cisco 500-710 practice test

video infrastructure implementation

Last exam update: Dec 14 ,2024
Page 1 out of 3. Viewing questions 1-10 out of 21

Question 1

as the domain. Which option accomplishes this task?

  • A. Set the restriction policy to "None" and include the expression \[emailprotected] in the allow list
  • B. Set the restriction policy to "Allow" and include the expression *@cisco.com in the allow list
  • C. Set the restriction policy to "Allow" and include the expression \[emailprotected] in the allow list
  • D. Set the restriction policy to "Deny" and include the expression .*@.* in the allow list
Mark Question:
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which two protocols are used in the traversing of media across a firewall through the Expressway? (Choose two.)

  • A. SIP
  • B. Assent
  • C. H.239
  • D. H.460.18/19
  • E. H.323
Mark Question:
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

Which two options are included in an endpoint registration request message that is sent to a SIP Server? (Choose two.)

  • A. SIP Server IP address
  • B. E.164 URI
  • C. Endpoint IP address
  • D. E.164 address
  • E. SIP URI
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

Where must TURN servers be configured in a resilient and scalable Cisco Meeting Servers solution?

  • A. CMS core and CMS edge
  • B. CMS core, CMS edge, and Cisco Unified Communications Manager
  • C. CMS core only
  • D. CMS edge only
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Where in the TMS application does an engineer add individual endpoints or infrastructure to the TMS database?

  • A. Systems>Provisioning
  • B. Systems> Manage Dial Plan
  • C. Systems> System Overview
  • D. Systems>Navigator
Mark Question:
Answer:

d


Reference:
https://www.cisco.com/c/dam/en/us/td/docs/telepresence/infrastructure/tms/config_guide/Replacing-CTS-man-with-Cisco-TMS-deployment-guide-
TMSXE-4-1-TMS-14-5.pdf

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which two option are call-control devices in a Cisco Collaboration environment? (Choose two.)

  • A. Cisco Expressway
  • B. Cisco Meeting Server
  • C. Cisco Unified Communications Manager
  • D. Cisco Content Server
  • E. Cisco TelePresence Endpoint
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

Which two administrative functions can a Cisco Spark Partner reseller perform from the Cisco Spark Management portal? (Choose two.)

  • A. Help to manage the customers' accounts
  • B. Determine role-based access and view usage reports
  • C. Determine Single Sign-On customer usage reports
  • D. Quickly start customer trials
  • E. Enable Single Sign-On and Directory sync through corporate LDAP services on-premises
Mark Question:
Answer:

ac

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Which statement about setting up a call bridge cluster for a resilient and scalable Cisco Meeting Server deployment is true?

  • A. Call bridges only connect to the master database
  • B. Only one call bridge should be configured per domain in a database cluster
  • C. Call bridges can read/write to any database in a cluster at any time
  • D. Call bridges can connect to databases in full mesh
Mark Question:
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

An engineer must match any incoming call to the Expressway that is searching for an E.164 address of only 6 digits and append the domain cisco.com to the end.
Which pattern match and replace string using regular expressions accomplish this task? (Choose two.)

  • A. pattern match: ({6}\d)
  • B. pattern match: ({6}*)
  • C. replace string: \[emailprotected]
  • D. pattern match: ({5}\d)
  • E. replace string: \[emailprotected]
  • F. replace string: \[emailprotected]
Mark Question:
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 10

Which two methods can be used in TMS to schedule conferences? (Choose two.)

  • A. Monitoring> Conference Control Center
  • B. Booking> New Conference
  • C. Scheduling > New Conference
  • D. Administrative Tools > Configuration > Conference Settings
  • E. Reporting > Conferences
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2