Which two methods can be used to support these requirements and still maintain a high degree of security?

The Ajax server administrator is interested in determining how the Cisco Unified Communications Manager servers can be monitored and if the system has been compromised. Which two methods can be used to support these requirements and still maintain a high degree of security? (Choose two.)

The Ajax server administrator is interested in determining how the Cisco Unified Communications Manager servers can be monitored and if the system has been compromised. Which two methods can be used to support these requirements and still maintain a high degree of security? (Choose two.)

A.
Provide a uniform level of access to all operators, technicians, and system administrators.

B.
Turn on event logging in all the Cisco Unified Communications Manager servers and regularly review event logs for the cluster.

C.
Enable SNMP on all Cisco Unified Communications Manager servers and change the default community strings.

D.
Enable SNMP for all the devices that support IP telephony in theAjax network and change the default community strings.

E.
send all audit logs to a dedicated log server and filter the reports to view only critical and fatal events.



Leave a Reply 0

Your email address will not be published. Required fields are marked *