What is used to build VXML applications?
Configuration Manager
PCCE Web Administration Manager (S.P.O.G)
Call Studio development platform
Script Editor tool
To build VXML applications, you need to use the Call Studio development platform. Call Studio is an Eclipse-based graphical tool that allows you to create, edit, debug, and test voice applications that run on the VXML Server. Call Studio provides a drag-and-drop interface to design the call flow logic, define the prompts and grammars, and configure the application settings. Call Studio also supports custom elements, Java code, and web services integration to extend the functionality of the voice applications12. References: Cisco Unified Customer Voice Portal Getting Started Guide, Release 12.5(1)1, Cisco Unified Customer Voice Portal Developer Guide, Release 12.5(1)2.
Which two descriptions apply to UC on UCS Spec Based? (Choose two.)
may be available as a packaged offer such as the Cisco Business Edition 7000 Platform
VMware vCenter is required
defined as Rule Based
defined as Configuration Based
VMware vSphere is optional
UC on UCS Spec Based is a deployment option for Cisco Unified Communications (UC) applications on Cisco Unified Computing System (UCS) servers that allows customers to choose their own hardware configuration based on a set of rules and guidelines1. The two descriptions that apply to UC on UCS Spec Based are:
The other options are incorrect because:
References:
1: Cisco Collaboration Virtualization - Unified Communications in a Virtualized Environment 2: Cisco Business Edition 7000 Version 12.5 Ordering Guide 3: Cisco Collaboration Virtualization - VMware Requirements
What are two upgrades for Common Ground? (Choose two.)
updates IP address as appropriate
in-place upgrades exist on VMs
updates Hostname as appropriate
includes migration of windows registry
includes database migration
Two upgrades for Common Ground are includes migration of windows registry and includes database migration. Common Ground is a type of upgrade that allows you to upgrade your Cisco Unified Contact Center Enterprise (CCE) components from one release to another without changing the hardware or operating system1. Common Ground upgrade is supported for virtualized deployments on VMware ESXi hosts1. Common Ground upgrade involves the following steps1:
The Common Ground upgrade includes migration of windows registry because the Regutil Tool is used to export and import the Cisco Systems, Inc. registry from the source servers to the destination servers. The registry contains important information about the Unified CCE configuration, such as the instance name, the peripheral ID, the system ID, and the license key2. The registry migration ensures that the destination servers have the same settings as the source servers after the upgrade2.
The Common Ground upgrade includes database migration because the EDMT is used to migrate the HDS, Logger, and BA databases from the source servers to the destination servers. The databases contain historical and real-time data about the Unified CCE system, such as the call records, the agent statistics, the skill group statistics, and the reporting data3. The database migration ensures that the destination servers have the same data as the source servers after the upgrade3.
The Common Ground upgrade does not update IP address as appropriate because the IP addresses of the source and destination servers are not changed during the upgrade. The IP addresses are configured during the initial installation of the Unified CCE software and are not modified by the upgrade process1.
The Common Ground upgrade does not update Hostname as appropriate because the hostnames of the source and destination servers are not changed during the upgrade. The hostnames are configured during the initial installation of the Unified CCE software and are not modified by the upgrade process
Which three statements describe fails in the high availability of Cisco Unified Intelligent Contact Management central controller? (Choose three.)
If ICM Logger side A fails, router side B cannot send historical info to ICM Logger side A and is limited to ICM Logger side B.
If the private LAN fails, the Peripheral Gateways are used to help determine the active call router side of the duplex pair.
If ICM Logger side A fails, the impact of call processing is limited to ICM call router side A.
If one ICM call router of a duplex pair of Cisco Unified ICM call routers fails, the surviving ICM call router recognizes the failure when it receives no response to heartbeats over the private LAN.
There is no impact on call processing during a Cisco Unified ICM Logger failure.
During Cisco Unified ICM call router failover processing, calls in progress in Cisco Unified Customer Voice Portal are disconnected, but all new calls are processed successfully.
References:
Which two claim rules will be added to specify the claims sent from ADFS to Cisco Identity Service as part of a successful SAML assertion in PCCE? (Choose two.)
sAMAccountName - Logon names maintained for backward compatibility
user_principal - For Identifying the authentication realm of the user in the assertion sent to Cisco Identity Service.
E-Mail Address - For the Outgoing claim type
Unspecified - For the Incoming name ID format
uid - For Identifying the authenticated user in the claim sent to the applications
 = In order to configure SAML SSO for PCCE, you need to create claim rules that specify the claims sent from ADFS to Cisco Identity Service as part of a successful SAML assertion. The claim rules define how to transform the incoming claims from the AD FS identity provider into the outgoing claims that are expected by the Cisco Identity Service relying party. The two claim rules that are required for PCCE are:
The other options are not valid claim rules for PCCE. The user_principal option is not a valid attribute name in AD FS. The Unspecified option is not a valid claim type in AD FS. The uid option is not a valid attribute name in AD FS, but it is the outgoing claim type that is mapped from the sAMAccountName attribute.
References :=
Which three features does Cisco Unified Border Element provide when CCE and Cisco Unified Customer Voice Portal are used? (Choose three.)
Silent Monitor inbound voice calls
NAT for address hiding D Demarcation point between networks
Record calls by forking the media using build-in-bridge
Secure communication using flow around mode
Normalize SIP messages using SIP profiles
 Cisco Unified Border Element (CUBE) is a session border controller that provides session control, security, interworking, and demarcation for voice and video calls between the enterprise IP network and service provider SIP trunks1. When CUBE is used with CCE and CVP, it provides the following three features:
References: Cisco Unified Border Element data sheet1, Cisco Unified Border Element Configuration Guide234.
Which CLI command manages the Java Keystore Certificate in Windows CCE servers?
PROCMON
OPENSSL
System CLI
Keytool
The CLI command that manages the Java Keystore Certificate in Windows CCE servers is keytool. Keytool is a utility that is included in the Java Runtime Environment (JRE) and allows you to create, import, export, list, and delete certificates, keys, and keystores. A keystore is a repository of security certificates that can be used for SSL/TLS communication. The Java Keystore Certificate is the default keystore that is used by the Java applications running on the Windows CCE servers, such as the Web Setup tool, the Diagnostic Framework Portico, and the Unified Intelligence Center12. To use keytool, you need to open a command prompt window and navigate to the JRE bin directory, which is typically located at C:\Program Files\Java\jre
Which two validations will be completed for the PCCE production deployment model on an ESXi server? (Choose two.)
Linux verification for containers.
The hypervisor provides enough power.
The lab is deployed properly.
Ensure that the correct servers are on the correct sides.
Correct RAM and CPU are being deployed.
The PCCE production deployment model on an ESXi server requires two validations: ensuring that the correct servers are on the correct sides and verifying that the correct RAM and CPU are being deployed. These validations are necessary to ensure that the PCCE components are configured properly and have sufficient resources to run smoothly. The other options are not relevant for the PCCE production deployment model on an ESXi server. Linux verification for containers is not applicable because PCCE does not use containers. The hypervisor provides enough power is not a validation step, but a prerequisite for the ESXi server. The lab is deployed properly is not a validation for the production deployment model, but for the lab deployment model. References: Virtualization for Cisco Packaged CCE Release 11.6(x)1, Deployment Type Info API2.
What must be enabled on the CUIC server for CUIC reports to show up in Finesse?
PROXY
Cross Origin Resource Sharing (CORS)
Hazelcast
JSONP
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/pcce/pcce_12_5_1/release/guide/pcce_b_1251_pcce-release-notes/pcce_b_1251_pcce-release-notes_chapter_010.pdf
Which three modes can implement single sign-on in PCCE? (Choose three.)
Non-SSO
SSO
ldS
ldP
SAML
Hybrid
According to the Cisco documentation12, single sign-on (SSO) in PCCE can be implemented in one of these three modes:
Option A is incorrect because Non-SSO is the opposite of SSO, and it means continuing to use existing Active Directory-based and local authentication, without SSO1. Option C is incorrect because ldS is a typo for IdS, which is not a mode but a component of SSO. Option D is incorrect because ldP is a typo for IdP, which is also not a mode but a component of SSO.
References:
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/pcce/pcce_12_6_1/maintenance/guide/pcce_b_features-guide-1261/pcce_b_features-guide-1261_chapter_01110.html
Which keytool command lists certificates in the cacerts file?
keytool -list -showinfo
keytool -list -keystore cacerts
keytool -list cacerts
keytool -list -alias
 The keytool command that lists certificates in the cacerts file is B: keytool -list -keystore cacerts. This command will display the aliases and fingerprints of all the certificates in the cacerts file, which is the default truststore for Java applications1. The cacerts file contains the root and intermediate certificates of various certificate authorities (CAs) that are trusted by Java2.
The other options are incorrect because:
References:
1: keytool - Key and Certificate Management Tool 2: How to check a Certificate is in default cacerts 3: java - How to view and edit cacerts file? - Stack Overflow 4: HOW TO: Import or list certificates from Java cacerts file using … 5: Keytool: List Certificate - Java Certs - ShellHacks
What are two considerations for Active Directory (AD)? (Choose two.)
user interface available
Remote Access Control is available for software
Read-Only Domain Controllers (RODC) are supported
global catalogs are required at each AD site
supports multi-domain, single AD Forest topology
 Active Directory (AD) is a directory service that provides centralized authentication, authorization, and management of users, computers, and resources in a network. AD is based on a hierarchical structure of domains, trees, and forests, where each domain represents a logical administrative unit with its own security policies and replication scope. AD also supports site topology, which defines the physical structure of the network based on locations and network links. Some of the considerations for AD are:
References:
Which three tools are used to download logs for CCE troubleshooting? (Choose three.)
PROCMON
Diagnostic framework portico
OPCTEST
DUMPLOG
Unified System CLI
RTTEST
The correct tools to download logs for CCE troubleshooting are:
References:
1: Diagnostic Framework Portico 2: Unified System CLI 3: RTTEST
TESTED 23 Feb 2025