What is required for a user to connect to a secure meeting?
A. Access the meeting through the bookmarks page.
B. Obtain a valid username and password from the meeting server administrator.
C. Launch the meeting client, fill out the meeting ID, username, and password, and connect.
D. Connect to https://
In which two instances should you use a support meeting? (Choose two.)
A. when many users will be logging in to the meeting
B. when a meeting must be created on demand
C. when you need to assist with troubleshooting a client machine
D. when you want to create the meeting through Microsoft Outlook
Which two are possible ways to replicate or export the log from an existing IVE system? (Choose two.)
A. Save the log from the Admin UI.
B. Push the config and log to another IVE node.
C. Archive the log data using FTP or SCP.
D. Join a cluster.
Which two values can you configure in a Form POST policy in the IVE to post to a Web-enabled application? (Choose two.)
A. LDAP attributes
B. user-agent
C. IVE session variables
D. query string
You have correctly enabled meeting email notifications by defining the appropriate SMTP options on the IVE device's Secure Meeting configuration page. However, when new meetings are created, invitees do not receive the emails. What might be causing this problem?
A. The time is not synchronized between the IVE device and the SMTP server.
B. You have invited attendees with email addresses in a domain that is not registered on the Secure Meeting configuration page.
C. You have chosen to "Hide attendee names" when specifying meeting options.
D. You have not specified the IVE device's fully qualified hostname on the Network configuration page.
When configuring a SAML Single Sign-On (SSO) policy, what are the two communication methods you can use to communicate with the SAML server? (Choose two.)
A. push
B. artifact
C. post
D. pull
Which three statements about role mapping are true? (Choose three.)
A. Role mapping can be configured first, before creating the actual roles.
B. Role mapping can be based on VLAN assignment.
C. Role mapping can be based on a user attribute value.
D. Role mapping can be based on custom expressions.
E. Role mapping can be based on a certificate and its data.
Which two options are available to the administrator of a secure meeting during a session? (Choose two.)
A. Transfer meeting control to other meeting administrators only.
B. Disable the chat option only for specific participants.
C. Extend the duration of the meeting.
D. Disconnect individual meeting participants.
You have finished setting up your IVS but you seem to be having issues with your configured VLANs. Which two options should you verify when troubleshooting VLANs on the IVS? (Choose two.)
A. Your virtual port must be assigned to the correct virtual system.
B. Your VLAN must have enough users allocated to the virtual system.
C. Your VLAN must use 802.1q tagging.
D. Your VLAN must be assigned to the correct virtual system.
Which statement is true regarding Secure Meeting?
A. It requires minimal changes to security policies to ensure full functionality.
B. It requires only an SSL connection to provide full visibility into the meeting.
C. It can be used only by users with valid authenticated accounts.
D. It works with Windows and Mac OS platforms only.