Refer to the exhibit. Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?
A. WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the "Conf" performance class.
B. WebEx traffic will prefer WAN 1 as it is the primary uplink.
C. WebEx traffic will prefer WAN 2 as long as it is up.
D. WebEx traffic will be load-balanced between both active WAN links.
Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.
What is the next hop for the packet, based on this concentrator routing table?
A. The concentrator gateway (10.128.124.62) is the next hop.
B. Not enough detail is available to determine the next hop.
C. The packet is stopped.
D. The Auto VPN peer "Store 1532 ?appliance" is the next hop.
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
A. intrusion prevention
B. site-to-site VPN
C. secondary uplinks
D. DHCP
E. high availability
Which two Systems Manager Live tools are available only for Apple Macs and Windows PCs and cannot be used on iOS or Android mobile devices? (Choose two.)
A. OS updates
B. Send notification
C. Selective wipe
D. Screenshot
E. Remote Desktop
What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?
A. The Dashboard generates the SAML request.
B. The Dashboard provides user access credentials.
C. The Dashboard parses the SAML request and authenticates users.
D. The Dashboard generates the SAML response.
Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?
A. quarantine
B. prevention
C. detection
D. blocking
What is a feature of distributed Layer 3 roaming?
A. An MX Security Appliance is not required as a concentrator.
B. An MX Security Appliance is required as a concentrator.
C. All wireless client traffic can be split-tunneled.
D. All wireless client traffic is tunneled.
Refer to the exhibit. Which outcome occurs when logging is set to Enabled?
A. Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.
B. The hits counter within this section is now enabled.
C. This firewall rule is now enabled.
D. Inbound flows are sent to a configured syslog server if a syslog server configured for flows.
What is the best practice Systems Manager enrollment method when deploying corporate-owned iOS devices?
A. manual
B. Apple Configurator
C. Sentry enrollment
D. DEP
Refer to the exhibit. What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?
A. The MX appliance performs IDS/IPS for inter-VLAN traffic.
B. The MX appliance performs AMP for inter-VLAN traffic.
C. The MX appliance performs data encryption for inter-VLAN traffic.
D. The MX appliance performs content filtering for inter-VLAN traffic.
Which Cisco Meraki product must be deployed in addition to Systems Manager so that Systems Manager Sentry enrollment can be used?
A. MS Switch
B. Meraki Insight
C. MR Access Point
D. MV Smart Camera
Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
A. highest VLAN ID that is configured and set to NO to use VPN
B. lowest VLAN ID that is configured and set to YES to use VPN
C. highest VLAN ID that is configured and set to YES to use VPN
D. lowest VLAN ID configured and set to NO to use VPN
Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?
A. No configuration step is necessary; automatic updating is the default behavior.
B. Configure automatic updating of iOS devices in the Meraki installed profile.
C. Create a security policy that enables automatic updates.
D. Create a profile with automatic update enabled and apply it to iOS devices.
DRAG DROP
Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.
Select and Place:
DRAG DROP
Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.
Select and Place: