Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.

Full Access
Question # 5

What happens to an unsupervised iOS device when the “Meraki management” profile is removed?

A.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed remain.

B.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed are also removed.

C.

The “Meraki management” profile is removed and then pushed automatically by Systems Manager.

D.

The “Meraki management” profile cannot be removed.

Full Access
Question # 6

Refer to the exhibit. What Is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?

A.

All flows alternate in a 5:1 ratio.

B.

All flows alternate in a 2:1 ratio.

C.

All flows agrees via WAN 1:1 ratio.

D.

All flows egress via WAN1.

Full Access
Question # 7

Which API endpoint clones a new Organization?

A.

POST /organizations/clone/{organizationId}

B.

PUT /organizations/{organizationId}/clone

C.

POST /organizations/{organizationId}/new

D.

POST /organizations/{organizationId}/clone

Full Access
Question # 8

Drag and drop the settings from the left onto the available or non-available methods of applying a group policy to a Cisco Meraki MR access point on the right.

Full Access
Question # 9

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?

A.

Wireless > Configure > Access Control

B.

Wireless > Configure > Splash page

C.

Wireless > Configure > Firewall & Traffic Shaping

D.

Wireless > Configure > SSIDs

Full Access
Question # 10

Air Marshal has contained a malicious SSID.

What are two effects on connectivity? (Choose two.)

A.

Currently associated clients stay connected.

B.

New clients can connect.

C.

Currently associated clients are affected by restrictive traffic shaping rules.

D.

New clients cannot connect.

E.

Currently associated clients are disconnected.

Full Access
Question # 11

Refer to the exhibit.

Which condition or conditions will cause the "All Databases & cloud services" SD-WAN traffic to be routed via a VPN2 tunnel on WAN2?

A.

WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.

B.

WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.

C.

WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.

D.

WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.

Full Access
Question # 12

In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)

A.

Renew the Dashboard license.

B.

License a network.

C.

License more devices.

D.

Call Meraki support.

E.

Wait for the devices to auto-renew.

Full Access
Question # 13

Refer to the exhibit.

This Dashboard organization uses Co-Termination licensing model.

What happens when an additional seven APs are claimed on this network without adding licenses?

A.

All APs immediately stop functioning.

B.

All network devices stop functioning in 30 days.

C.

One AP Immediately stops functioning.

D.

All APs stop functioning in 30 days.

Full Access
Question # 14

Refer to the exhibit.

Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?

A.

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the “Conf” performance class.

B.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

C.

WebEx traffic will prefer WAN 2 as long as it is up.

D.

WebEx traffic will be load-balanced between both active WAN links.

Full Access
Question # 15

What are two roles of the network and device tags in a Dashboard? (Choose two.)

A.

Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.

B.

Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.

C.

Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.

D.

Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.

E.

Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.

Full Access
Question # 16

Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.

Full Access
Question # 17

A customer wants to use Microsoft Azure to host corporate application servers.

Which feature does the customer get by using a vMX appliance rather than connecting directly to Azure by VPN?

A.

malware protection

B.

SD-WAN

C.

next-generation firewall

D.

intrusion prevention

Full Access
Question # 18

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

A.

Controller disconnection behavior

B.

Captive Portal strength

C.

Simultaneous logins

D.

Firewall & traffic shaping

E.

RADIUS for splash page settings

Full Access
Question # 19

What is a feature of distributed Layer 3 roaming?

A.

An MX Security Appliance is not required as a concentrator.

B.

An MX Security Appliance is required as a concentrator.

C.

All wireless client traffic can be split-tunneled.

D.

All wireless client traffic is tunneled.

Full Access
Question # 20

A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.

Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?

A.

zone exclusion

B.

privacy window

C.

area or interest

D.

sensor crop

E.

restricted mode

Full Access
Question # 21

Which design requirement is met by implementing syslog versus SNMP?

A.

when automation capabilities are needed

B.

when proactive alerts for critical events must be generated

C.

when organization-wide information must be collected

D.

when information such as flows and client connectivity must be gathered

Full Access