Question 10: How can you drive modernization within your customer’s existing environment? A. Hire an external consultant to convince the customer to modernize. B. Provide support to end of sale products. C. Remind customers...
Free Cisco Exams Learning Center Blog
Which design resource allows you and the customer to view examples of collaboration solutions based on
scenarios products, or experiences?
A. Project Workplace
B. HCS Configuration tool
C. Virtual Machine Placement tool
D. Quick Pricing tool
Refer to the Exhibit.
A customer reports that they cannot access your organization’s website. Which option is a possible reason that
the customer cannot access the website?
A. The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
B. The server at 10.67.10.5 has a virus.
C. A vulnerability scanner has shown that 10.67.10.5 has been compromised.
D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
Every firewall has its own database where it maintains the website reputation on terms of security, ease of
access, performance etc and below certain score (generally 7 in case of Cisco), firewalls block access to the
sites. For example, you can visit www.senderbase.org and enter name of any website and you will see the
reputation of that website.
Which option is the only constant in the workplace?
A. way people work
B. way information is shared
C. way humans interact with each other
D. way video infrastructure communicates
Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable
Consider a vulnerability in an Internet service such as web, email, or DNS that allows an attacker to
modify or delete all web files in a directory would incur an impact to Integrity only, rather than
Availability. The reason is that the web service is still performing properly – it just happens to be
serving back altered content.
Which Cisco UCL plans support all Cisco user devices?
A. Basic and Enhanced
B. Enhanced and Enhanced Plus
C. Essential and Enhanced Plus
D. Essential and Basic
Which two components are included in a 5-tuple? (Choose two.)
A. port number
B. destination IP address
C. data packet
D. user name
E. host logs
Answer: A B
The source and destination addresses are primary 5-tuple components. The source address is the IP address of
the network that creates and sends a data packet, and the destination address is the recipient.
For on-premises deployments, which option does Cisco recommend for a consistent one meeting experience
and full interoperability’?
A. Cisco Telepresence Server
B. Cisco Meeting Server
C. Cisco Expressway
D. Cisco Conductor
Cisco Meeting Server provides a consistent one-meeting experience for every meeting attendee, as well as
open interoperability, all based on a highly scalable software architecture supporting business-quality meetings
from mobile through immersive via audio, video, and web. The software has two major elements: the server
software and an extension of the server in the form of an app/client that Knowledge Workers use to access and
control their meetings. Cisco Meeting Server supports standards-based video endpoints, including the Cisco
portfolio of telepresence endpoints as well as third-party solutions such as Skype for Business. It includes
Personal Multiparty (PMP) and Shared Multiparty (SMP) licenses, Multibrand license, and Recording port
In Microsoft Windows, as files are deleted the space they were allocated eventually is considered available for
use by other files. This creates alternating used and unused areas of various sizes. What is this called?
A. network file storing
B. free space fragmentation
C. alternate data streaming
Free (unallocated) space fragmentation occurs when there are several unused areas of the file system
where new files or meta data can be written to. Unwanted free space fragmentation is generally caused
by deletion or truncation of files, but file systems may also intentionally insert fragments (“bubbles”) of
free space in order to facilitate extending nearby files
Which process is being utilized when IPS events are removed to improve data integrity?
A. data normalization
B. data availability
C. data protection
D. data signature
Data normalization is the process of intercepting and storing incoming data so it exists in one form only.
This eliminates redundant data and protects the data’s integrity.