What must be enabled on the CUIC server for CUIC reports to show up in Finesse?
A. PROXY
B. Cross Origin Resource Sharing (CORS)
C. Hazelcast
D. JSONP
What are two functions of a SIP Proxy Server? (Choose two.)
A. centralizes dial plans
B. connects to Call Router
C. handles box-to-box redundancy
D. helps to centralize the administration and call control
E. load balancer for HTTP and SIP
Which Cisco Unified Border Element configuration is used in Contact Center Enterprise with Cisco Unified Customer Voice Portal and Cisco Unified Border Element deployment?
A. voice gateway must be dedicated for VXML browser sessions.
B. Cisco Unified Border Element must be configured as media pass flow-around mode.
C. Cisco Unified Border Element must be configured as media pass flow-through mode.
D. Box-to-box Cisco Unified Border Element must be used for redundancy.
Which team is responsible for ensuring that servers designated for use by CCE VMs meet these requirements, including but not limited to Storage System Performance and IOPS (Input/Output Operations Per Second) Requirements?
A. Design team
B. Deployment team
C. Support Team
D. Sales team
Which CLI command manages the Java Keystore Certificate in Windows CCE servers?
A. PROCMON
B. OPENSSL
C. System CLI
D. Keytool
Which sync is triggered when an administrator performs any create, update, or delete operation on a specific configuration item?
A. Automated differential
B. Push
C. Manual differential
D. OnDemand
What are the Active and Configured agent counts for the 2K deployment model?
A. 2K/4K
B. 2K / 8K
C. 2K/10K
D. 2K/12K
Where should a trust relationship be established by downloading and exchanging a metadata file when configuring the Cisco IdS using PCCE Web Administration Manager (S.P.O.G)?
A. IdS to IdP
B. IdS to IdP and IdP to IdS
C. IdP to IdS
D. IdS to IdP and IdP to Active Directory (AD)
What are two specifications for UC on UCS Tested Reference Configuration (TRC)? (Choose two.)
A. defined as Configuration Based
B. VMware vSphere is optional
C. VMware vCenter is required
D. defined as Rule Based
E. VMware vSphere is required
Which service is used to provide authorization between the Identity Provider (IdP) and application?
A. SAML
B. OAuthv2
C. Active Directory Federation Services (ADFS)
D. Identity Service (IdS)