Fabrikam has recently deployed Skype for Business Server for all modalities including Enterprise Voice which they manage from central location in Sydney. A recent change in their work from home policies requires users to work from their homes at least 3 days a week. Fabrikam’s IT help desk has 10 members in their tier 1 TeleHelp group dedicated to receive incoming support calls of the internal employees. Fabrikam wants to deploy a Skype for Business solution for the TeleHelp group with minimum administrative effort.
TeleHelp group members want to get a notification of all the incoming calls to any member of the TeleHelp group. Each member should be able to answer the call as per their availability. You need to deploy Skype for Business solution for TeleHelp group. What two actions should you perform? Each correct answer presents part of the solution.
A. Configure Group Call Pickup for TeleHelp group.
B. For every TeleHelp group member configure Forward My Calls to Team-Call Group consisting of all 10 members.
C. For every TeleHelp group member configure Forward My Calls to My Delegates and add each member as a delegate to each other.
D. For every TeleHelp group member configure Simultaneously Ring to My Delegates and add each member as a delegate to each other.
E. Configure a response group and add TeleHelp group members as formal agents.
F. Configure a response group and add TeleHelp group members as informal agents.
You need to configure the BCS model to access data. What should you do?
A. Import the BCS model and enter the required account by using the Set Object Permissions command.
B. Create an external content type and enter the target application ID in the Secure Store Application ID field.
C. Create an external content type and choose the Connect with user’s identity option.
D. Create an external content type and choose the Connect with impersonated custom identity option. Enter the target application friendly name of the Secure Store target application.
You need to configure SharePoint for the appropriate protection of merger documents. What should you do?
A. Configure Information Rights Management.
B. Configure Web Part security.
C. Configure document library permissions.
D. Configure document conversions.
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains 20 virtualization hosts.
Each host contains 20 virtual machines.
You need to configure the network fabric.
The solution must prevent the virtual machines from connecting to a VLAN.
What should you do from the Network Site properties?
A. set the VLAN ID to 0.
B. set the VLAN ID to 10.
C. set the IP subnet to FD4A::/32.
D. set the IP subnet to 192.168.1.0/20.
You need to recommend a solution to resolve the monitoring issue for the Hyper-V hosts. Which performance object should you recommend?
A. Hyper-V Hypervisor Logical Processor
C. Hyper-V Hypervisor Root Virtual Processor
D. Hyper-V Hypervisor Virtual Processor
You work as a senior administrator at Realbraindumps.com. The Realbraindumps network consists of a single domain named Realbraindumps.com. Realbraindumps.com makes use of System Center 2012 Configuration Manager in their environment. You are currently analyzing the Dcmagent.log file. Which of the following are recorded in this log?
A. Information regarding configuration item task scheduling.
B. Details regarding the process of remediation and compliance for compliance settings, software updates, and application management.
C. Information regarding reporting policy platform results into state messages for configuration items.
D. High-level information regarding the evaluation, conflict reporting, and remediation of configuration items and applications.
E. Information regarding reading configuration item synclets from Windows Management Instrumentation (WMI).
You plan to have an expert speaker address the students about a recent historical event. Which two possible ICT resources should you recommend that the students use to create an accurate record of the speaker’s statements? (Each correct answer presents a complete solution. Choose two.)
This item is part of a case study. To view the case study information, click on the Case Study button below.
A. the digital voice recorder
B. the LMS
C. an Internet connection
D. a digital camera
E. a video camera
F. the flatbed scanner
G. the printers
You have received an email from a person you met at a conference you recently attended. The email mentions that their organization might be interested in the services provided by your organization. You need to create a record for this person in Microsoft Dynamics 365 to be later set to the qualified status by your organization. Which record type can be used to accomplish this goal?
You need to recommend a solution to migrate the Listings database to the cloud. What should you recommend?
A. Stage the Listings database on an Azure virtual machine prior to the outage. During the outage, perform a data import from the main office by using SQL Server Management Studio.
B. Implement log-shipping between the main office and an Azure virtual machine prior to the migration date. During the planned outage, perform a final log backup, restore the backup to the secondary, and then switch the secondary to the primary role.
C. Run a full backup during the outage and restore the backup to the Azure virtual machine.
D. Implement merge replication between the main office and the Azure virtual machine.
You have two similar cases. One case is named Case1 and the other is named Case2 Each case has a different parent case. You attempt to merge Case1 into Case2. What is the result to the merge process?
A. Case1 is merged into Case2 Activities and notes are combined under Case2.
B. The cases will not merge. Both cases will become child cases of the parent for Case2
C. The cases will not merge. Each case will remain parented to their original records.
D. Case1 is merged into Case2 Activities and notes are combined under Case1.