Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "133-S-713" Exam

Avaya Proactive Contact Solutions Implementation Exam (beta)

 Question 1.
Which Avaya software is used to provide consolidated reporting with Avaya Proactive Contact 4.X and other Avaya communication solutions?

A. CMS
B. WebLM
C. Avaya IQ
D. Analyst

Answer: C

Question 2.
Which Avaya CM circuit pack is necessary if the customer expects to do predictive dialing on Proactive Contact with CTI?

A. TN744 Call classifier
B. TN2602 Media interface
C. TN799 C-LAN
D. TN464 DS1 Interface

Answer: A

Question 3.
Which Proactive Contact component allows clients residing off the dialer to obtain events and realtime data from the dialer?

A. Event Service
B. STATSPUMP
C. Historical Data Service Component (HDSC)
D. Dialer Command and Control Service (DCCS)

Answer: A

Question 4.
Which two commands are used to configure the cti_passwd.cfg file for an Avaya Proactive Contact with CTI with Agent Blending? (Choose two.)

A. cti_passwd
B. cti_passwd
C. cti_passwd -b
D. cti_passwd

Answer: C, D

Question 5.
How does Proactive Contact move digitized messages from the CPU to the Large Port Voice Card (LPVC)?

A. Remote Copy (RCP)
B. Network File System (NFS)
C. File Transfer Protocol (FTP)
D. Address Resolution Protocol (ARP)

Answer: B

Question 6.
Which parameter in master.cfg is required to ensure correct agent capacity on a Proactive Contact system?

A. PORTS
B. LINEASSIGN
C. QUOTA
D. MAXHIDSLOTS

Answer: D

Question 7.
You are working with a third-party to integrate a call recording utility with Proactive Contact. The technician for the third-party is not able to see events from Proactive Contact. 

Which command would you type on the Proactive Contact command line to see all statistics from Event Services?

A. enclient -S $NS
B. enclient -A
C. enserver -a
D. enserver -S $NS

Answer: A

Question 8.
Under which two sections in Editor do you set up Record Specific Messaging? (Choose two.)

A. Contact Management
B. Messages and Scripts
C. Jobs
D. Calling Lists

Answer: B, D

Question 9.
You are configuring a Proactive Contact 4.X solution for your customer. They do not use the same result codes that the dialer uses. They use a short four-character description. 

Which Supervisor function should you use to ensure that your customer's host will understand the Avaya completion codes?

A. Translate
B. Merge
C. Fill
D. Format

Answer: A

Question 10.
Where is the location of the local policy files on the Avaya Proactive Contact 4.X server?

A. /opt/avaya/pds/config
B. /opt/avaya/pds/openssl
C. /opt/avaya/pds/etc
D. /etc

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-961 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-961" Exam

Cisco Data Center Networking Infrastructure Solutions design

 Question 1.
ITCertKeys.com wants to use distinct security policies for different departments. 

What must be configured?

A. individual security level for each department
B. separate ACL group for each department
C. distinct VLAN for each department
D. unique firewall context for each department

Answer: D

Question 2.
Exhibit:
 
You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. ITCertKeysA, ITCertKeysB, C, and ITCertKeys4 each represents a model for placement of a default gateway. 

Which model allows the maximum number of application and security services?

A. model ITCertKeysB
B. model C
C. model ITCertKeysA
D. model ITCertKeysD

Answer: B

Question 3.
Which of the following attack types should be mitigated in the data center core layer?

A. IP spoofing
B. MAC address spoofing
C. port scans
D. DDoS attacks

Answer: D

Question 4.
Exhibit:
You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. A failure occurs on one of the access layer uplinks. 

Which Layer 2 topology can cause a break in connectivity between the FWSMs?

A. looped triangle
B. loop-free inverted U
C. loop-free U
D. looped square

Answer: C

Question 5.
Which type of HPC application requires low latency?

A. financial analytics
B. seismic and geophysical modeling
C. digital image rendering
D. finite element analysis

Answer: D

Question 6.
Which statement best describes the data center core layer?

A. provides a resilient Layer 2 routed fabric
B. load balances traffic between the core and aggregation layers
C. is typically merged with the campus core layer
D. connects to the campus aggregation layer

Answer: B

Question 7.
Which data center network-architecture change is a result of the adoption of blade and 1-RU server technologies?

A. Layer 3 fault domains growing smaller
B. Layer 2 fault domains growing larger
C. Layer 2 fault domains growing smaller
D. Layer 3 fault domains growing larger

Answer: B

Question 8.
What advantage does InfiniBand have over Gigabit Ethernet in HPC environments?

A. simpler cabling
B. longer distance support
C. more sophisticated traffic management
D. lower latency

Answer: D

Question 9.
Exhibit:
You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. 

Where is Layer 2 adjacency required?

A. server-to-server only
B. aggregation-to-access only
C. aggregation-to-access and access-to-server
D. access-to-server only

Answer: D

Question 10.
According to the Cisco Network Foundation Protection model, which security feature is recommended for the data center core layer?

A. prefix filtering
B. Dynamic ARP Inspection
C. traffic rate limiting
D. control plane protection

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.