Which option do Enterprise settings on Cisco Spark determine?
A. where user information comes from
B. how connectors are integrated in a hybrid deployment
C. bot integration
D. API integration
When you write a new app in Tropo, in which format must the app scripts be saved?
A. .xml
B. .wav
C. .mp4
D. Js
E. .json
Which group of items must be configured when adding a Cisco Meeting Server toTMS before the server can be used in scheduled conferences?
A. DNS address, numeric ID base, numeric ID quantity
B. domain, numeric ID base, conference ID range
C. MACaddress, numeric ID base, numeric ID quantity
D. domain, numeric ID base, numeric ID quantity
Which option is a method for controlling bandwidth within a subzone?
A. authentication
B. federation
C. do not disturb
D. interoperability
On which two operating systems and database applications does TMS rely? (Choose two.)
A. Oracle
B. MS Access
C. Windows Server
D. SQL
E. Linux Ubuntu
An engineer notices that users are inadvertently changing several random settings on endpoints in remote offices. Using TMS, where doesthe engineer navigate to resolve this issue?
A. System > Configuration Backup
B. Booking > Conference Templates
C. System > Provisioning
D. Monitoring > Conference Control Center
Which three hybrid connectors allow Cisco Spark to be integrated with an on-premises solution? (Choose three.)
A. Calendar Connector
B. Call Connector
C. Calendar Aware
D. Directory Connect
E. Directory Service
F. Calendar Service
What is the minimum number or databases that can exist within a cluster when deploying a resilient and scalable Cisco Meeting Server deployment?
A. 4
B. 3
C. 5
D. 2
Which Cisco WebEx products can support up to 3000 attendees?
A. Cisco WebEx Meeting Center
B. Cisco WebEx Event Center
C. Cisco WebEx Training Center
D. Cisco WebEx Support Center
Which two statements about subzones are true? (Choose two.)
A. Endpointsare assigned to a particular subzone by their alias or IP subnet.
B. Subzones require the use of endpoint authentication
C. Subzones are used for routing calls to peers in other parts of the network.
D. Endpoints require the use of other endpoints for authentication
E. Subzones are used for bandwidth and authentication control of a logical grouping of endpoints within the registration list of the Expressway