admin
No description.Please update your profile.
Associated certifications
CCNP Collaboration
Cisco Certified Specialist – Collaboration Applications Implementation
Exam overview
This exam tests your knowledge of collaboration applications, including:
Single sign-on
Cisco Unified IM and Presence
Cisco Unity Connection and Cisco Unity Express
Application clients
Exam Description
Implementing Cisco Collaboration Applications v1.1 (300-810) Exam Description: Implementing Cisco Collaboration Applications v1.1 (CLICA 300-810) is a 90-minute exam associated with the CCNP Collaboration Certification. This exam certifies a candidate’s knowledge of collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course, Implementing Cisco Collaboration Applications, helps candidates to prepare for this exam. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
Examkingdom Cisco 300-810 Exam pdf,
Best Cisco 300-810 Free downloads , Cisco 300-810 Dumps at Certkingdom.com
15% 1.0 Single Sign-On (SSO) for Collaboration Applications
1.1 Describe these types of SSO as they relate to Collaboration
1.1.a Integrated Windows AD
1.1.b Kerberos
1.1.c Two-factor authentication (2FA)
1.1.d Third-party IdP
1.2 Describe the SAML SSO login process flow in the context of Cisco Collaboration solutions
1.3 Describe these components of SAML 2.0 and later
1.3.a Assertion
1.3.b Protocol
1.3.c Binding
1.3.d Profiles
1.4 Describe SAML SSO configuration
1.5 Describe OAuth 2.0
30% 2.0 Cisco Unified IM and Presence and Cloud Messaging
2.1 Configure Cisco Unified IM and Presence on premises
2.1.a High availability
2.1.b Calendar integration
2.1.c Apple Push Notification Service
2.1.d Persistent chat
2.1.e Federation configuration (XMPP and SIP)
2.1.f Centralized Cisco Unified IM and Presence
2.1.g Hybrid Message Service
2.2 Troubleshoot Cisco Unified IM and Presence on-premises
2.2.a XMPP
2023 Cisco Systems, Inc. This document is Cisco Public. Page 2
2.2.b High availability
2.2.c Calendar integration
2.2.d Apple Push Notification Service
2.2.e Persistent chat
2.2.f Federation configuration (XMPP and SIP)
2.2.g Message Archiver Service
30% 3.0 Cisco Unity Connection
3.1 Configure these in Cisco Unity Connection
3.1.a Call handlers
3.1.b Voicemail transfers and greetings
3.1.c Routing rules
3.1.d Distribution lists
3.1.e LDAP integration
3.2 Troubleshoot these in Cisco Unity Connection
3.2.a Call handlers
3.2.b Voicemail transfers and greetings
3.2.c AutoAttendant
3.2.d Routing rules
3.2.e MWI
3.3 Implement toll fraud prevention
3.4 Troubleshoot Cisco Unity Connection integration options with Cisco UCM
3.5 Describe digital networking in multicluster deployments in Cisco Unity Connection
25% 4.0 Application Clients
4.1 Configure DNS for service discovery
4.2 Troubleshoot service discovery
4.3 Troubleshoot Cisco Jabber and Webex App phone control
4.4 Troubleshoot Cisco Jabber and Webex App voicemail integration
4.5 Troubleshoot certificate validation
4.6 Describe the Cisco Unified Attendant Console Advanced integration
4.7 Troubleshoot Webex App functions
4.7.a Login process
4.7.b Call signaling
4.7.c Voice/video quality
QUESTION 1
Which authentication method allows a user to log in to an SSO-enabled Cisco Unified Communications application by utilizing a Microsoft Windows login, thereby not requiring any credentials to be entered?
A. Smart Card
B. OAuth
C. form-based
D. Kerberos
Answer: D
Explanation:
The main advantage of Kerberos authentication compared to the other authentication methods is
that you do not need to provide your credentials when you log in to Cisco Jabber. If you use Kerberos,
the client does not prompt users for credentials, because authentication was already provided to
gain access to the Windows desktop. This authentication method allows you to log in to Cisco Jabber
with your Microsoft Windows login.
QUESTION 2
When Cisco IM and Presence is configured to use automatic fallback, how long does the Server
Recovery Manager service wait for a failed service/server to remain active before an automatic fallback is initiated?
A. 10 minutes
B. 20 minutes
C. 30 minutes
D. 1 hour
Answer: C
Explanation:
Automatic Fallback
Automatic fallback takes place when the server monitors the services and the Server Recovery
Manager(SRM) service will automatically fallback users to their homed nodes. The key in this
configuration is that the Server Recovery Manager(SRM) service will wait 30 minutes for a failed
service/server to remain active before an automatic fallback is initiated. Once this 30 minute up time
is established, user sessions are moved back to their homed nodes. The Jabber client will apply the
re-log in upper and lower limits for the fallback. Automatic fallback is not the default configuration,
but it can be enabled. To enable automatic fallback, change the Enable Automatic Fallback
parameter in the Server Recovery Manager Service Parameters to value True.
QUESTION 3
Which entity is a standard component used for authentication by SAML 2.0?
A. identity provider
B. session broker
C. Internet service provider
D. client access server
Answer: A
QUESTION 4
An engineer must configure a test user mailbox in a newly deployed Cisco Unity Express module.
Which console command set reflects the correct configuration in this scenario?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
QUESTION 5
Which two command line arguments can you specify when installing Cisco Jabber for windows? (Choose two.)
A. CISCO_UDS_DOMAIN
B. TFTP_ADDRESS
C. VOICEMAIL_SERVER_ADDRESS
D. SERVICES_DOMAIN
E. TFTP
Answer: DE
QUESTION 6
Which description of an IdP server is true?
A. authenticates user credentials
B. provides user authorization
C. is an authentication request that is generated by a Cisco Unified Communications application
D. consists of pieces of security information that are transferred to the service provider for user authentication
Answer: A
No description.Please update your profile.
@ 2016 Certkingdom.com-Developed By Certkingdom.com