Which IDS/IPS mode is the MX Security Appliance configured for?

Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?A . quarantineB . preventionC . detectionD . blockingView AnswerAnswer: B Explanation: You can enable intrusion prevention by setting the Mode drop-down to Prevention under Security & SD-WAN > Configure > Threat protection > Intrusion detection and...

February 7, 2024 No Comments READ MORE +

What is the next hop for the packet, based on this concentrator routing table?

Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4. What is the next hop for the packet, based on this concentrator routing table?A . The concentrator gateway (10.128.124.62) is the next hop.B . Not enough detail is available to...

February 7, 2024 No Comments READ MORE +

What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?A . 1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.B . 100-byte UDP probes every second,...

February 7, 2024 No Comments READ MORE +

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)A . intrusion preventionB . site-to-site VPNC . secondary uplinksD . DHCPE . high availabilityView AnswerAnswer: BE Explanation: When using an MX appliance in Passthrough mode (also known as bridge mode), the following two...

February 7, 2024 No Comments READ MORE +

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?A . Wireless > Configure > Access ControlB . Wireless > Configure > Splash pageC . Wireless > Configure > Firewall & Traffic ShapingD . Wireless > Configure > SSIDsView AnswerAnswer: A Explanation: SM Sentry enrollment can...

February 6, 2024 No Comments READ MORE +

For an AP that displays this alert, which network access control method must be in use?

Refer to the exhibit. For an AP that displays this alert, which network access control method must be in use?A . preshared keyB . WPA2-enterprise with my RADIUS serverC . splash page with my RADIUS serverD . MAC-based access control with RADIUS serverView AnswerAnswer: B Explanation: This is because the...

February 5, 2024 No Comments READ MORE +

For which two reasons can an organization become “Out of License”? (Choose two.)

For which two reasons can an organization become “Out of License”? (Choose two.)A . licenses that are in the wrong networkB . more hardware devices than device licensesC . expired device licenseD . licenses that do not match the serial numbers in the organizationE . MR licenses that do not...

February 5, 2024 No Comments READ MORE +

Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager. Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?A . The “Meraki Management” profile cannot be removed.B . The “Meraki Management” profile is removed and then pushed...

February 4, 2024 No Comments READ MORE +

What occurs when a configuration change is made to an MX network that is bound to a configuration template?

What occurs when a configuration change is made to an MX network that is bound to a configuration template?A . The configuration change in the bound network is combined with the template configuration inside the template.B . The more restrictive configuration is preferred.C . The configuration change in the bound...

February 3, 2024 No Comments READ MORE +

Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links?

Refer to the exhibit. Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)A . Change the primary uplink to "none".B . Add an internet traffic preference that defines the load-balancing ratio as 4:1.C . Enable load balancing.D . Set the speed...

February 2, 2024 No Comments READ MORE +