In which two instances should you use a support meeting? (Choose two.)
A. when many users will be logging in to the meeting
B. when a meeting must be created on demand
C. when you need to assist with troubleshooting a client machine
D. when you want to create the meeting through Microsoft Outlook
Which two are possible ways to replicate or export the log from an existing IVE system? (Choose two.)
A. Save the log from the Admin UI.
B. Push the config and log to another IVE node.
C. Archive the log data using FTP or SCP.
D. Join a cluster.
Where do you configure the ability for the user to create support meetings?
A. meeting
B. sign-in policy
C. role
D. realm
Which statement is true regarding Secure Meeting?
A. It requires minimal changes to security policies to ensure full functionality.
B. It requires only an SSL connection to provide full visibility into the meeting.
C. It can be used only by users with valid authenticated accounts.
D. It works with Windows and Mac OS platforms only.
When configuring a realm to require multiple sign-in credentials, which three are valid secondary authentication methods? (Choose three.)
A. Active Directory
B. client certificate
C. RADIUS
D. LDAP
E. Netegrity
Which network settings are configurable on a virtual system?
A. Primary DNS, Secondary DNS, DNS Domain, Routes, internal network settings, external network settings, VLANs, and Network Connect filters
B. Primary DNS, Secondary DNS, DNS Domain, Hosts, Routes, Internal Port IP, and External Port IP
C. Primary DNS, Secondary DNS, DNS Domain, Hosts, and Routes
D. Primary DNS, Secondary DNS, DNS Domain, and Hosts
Which two statements about certificate-based user authentication are true? (Choose two.)
A. Certificate-based user authentication may not require user input during the authentication exchange.
B. Certificate attributes can be used to determine the correct sign-in page.
C. Certificate attributes can be used to assign users to roles.
D. Certificate-based user authentication requires the use of OCSP.
Which two elements do detailed resource policy rules contain? (Choose two.)
A. role
B. resources
C. rule name
D. action
What must be specified by the root administrator for Network Connect to be used on a virtual system?
A. The number of allocated users on the virtual system must not exceed the number of Network Connect users on the system.
B. The IP address pools must be specified by the root administrator before they can be specified on a virtual system.
C. The virtual port must be associated to the correct VS.
D. The VLAN tagging must be associated to the correct VS.
Which series of steps describes the appropriate method for upgrading an active/active cluster?
A. 1) upgrade individual nodes; 2) reboot nodes; 3) enable nodes
B. 1) disable nodes; 2) upgrade one device; 3) enable nodes
C. 1) upgrade master; 2) reboot backup; 3) join backup again
D. 1) disable nodes; 2) upgrade individual devices; 3) enable nodes