642-456




QUESTION 1:
What is the best practice to employ when using certificates between a browser and the Cisco Unified Communications Manager server?
A. Install thumbprint readers on the devices that need to connect to the Cisco Unified Communications Manager servers via HTTPS.
B. Use either SSH or CLI to view the thumbprint of the certificate and then communicate the information to all Web browser users so they already have it available when they receive the security alert.
C. Use SSH exclusively to verify the thumbprint of the certificate and then send the certificate to all Web browser users that require access to the server.
D. Accept the certificate when the security alert pop-up window appears.
E. Note the thumbprint of the Cisco Unified Communications Manager certificates after installation and then communicate the information to all Web browser users so they have it available when they receive the security alert.
Answer: E

QUESTION 2:
A branch site has a group of salespeople that take orders from customers. The site needs to be able to distribute calls evenly to the salespeople when connectivity to the main site is lost. Which two configurations are correct? (Choose two.)
A. The branch site will need a dedicated UCCX server to queue the customer calls.
B. All branch site IP phones will need to be preconfigured in the gateway.
C. A digital circuit will be required so that DNIS can be used to route the customer calls to the salespeople's queue.
D. The gateway must be configured to use H.323 to communicate with the Cisco Unified Communications Manager cluster.
E. Only the salespeople's phones will need to be preconfigured in the gateway.
F. Configure hunt groups on the Cisco Unified CME, which is operating in SRST mode.
Answer: E,F

QUESTION 3:
Which two qualities of PKI key exchange overcome asymmetric cryptography scalability issues? (Choose two.)
A. PKI uses only a single trusted introducer
B. the trusted introducer uses the signed certificates of the endpoints that need to communicate
C. the trusted introducer uses the private key of each enrolling user and the public key of the introducer as the signed certificate
D. the introducer digitally signs the public key of the user with the public key of the introducer to generate a signed certificate
E. only the public key of the introducer has to be initially known and verified by all other entities
Answer: A,E

QUESTION 4:
SRTP is used for which two services? (Choose two.)
A. Key Generation
B. Accounting
C. TLS
D. Authentication
E. Encryption
Answer: D,E