In Avaya Aura 7 the Avaya Session Border Controller for Enterprise (SBCE) license is installed on a System Manager (SMGR) WebLM server. The EMS points to the WebLM server using a URL. What is the correct syntax of the URL where 135.xxx.xxx.xxx. is the IP address of the SMGR WebLM server?
A. https://135.xx.xxx.xx:8443/WebLM/LicenseServer
B. https://135.xx.xxx.xx:8080/LicenseServer
C. https://135.xx.xxx.xx:52233/WebLM/LicenseServer
D. https://135.xx.xxx.xx/WebLM
Which tracing tools that help to debug WebRTC protocols are available on the Avaya BreezeTM platform?
A. traceTURN, traceSTUN, and traceHTTP
B. traceWEB and traceSM
C. traceSTUN, traceTURN, and traceCE
D. traceHTTP and traceCE
A customer reports that none of their users can IM or see each other's presence. After troubleshooting you discover that default gateway of the Avaya Breeze TM SM100 has the wrong IP Address in the configuration. Where would you go to correct this problem?
A. Use Avaya Aura System Manager web GUI to access the Breeze<; Server Administration, and edit the Server Instance.
B. Use Avaya Aura System Manager web GUI to update the SIP Entity screen.
C. Use SSH to Avaya Breeze TM, and use the route command to correct the routing table.
D. Use SSH to Avaya Breeze TM, and run SMnetSetup.
Which statement about Avaya Session Border Controller (SBC) is true?
A. The Avaya SBC secures and authenticates Integrated Services Digital network (ISDN) calls placed to/from the Public Switched Telephone Network (PSTN).
B. The Avaya SBC is the enabling and secure pivot point for SIP Communications in and out of the Enterprise.
C. The Avaya SBC is a service within System Manager (SMGR) to support deployments.
D. The Avaya SBC is the enabling and secure pivot point for H.323 Communications in and out of the Enterprise.
In which way can you check if the Avaya Aura Messaging (AAM) server is using the correct certificate?
A. Using AAM SMI, navigate to Administration > Messaging > Security > Server/Application Certificates
B. Using AAM SMI, navigate to Messaging > Software Management > Software Verification
C. Using AAM SMI, navigate to Administration > Messaging > Security > Trusted Certificates
D. Using AAM SMI, navigate to Administration > Server Maintenance > Security > Server/Application Certificates
What are two ways to view the ipcs.log file of an Avaya Session Border Controller for Enterprise (SBCE) High Availability (HA) system? (Choose two.)
A. Login to the EMS using a web browser, then click on Logs > System Logs.
B. Login to the active SBCE, and cat /archive/syslog/ipcs/ipcs.log.
C. Login to the EMS and cat /archive/syslog/ipcs/ipcs.log.
D. Login to the EMS using a web browser, then click on the active SBCE under Installed Devices, then click on View System Logs.
E. Login to the EMS and cat /var/log/ipcs.log.
Considering the message flow to an Avaya Aura Contract Centre (AACC) Agent Desktop, which protocol is used to communicate between AACC, CCT, and the Agent Desktop PC?
A. CSTA
B. TSAPI C. SIP
D. WCF
To validate the initial system status of Breeze with the WebRTC Snap-I, which two components should be checked? (Choose two.)
A. application
B. configured certificates
C. cluster status
D. licensing status
E. installation status
A customer reports that they cannot place WebRTC calls. You discover there is a problem with communication between Avaya Breeze TM and the Avaya Aura Media Server (AAMS). Where in Avaya Breeze TM do you set/check the User ID for Restful TLS authentication?
A. Use the System Manager (SMGR) web GUI to access Breeze > Configuration > Avaya Aura Media Server
B. Use the System Manager (SMGR) web GUI to access Breeze > Cluster Administration > General > Cluster Attributes
C. Use the System Manager (SMGR) web GUI to access Breeze > Configuration > Attributes
D. Use the System Manager (SMGR) web GUI to access Breeze > Server Administration > Dashboard
A maintenance engineer logs onto the Command Line Interface (CLI) of Avaya Aura ?Messaging (AAM) and issues the vmstat command. What information will the display present?
A. The amount of virtual memory used
B. The status information about the virtual machine
C. The statistical information about voicemail boxes
D. The count of mailbox password violation attempts