Cisco 500-445 Practice Test - Questions Answers
List of questions
Related questions
How is Chat Watchdog Interval used?
to control the time interval after which a chat activity is tagged as abandoned if an agent could not accept it
to control the time interval after which a chat activity is tagged as abandoned if it could not get any response from UCCE
to control the time interval after which a chat activity is tagged as abandoned if it could not be routed to UCCE
to control the time interval after which a chat activity is tagged as abandoned if it could not be assigned to an agent
What are two specifications for reporting templates? (Choose two.)
The availability of templates is controlled by licenses.
A user can only create ten reports per template.
Only one report can be created per template.
Any number of reports can be created from a template.
Templates can be deleted.
What is the limit of concurrent agents per application server?
400
600
1200
1800
In which two ways are chats transferred? (Choose two.)
Only open chat activities in which the customer has not left the chat session can be transferred.
Chats can be transferred to departments directly.
Agents can transfer the chat activities based on the Maximum Task limit setting.
Agents have unlimited transfers of chat activity.
Only one chat activity can be transferred at a time.
Which LDAP URL allows configuration in the properties pane under SSO configuration?
Ldap://idap_server:3269
Ldap://idap_server:80
Ldap://idap_server:443
Ldap://idap_server:3268
Which CLI command verifies the authenticity and integrity of a downloaded ISO?
Openssl dgst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>
<ISO Image>
Openssl dst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>
<ISO Image>
Openssl dst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>
<|SO Image>
Openssl dgst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>
<ISO Image>
Which process scans content and applies regular expressions to mask the sensitive information?
Data leak prevention
Data masking
Data filtering
Data scanning
Which two types of data does a file server store? (Choose two.)
application files
application log files
error log files
system files
report templates
Which two media classes require configuration to be used in Enterprise Chat and Email? (Choose two.)
ECE_Default_Queue
ECE_activity
ECE_Inbound
ECE_Email
ECE_Chat
What is the formula for a standardized agent count for email?
Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 10
Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 6
Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 20
Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 4
Question