Cisco Meraki Solutions Specialist v1.0

Page:    1 / 5   
Exam contains 66 questions


Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?

  • A. quarantine
  • B. prevention
  • C. detection
  • D. blocking


Answer : B

DRAG DROP -
Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.



Answer :

Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?

  • A. No configuration step is necessary; automatic updating is the default behavior.
  • B. Configure automatic updating of iOS devices in the Meraki installed profile.
  • C. Create a security policy that enables automatic updates.
  • D. Create a profile with automatic update enabled and apply it to iOS devices.


Answer : C



Refer to the exhibit. Which two configurations are needed to successfully monitor custom applications that a user is accessing using Cisco Meraki Insight? (Choose two.)

  • A. The custom application uses TLS on any ports.
  • B. The custom application uses HTTP on port 8080.
  • C. The custom application uses HTTPS on TCP 443.
  • D. The custom application uses SMB/CIFS.
  • E. The custom application uses HTTPS on port 8080.


Answer : BE

DRAG DROP
-

Drag and drop the settings from the left onto the OS system or systems that support it on the right. Settings can be used more than once.



Answer :



Refer to the exhibit. Why does the end user complain of poor wireless performance?

  • A. Channel 48 utilization is at 84 percent.
  • B. The client is using 20 MHz channel width to connect.
  • C. Non-802.11 traffic of 18 percent indicates poor AP placement.
  • D. The client is connected to the secondary radio of the AP instead of the primary radio.


Answer : A

What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?

  • A. 10 milliseconds
  • B. 100 milliseconds
  • C. 1 second
  • D. 10 seconds


Answer : C

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user’s device?

  • A. Unenroll Device
  • B. Clear Pushed Data
  • C. Selective Wipe
  • D. Erase Device


Answer : C



Refer to the exhibit. What is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?

  • A. All flows egress via WAN 1.
  • B. All flows alternate in a 1:1 ratio.
  • C. All flows alternate in a 5:1 ratio.
  • D. All flows alternate in a 2:1 ratio.


Answer : D


Refer to the exhibit. What are two outcomes reflected in the Web App Health application? (Choose two.)

  • A. Users on both networks may be experiencing issues when attempting to reach Google.
  • B. Network #1 could not load Google because of a remote server issue.
  • C. Network #2 had better application performance than Network #1.
  • D. Network #2 could not load Google because of a local client misconfiguration.
  • E. Neither network recorded any server-side performance issues.


Answer : BE

Where should a network admin navigate to investigate wireless mesh information between Meraki APs?

  • A. Wireless > Monitor > Access Points > AP > RF
  • B. Wireless > Configure > Radio Settings
  • C. Wireless > Monitor > Wireless Health
  • D. Wireless > Monitor > RF Spectrum


Answer : A

A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.
Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?

  • A. zone exclusion
  • B. privacy window
  • C. area or interest
  • D. sensor crop
  • E. restricted mode


Answer : E

Which information is used to calculate whether a WAN link has high usage?

  • A. data under Security & SD WAN > Appliance Status > Uplink > Live Data
  • B. total historical throughput of an uplink
  • C. total number of devices that are actively passing traffic
  • D. value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration


Answer : D


Refer to the exhibit. The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?

  • A. Add a deny any/any firewall rule to the end of the firewall rules.
  • B. Remove the connection from Internet 1.
  • C. Physically disconnect all LAN ports.
  • D. Configure the MX appliance to Routed mode on the Addressing & VLANS page.


Answer : C


Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.
What is the next hop for the packet, based on this concentrator routing table?

  • A. The concentrator gateway (10.128.124.62) is the next hop.
  • B. Not enough detail is available to determine the next hop.
  • C. The packet is stopped.
  • D. The Auto VPN peer “Store 1532 – appliance” is the next hop.


Answer : B

Page:    1 / 5   
Exam contains 66 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy