Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A customer would like her employees to use video from home without the cost of a VPN. Which

VBP should the customer buy?

A.

ST-series

B.

E-series

Which Virtualization Manager (DMA) function refers to the ability to recover quickly from an interrupting event?

A.

Scalability

B.

Redundancy

C.

Virtualization

D.

Resiliency

You have performed CMA Active Directory integration but can only search for local users. Select the option that will resolve this issue:

A.

Re-enter the AD machine account details

B.

Log into the CMA with the AD machine account and untick the 'Local Users Only' box

C.

Re-enter the AD user account details

D.

Log into the CMA with the AD user account and untick the 'Local Users Only' box

Which Visualization Manager (DMA) function enables multiple MCUs to appear as one single resource available to the end user?

A.

Resiliency

B.

Redundancy

C.

Virtualization

D.

Scalability

When discussing video quality, resolution is which two of these choices?

A.

how many pixels are in a display picture

B.

improving the picture

C.

how you can classify the picture as high definition

D.

how the picture is compressed

SIP messages can be defined as which two types?

A.

Response

B.

Request

C.

Acknowledgement

D.

Attempt

When connecting to an RMX for the first time, which is the correct username and password?

A.

POLYCOM / POLYCOM

B.

SUPPORT / SUPPORT

C.

admin / admin

D.

admin / password

The Data Link layer takes care of:

A.

the use of MAC addresses for source and destination identification

B.

how the Os and is are sent across the physical network

C.

how any encrytion is applied to the payload

D.

what kind of data is being sent

What is the first SIP request seen when dialing an endpoint?

A.

ALERTING

B.

REQUEST

C.

CALL

D.

INVITE

The TCP/IP model is similar to the OSI model but not the same because:

A.

it is incorrect

B.

it is designed to fit specific existing networking protocols

C.

the two models are not designed to fit together

D.

the two models are not related