Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?
Answer : B
DRAG DROP -
Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.
Answer :
Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?
Answer : C
Refer to the exhibit. Which two configurations are needed to successfully monitor custom applications that a user is accessing using Cisco Meraki Insight? (Choose two.)
Answer : BE
DRAG DROP
-
Drag and drop the settings from the left onto the OS system or systems that support it on the right. Settings can be used more than once.
Answer :
Refer to the exhibit. Why does the end user complain of poor wireless performance?
Answer : A
What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?
Answer : C
An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user’s device?
Answer : C
Refer to the exhibit. What is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?
Answer : D
Refer to the exhibit. What are two outcomes reflected in the Web App Health application? (Choose two.)
Answer : BE
Where should a network admin navigate to investigate wireless mesh information between Meraki APs?
Answer : A
A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.
Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?
Answer : E
Which information is used to calculate whether a WAN link has high usage?
Answer : D
Refer to the exhibit. The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?
Answer : C
Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.
What is the next hop for the packet, based on this concentrator routing table?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us