ExamGecko
Home Home / Cisco / 500-445

Cisco 500-445 Practice Test - Questions Answers

Question list
Search
Search

How is Chat Watchdog Interval used?

A.

to control the time interval after which a chat activity is tagged as abandoned if an agent could not accept it

A.

to control the time interval after which a chat activity is tagged as abandoned if an agent could not accept it

Answers
B.

to control the time interval after which a chat activity is tagged as abandoned if it could not get any response from UCCE

B.

to control the time interval after which a chat activity is tagged as abandoned if it could not get any response from UCCE

Answers
C.

to control the time interval after which a chat activity is tagged as abandoned if it could not be routed to UCCE

C.

to control the time interval after which a chat activity is tagged as abandoned if it could not be routed to UCCE

Answers
D.

to control the time interval after which a chat activity is tagged as abandoned if it could not be assigned to an agent

D.

to control the time interval after which a chat activity is tagged as abandoned if it could not be assigned to an agent

Answers
Suggested answer: D

What are two specifications for reporting templates? (Choose two.)

A.

The availability of templates is controlled by licenses.

A.

The availability of templates is controlled by licenses.

Answers
B.

A user can only create ten reports per template.

B.

A user can only create ten reports per template.

Answers
C.

Only one report can be created per template.

C.

Only one report can be created per template.

Answers
D.

Any number of reports can be created from a template.

D.

Any number of reports can be created from a template.

Answers
E.

Templates can be deleted.

E.

Templates can be deleted.

Answers
Suggested answer: A, D

What is the limit of concurrent agents per application server?

A.

400

A.

400

Answers
B.

600

B.

600

Answers
C.

1200

C.

1200

Answers
D.

1800

D.

1800

Answers
Suggested answer: D

In which two ways are chats transferred? (Choose two.)

A.

Only open chat activities in which the customer has not left the chat session can be transferred.

A.

Only open chat activities in which the customer has not left the chat session can be transferred.

Answers
B.

Chats can be transferred to departments directly.

B.

Chats can be transferred to departments directly.

Answers
C.

Agents can transfer the chat activities based on the Maximum Task limit setting.

C.

Agents can transfer the chat activities based on the Maximum Task limit setting.

Answers
D.

Agents have unlimited transfers of chat activity.

D.

Agents have unlimited transfers of chat activity.

Answers
E.

Only one chat activity can be transferred at a time.

E.

Only one chat activity can be transferred at a time.

Answers
Suggested answer: A, E

Which LDAP URL allows configuration in the properties pane under SSO configuration?

A.

Ldap://idap_server:3269

A.

Ldap://idap_server:3269

Answers
B.

Ldap://idap_server:80

B.

Ldap://idap_server:80

Answers
C.

Ldap://idap_server:443

C.

Ldap://idap_server:443

Answers
D.

Ldap://idap_server:3268

D.

Ldap://idap_server:3268

Answers
Suggested answer: B

Which CLI command verifies the authenticity and integrity of a downloaded ISO?

A.

Openssl dgst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

A.

Openssl dgst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

Answers
B.

Openssl dst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

B.

Openssl dst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

Answers
C.

Openssl dst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<|SO Image>

C.

Openssl dst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<|SO Image>

Answers
D.

Openssl dgst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

D.

Openssl dgst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature>

<ISO Image>

Answers
Suggested answer: D

Which process scans content and applies regular expressions to mask the sensitive information?

A.

Data leak prevention

A.

Data leak prevention

Answers
B.

Data masking

B.

Data masking

Answers
C.

Data filtering

C.

Data filtering

Answers
D.

Data scanning

D.

Data scanning

Answers
Suggested answer: B

Which two types of data does a file server store? (Choose two.)

A.

application files

A.

application files

Answers
B.

application log files

B.

application log files

Answers
C.

error log files

C.

error log files

Answers
D.

system files

D.

system files

Answers
E.

report templates

E.

report templates

Answers
Suggested answer: A, D

Which two media classes require configuration to be used in Enterprise Chat and Email? (Choose two.)

A.

ECE_Default_Queue

A.

ECE_Default_Queue

Answers
B.

ECE_activity

B.

ECE_activity

Answers
C.

ECE_Inbound

C.

ECE_Inbound

Answers
D.

ECE_Email

D.

ECE_Email

Answers
E.

ECE_Chat

E.

ECE_Chat

Answers
Suggested answer: A, E

What is the formula for a standardized agent count for email?

A.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 10

A.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 10

Answers
B.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 6

B.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 6

Answers
C.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 20

C.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 20

Answers
D.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 4

D.

Standardized agent count for email = Actual agent count * Average number of messages handled per hour by each agent / 4

Answers
Suggested answer: C
Total 56 questions
Go to page: of 6