Which action should be taken to ensure a stable environment?
Refer to the exhibit. The VPN concentrator is experiencing issues. Which action should be taken to ensure a stable environment?A . Add a deny any/any firewall rule to the end of the firewall rules.B . Remove the connection from Internet 1.C . Physically disconnect all LAN ports.D . Configure the...
What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?A . 1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.B . 100-byte UDP probes every second,...
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?A . Wireless > Configure > Access ControlB . Wireless > Configure > Splash pageC . Wireless > Configure > Firewall & Traffic ShapingD . Wireless > Configure > SSIDsView AnswerAnswer: A Explanation: SM Sentry enrollment can...
What is the next hop for the packet, based on this concentrator routing table?
Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4. What is the next hop for the packet, based on this concentrator routing table?A . The concentrator gateway (10.128.124.62) is the next hop.B . Not enough detail is available to...
Which design requirement is met by implementing syslog versus SNMP?
Which design requirement is met by implementing syslog versus SNMP?A . when automation capabilities are neededB . when proactive alerts for critical events must be generatedC . when organization-wide information must be collectedD . when information such as flows and client connectivity must be gatheredView AnswerAnswer: D Explanation: Implementing syslog...
Which IDS/IPS mode is the MX Security Appliance configured for?
Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?A . quarantineB . preventionC . detectionD . blockingView AnswerAnswer: B Explanation: You can enable intrusion prevention by setting the Mode drop-down to Prevention under Security & SD-WAN > Configure > Threat protection > Intrusion detection and...
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)A . intrusion preventionB . site-to-site VPNC . secondary uplinksD . DHCPE . high availabilityView AnswerAnswer: AB Explanation: These are the two features and functions that are supported when using an MX appliance in...
What happens when an additional seven APs are claimed on this network without adding licenses?
Refer to the exhibit. This Dashboard organization uses Co-Termination licensing model. What happens when an additional seven APs are claimed on this network without adding licenses?A . All APs immediately stop functioning.B . All network devices stop functioning in 30 days.C . One AP Immediately stops functioning.D . All APs...
Which two Systems Manager Live tools are available only for Apple Macs and Windows PCs and cannot be used on iOS or Android mobile devices? (Choose two.)
Which two Systems Manager Live tools are available only for Apple Macs and Windows PCs and cannot be used on iOS or Android mobile devices? (Choose two.)A . OS updatesB . Send notificationC . Selective wipeD . ScreenshotE . Remote DesktopView AnswerAnswer: DE Explanation: https://documentation.meraki.com/SM/Monitoring_and_Reporting/MDM_Commands_in_Systems_Manager - Under Live Tools Selective...
When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)
When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)A . Controller disconnection behaviorB . Captive Portal strengthC . Simultaneous loginsD . Firewall & traffic shapingE . RADIUS for...