Thursday, 1 September 2016

Pass4sure 640-461 Question Answer

A user in Cisco Unified Communications Manager Administration has been added to the Standard CCM Admin Users group, which includes the Standard CCMADMIN Administration role, but the user cannot add new users. What is the cause of this issue?

A. The add user capability has been disabled for the group
B. The incorrect group and role were assigned.
C. The add user capability has been disabled for the role.
D. Only theCCMAdmin user can add users.
E. Users can be added only via LDAP

Answer: C

Monday, 11 July 2016

Cisco Aims To Simplify Security

By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.

Digital transformation. It's a reality that few companies today can escape. For some, the process is well underway. For many others, it's an oncoming inevitability. Whichever side of the gap your organization is on, you're probably facing a "security effectiveness gap" as the process brings more users, devices and applications online, creating an ever-expanding attack surface.
CIO June/July 2016 issue
CIO June/July 2016 Digital Magazine: These CIOs mean business

Cover story: this year’s CIO 100 honorees are serious about winning customers and driving revenue.
Read Now

Cisco today moved to close that gap with an architectural approach to services and cloud-based security solutions that it says will make security more effective and simpler for customers.

"The problem we're trying to address is helping our customers to close the security gap," says Ben Monroe, senior product marketing manager, Security Business, Cisco. "There's a disparity between what our customers are trying to do, the tools they're being provided with to do it and the challenges the external threat landscape is pushing onto them."

More security products make you vulnerable

Companies today are deploying up to 70 disparate security products to address a variety of needs, Monroe says. But that practice is difficult to manage and can ultimately make businesses more vulnerable, not less. In many cases, he notes, adding a new feature to your layered defense can dramatically increase the complexity of managing that defense.

"It's very hard to tell customers that a layered approach is important when each of those layers is operating independently — different operating consoles, interfaces, not sharing data," he says. "When a customer adds a new product, they are gaining sometimes not very much more in terms of security capability, a small percentage point more effectiveness, whereas the complexity they're adding is exponential." 

By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security where needed — whether at the branch office, headquarters or with the end user wherever they go. Cisco's approach is to embed security into the points of connection that users traverse so that the network, access points or endpoints are safe before a user even logs on.

Cisco announced the following solutions and services today:

  • Cisco Umbrella Roaming. This centralized, cloud-delivered protection is designed for removing off-network blind spots, guarding roaming employees wherever they work. It's embedded as a module with AnyConnect (Cisco's VPN solution), giving organizations the capability to add a new layer of off-network protection that blocks connections to malicious sites without needing to deploy another agent.
  •  Cisco Umbrella Branch. This cloud-delivered solution provides increased control over guest Wi-Fi use with content filtering. Businesses can upgrade Integrated Services Routers (ISR) to provide comprehensive security at branch locations.
  • Cisco Defense Orchestrator. This cloud-based management application provides the capability to manage a large security infrastructure and policies in distributed locations across thousands of devices through a cloud-based console. Monroe says it allows users to manage security policies across Cisco security products ranging from ASA and ASAv firewalls to Firepower next-generation firewalls and ASA with FirePOWER Services featuring Firepower Threat Defense and OpenDNS.
  • Cisco Meraki MX Security Appliances with Advanced Malware Protection (AMP) and Threat Grid. This cloud-managed unified threat management (UMT) solution is designed for advanced threat protection for the distributed enterprise. It provides branch offices with malware protection that checks files against its cloud database to identify malicious content, blocking the files before users download them.
  • Stealthwatch Learning Networks License. This component allows the Cisco ISR to act as a security sensor and enforcer for branch threat protection. Businesses can use it to detect and track anomalies in network traffic, analyze suspicious network activity and identify malicious traffic.
Keeping an eye on transformations

Cisco also announced Cisco Security Services for Digital Transformation, a Cisco service that helps organizations examine core security fundamentals with an eye toward their readiness to adopt digital technologies. Through the service, expert advisers can recommend security strategies and provide tailored solutions based on industry trends and an organization's business needs.

"Not every organization is going to have an IT or security group with the number of resources needed to plan, execute and manage digital transformation," Monroe says, noting that Cisco aims to provide an easy-to-consume service that provides the necessary gap analysis and 24/7 maintenance, monitoring and optimization.

Cisco is also relying on its channel partners to play a strategic role in helping its customers build and manage their security infrastructures. The company says the new security offerings will help channel partners design simple, open and automated solutions for their customers, opening up new service opportunities for partners to manage customers' security services and tap into recurring revenues.

Thursday, 9 June 2016

Pass4sure 640-461 Question Answer

Which type of user in Cisco Unified Communications Manager has an interactive login? 

A. administrator
B. end user
C. application user
D. phone user

Answer: B

When implementing a plan of action, what should you do? 

A. Make all of the changes at once to minimize the impact to users.
B. Limit the impact of the changes to users.
C. Completely remove access lists to ensure that they will not impact the changes.
D. Even if a change adversely affects the users, keep moving forward with the plan of action.

Answer: B

Monday, 9 May 2016

Pass4sure 640-461 Question Answer

Which utility should you use when you need to add a large number of users into Cisco Unified Communications Manager? 

A. Cisco Unified User Administration
B. Application User CAPF Profile
C. Cisco Unified Communications Manager Bulk Administration Tool
D. Cisco Unified Telephony User Administration

Answer: C

Tuesday, 5 April 2016

Pass4sure 640-461 Question Answer

An administrator is attempting to add a new user in Cisco Unified Communications Manager Administration but does not see the option to add a new user. What is the most likely cause of this issue? 

A. The SQL User database is not running.
B. The system is synchronized with an LDAP server.
C. BAT is not enabled.
D. The administrator has the a€ceno user adda€ rights box checked.
E. The SIP Realm is not defined in User Management.

Answer: B                                                                    
An administrator wants to locate and remove all unassigned directory numbers on the Cisco Unified Communications Manager system. Which method is the best method to accomplish this task? 

A. Choose Device > Phone. Search all phones and remove the undesired directory numbers.
B. Use the Dial Plan Installer to remove the directory numbers.
C. Use the Disaster Recovery System to restore only valid directory numbers.
D. Choose Call Routing > Route Plan Report, choose the Unassigned DN drop-down menu, and then remove all orphaned directory numbers.
E. Choose Device > Device Settings > Device Defaults and use the wizard to locate and remove the orphaned directory numbers.

Answer: D

Tuesday, 1 March 2016

Pass4sure 640-461 Question Answer

By default, how many failed attempts at signing into Cisco Unity Connection is a user allowed before their account is locked out?  
A. 2
B. 3
C. 4
D. 5
E. 6
F. no limit

Answer: B

To monitor the service health and performance, which service should you activate in Cisco Unity Connection?

A. CUC Performance Service
B. CUC System Auditing
C. Real-Time Monitoring Tool
D. Cisco Serviceability Reporter

Answer: D

Thursday, 28 January 2016

Pass4sure 640-461 Question Answer

Which three rules are valid transfer rules in Cisco Unity Connection? (Choose Three)

A. Standard
B. alternate
C. closed
D. holiday
E. nonstandard

Answer: A, B, C

Which Cisco Unity Connection report provides a summary view of the current size, last error condition, 

and status of the mailbox store?

A. Users
B. Message Traffic
C. Mailbox Store
D. System Configuration

Answer: C