Q: 18
An administrator is configuring an Intercluster Lookup Service between 10 Cisco UCM clusters. Due
to security requirements, certificate-based authentication must be used. Due to the deployment size,
the administrator wants to avoid manually exchanging certificates between the clusters. Which two
steps must be followed to meet these requirements? (Choose two)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.