Drag and drop the descriptions from the left onto the permission types on the right.
What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)
Aby defining a range of serial numbers
Bby defining the scope
Cby using device tags
Dby using Wi-Fi tags
Eby using dynamic IP tags
Refer to the exhibit. Which condition or conditions will cause the “All Databases & cloud services” SD-WAN traffic to be routed via a VPN tunnel on WAN2?
AWAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.
BWAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.
CWAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.
DWAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.
Refer to the exhibit. Which design recommendation should be considered?
AA 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
BA 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
CA 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
DA 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
What are two ways peers interact with ports that Auto VPN uses? (Choose two.)
AFor IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.
BPeers contact the VPN registry at UDP port 9350.
CFor IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.
DPeers contact the VPN registry at TCP port 9350.
EFor IPsec tunneling, peers use UDP ports 500 and 4500.
One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.
Based on client count, how many APs (rounded to the nearest whole number) are needed?
A26
B28
C30
D32
Which information do the MXs in a High Availability pair share?
Aspanning-tree state
Btime synchronization state
CDHCP association database
Dstateful firewall database
Refer to the exhibit. What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?
AThe MX appliance performs IDS/IPS for inter-VLAN traffic.
BThe MX appliance performs AMP for inter-VLAN traffic.
CThe MX appliance performs data encryption for inter-VLAN traffic.
DThe MX appliance performs content filtering for inter-VLAN traffic.
DRAG DROP -
Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.
How does a Meraki device behave if cloud connectivity is temporarily lost?
AThe offline device continues to run with its last known configuration until cloud connectivity is restored.
BThe offline device reboots every 5 minutes until connection is restored.
CThe offline device stops passing traffic.
DThe offline device tries to form a connection with a local backup sever.
Refer to the exhibit. Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)
AChange the primary uplink to "none".
BAdd an internet traffic preference that defines the load-balancing ratio as 4:1.
CEnable load balancing.
DSet the speed of the cellular uplink to zero.
EChange the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.
A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.
Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?
Azone exclusion
Bprivacy window
Carea or interest
Dsensor crop
Erestricted mode
Refer to the exhibit. Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?
AWebEx traffic will prefer WAN 2 as long as it meets the thresholds in the “Conf” performance class.
BWebEx traffic will prefer WAN 1 as it is the primary uplink.
CWebEx traffic will prefer WAN 2 as long as it is up.
DWebEx traffic will be load-balanced between both active WAN links.
Which information is used to calculate whether a WAN link has high usage?
Adata under Security & SD WAN > Appliance Status > Uplink > Live Data
Btotal historical throughput of an uplink
Ctotal number of devices that are actively passing traffic
Dvalue under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration
A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and 50 remote sites with a single uplink connection.
How many tunnels does each hub need to support?
A52
B54
C100
D104
Refer to the exhibit. What are the Loss and Average Latency statistics based on?
Aresponses that the MX appliance receives on the connectivity-testing hostnames on the Insight > Web App Health page
Bresponses that the MX appliance receives on the connectivity-testing IP addresses on the Security & SD-WAN > Firewall page
Cresponses that the MX appliance receives on the connectivity-testing IP address that is configured on the Security & SD-WAN > SD-WAN & Traffic Shaping page
Dresponses that the MX appliance receives on the connectivity-testing IP addresses on the Help > Firewall info page
Refer to the exhibit. For an AP that displays this alert, which network access control method must be in use?
Apreshared key
BWPA2-enterprise with my RADIUS server
Csplash page with my RADIUS server
DMAC-based access control with RADIUS server
Refer to the exhibit. Which outcome occurs when logging is set to Enabled?
AOutbound flows are sent to a configured syslog server if a syslog sender is configured for flows.
BThe hits counter within this section is now enabled.
CThis firewall rule is now enabled.
DInbound flows are sent to a configured syslog server if a syslog server configured for flows.
Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?
ANo configuration step is necessary; automatic updating is the default behavior.
BConfigure automatic updating of iOS devices in the Meraki installed profile.
CCreate a security policy that enables automatic updates.
DCreate a profile with automatic update enabled and apply it to iOS devices.
What is the best practice Systems Manager enrollment method when deploying corporate-owned iOS devices?
Amanual
BApple Configurator
CSentry enrollment
DDEP
Refer to the exhibit. What is the minimal Cisco Meraki Insight licensing requirement?
AA single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B.
BA single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B.
CA single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B.
DTwo Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B.
ETwo Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B.
Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
A1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.
B100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.
C100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.
D1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.
What occurs when a configuration change is made to an MX network that is bound to a configuration template?
AThe configuration change in the bound network is combined with the template configuration inside the template.
BThe more restrictive configuration is preferred.
CThe configuration change in the bound network overrides the template configuration.
DThe template configuration overrides the configuration change in the bound network.
DRAG DROP -
Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.