Which of these is the best practice to employ when using certificates between a browser and the Cisco Unified CallManager 5.0 server?
Which three common characteristics are used to define the types of devices that go into a device pool?
Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server?