are correct? (Choose two.)
A. The branch site will need a dedicated UCCX server to queue the customer calls.
B. All branch site IP phones will need to be preconfigured in the gateway.
C. A digital circuit will be required so that DNIS can be used to route the customer calls to the salespeople's queue.
D. The gateway must be configured to use H.323 to communicate with the Cisco Unified Communications Manager cluster.
E. Only the salespeople's phones will need to be preconfigured in the gateway.
F. Configure hunt groups on the Cisco Unified CME, which is operating in SRST mode.
Answer: E,F

QUESTION 3:
Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.)
A. PKI uses only a single trusted introducer
B. the trusted introducer uses the signed certificates of the endpoints that need to communicate
C. the trusted introducer uses the private key of each enrolling user and the public key of the introducer as the signed certificate
D. the introducer digitally signs the public key of the user with the public key of the introducer to generate a signed certificate
E. only the public key of the introducer has to be initially known and verified by all other entities
Answer: A,E

QUESTION 4:
SRTP is used for which two services? (Choose two.)
A. Key Generation
B. Accounting
C. TLS
D. Authentication
E. Encryption
Answer: D,E

1Y0-614



QUESTION 1
Which type of Terminal Services profile should be deployed?
A. Mandatory profiles with folder redirection
B. Mandatory profiles
C. Roaming profiles with folder redirection
D. Roaming profiles
Answer: C


QUESTION 2
Abc .com plans to implement Presentation Server for users in Shanghai. Why should a static port be defined?
A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is more secure.
B. By defining a static port, system resources can be conserved.
C. There is no other way to establish communication over firewalls other than defining a static port.
D. A static port will allow for License Server communications to be more secure, this, this is optimal.
Answer: D


QUESTION 3
How should Abc .com deploy required Citrix hot fixes?
A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should be done.
B. Emergency hot fixes should be deployed through manual installation with limited documentation. All other hot fixes should be deployed by means if Installation Manger with full documentation.
C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be done.
D. All required hot fixes should be deployed by means of Installation Manager. Testing should be done.
Answer: D


QUESTION 4
In regard to Abc .com's Advanced Access Control deployment.
Why should an Advanced Access Control web server be placed at this customer's location?
A. Adding an Advanced Access Control deployment enables the customer to incorporate their own security standards.
B. Adding an Advanced Access Control deployment expedites administrative changes because approval chain is closer to the customer.
C. Adding an Advanced Access Control web server will provide better load balancing across existing hardware.
D. Adding an Advanced Access Control deployment makes administration more cost-effective for the customer.
Answer: A