cisco 500-710 practice test

video infrastructure implementation

Last exam update: Dec 15 ,2024
Page 1 out of 3. Viewing questions 1-10 out of 21

Question 1

Which two statements about endpoint registration authentication are true? (Choose two.)

  • A. When a subzone is set for "Treat as Authenticated", the endpoint must have the correct authentications configured
  • B. Authentication credentials can be stored in the local database of the Expressway
  • C. Expressways and endpoints do not need to be synchronized with identical NTP timestamps
  • D. The endpoint and Expressway must be configured and synchronized with an NTP server delivering an identical time stamp
  • E. SIP endpoints always need authentication credentials
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which Cisco Spark hybrid call service integrates Cisco Spark with an existing Cisco call-control platform, which makes it possible for users to make and receive calls on their Cisco device or Spark application using the same dialing procedure as with on-premises registered endpoints?

  • A. Call Service Connect
  • B. Hybrid Call Connect
  • C. Hybrid Call Service
  • D. Call Service Aware
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

as the domain. Which option accomplishes this task?

  • A. Set the restriction policy to "None" and include the expression \[emailprotected] in the allow list
  • B. Set the restriction policy to "Allow" and include the expression *@cisco.com in the allow list
  • C. Set the restriction policy to "Allow" and include the expression \[emailprotected] in the allow list
  • D. Set the restriction policy to "Deny" and include the expression .*@.* in the allow list
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which statement about setting up a call bridge cluster for a resilient and scalable Cisco Meeting Server deployment is true?

  • A. Call bridges only connect to the master database
  • B. Only one call bridge should be configured per domain in a database cluster
  • C. Call bridges can read/write to any database in a cluster at any time
  • D. Call bridges can connect to databases in full mesh
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

An engineer must match any incoming call to the Expressway that is searching for an E.164 address of only 6 digits and append the domain cisco.com to the end.
Which pattern match and replace string using regular expressions accomplish this task? (Choose two.)

  • A. pattern match: ({6}\d)
  • B. pattern match: ({6}*)
  • C. replace string: \[emailprotected]
  • D. pattern match: ({5}\d)
  • E. replace string: \[emailprotected]
  • F. replace string: \[emailprotected]
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 6

In an H.323 call that is not interworked, which three signaling protocols are routed through the Expressway? (Choose three.)

  • A. RTP
  • B. H.245
  • C. RAS
  • D. RTCP
  • E. Q.931
  • F. H.254
Answer:

cef

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 7

Cisco Meeting Server uses four API commands to interact with the server. Which API command is used to modify a configuration setting on the Cisco Meeting
Server?

  • A. PUT
  • B. POST
  • C. GET
  • D. DELETE
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What is the minimum number of databases that can exist within a cluster when deploying a resilient and scalable Cisco Meeting Server deployment?

  • A. 5
  • B. 3
  • C. 2
  • D. 4
Answer:

c


Minimum is 2 however it is recommended to have 3 databases when using database clustering.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which description of the steps one must take to build a TMS phone book is true?

  • A. Create a source, create a phone book, connect the source to the phone book, and set on systems.
  • B. Export a .csv file to the TMS database from AD or Outlook, create a phone book, connect the file to a phone book, and set on systems.
  • C. Connect TMS to the Cisco Unified Communications Manager contact list files, create a phone book, connect the files to a phone book, and set on systems.
  • D. Create a contact list, create a phone book, connect the contact list to the phone book, and set on systems.
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which two protocols are used in the traversing of media across a firewall through the Expressway? (Choose two.)

  • A. SIP
  • B. Assent
  • C. H.239
  • D. H.460.18/19
  • E. H.323
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2