Cisco Meraki Solutions Specialist v1.0

Page:    1 / 6   
Exam contains 85 questions

Which two actions can extend the video retention of a Cisco Meraki MV Smart Camera? (Choose two.)

  • A. enabling audio compression
  • B. installing an SSD memory extension
  • C. enabling motion-based retention
  • D. enabling maximum retention limit
  • E. configuring a recording schedule


Answer : CE

What occurs when a configuration change is made to an MX network that is bound to a configuration template?

  • A. The configuration change in the bound network is combined with the template configuration inside the template.
  • B. The more restrictive configuration is preferred.
  • C. The configuration change in the bound network overrides the template configuration.
  • D. The template configuration overrides the configuration change in the bound network.


Answer : C

DRAG DROP -
Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.



Answer :


Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?

  • A. quarantine
  • B. prevention
  • C. detection
  • D. blocking


Answer : B

DRAG DROP -
Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.



Answer :

Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?

  • A. No configuration step is necessary; automatic updating is the default behavior.
  • B. Configure automatic updating of iOS devices in the Meraki installed profile.
  • C. Create a security policy that enables automatic updates.
  • D. Create a profile with automatic update enabled and apply it to iOS devices.


Answer : A

Which two features can be configured on a Cisco Meraki MX security appliance and on a vMX virtual instance? (Choose two.)

  • A. SD-WAN policies
  • B. client VPN
  • C. Active Directory
  • D. Layer 3 and Layer 7 firewall rules
  • E. threat protection


Answer : AD



Refer to the exhibit. After associating with the Officers SSID and receiving an IP address on the 10.0.0/8 subnet, a wireless user submitted a support ticket that they cannot access wired network resources. Which configuration will provide successful network communication?

  • A. The ‘DHCP guard’ setting should be adjusted from ‘Disabled’ to ‘Enabled.’
  • B. The Layer 7 firewall rules prevent wired IP traffic from being forwarded and should be disabled.
  • C. An ‘Allow’ rule must be added to the Outbound rules list to connect to the necessary resources.
  • D. The Layer 2 LAN isolation setting should be adjusted from ‘Disabled’ to ‘Enabled.’


Answer : C

Which Radio Frequency (RF) Profile setting is typically used to decrease the Service Set Identifier (SSID) overhead, exclude legacy clients, and promote more efficient client roaming?

  • A. Minimum bitrate
  • B. Channel width
  • C. Band selection
  • D. Transmit power range


Answer : A



Refer to the exhibit. 172.16.0.0/24 is a configured local VLAN on the Cisco Meraki MX security appliance. What happens to inbound traffic flow to the MX WAN with a destination of TCP port 1813?

  • A. The traffic is forwarded to 172.16.0.30 on the WAN.
  • B. The traffic is dropped on the WAN of the MX security appliance.
  • C. The traffic is forwarded to 172.16.0.30 on the LAN.
  • D. The traffic is dropped on the WAN of the MX security appliance due to the “any” allow remote IP rule.


Answer : B

Which two limitations are addressed by the implementation of Adaptive Policy? (Choose two.)

  • A. managing network policies when IP addresses are prone to changes over time
  • B. applying segmentation inside a VLAN
  • C. preventing the micro-segmentation of clients within the network
  • D. ensuring dedicated bandwidth for specific applications
  • E. implementing Quality of Service (QoS) policies within a flat Layer 2 network


Answer : AB

A legacy wireless client, supporting WPA2 security, cannot associate to a guest wireless network. What is the cause?

  • A. The guest wireless network is configured with layer 2 LAN isolation.
  • B. The guest wireless network is configured with Open (no encryption).
  • C. The guest wireless network is configured with WPA3 transition mode with 802.1w set to “Enabled.”
  • D. The guest wireless network is configured with Opportunistic Wireless Encryption (OWE) with 802.1w set to “Required.”


Answer : D

A Cisco Meraki MV camera monitors an office, and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation. Which feature in Dashboard should be used to preserve the current position of the camera while also meeting regulation requirements?

  • A. area or interest
  • B. zone exclusion
  • C. privacy window
  • D. sensor crop


Answer : C

A customer needs inline traffic tagging to assign a Security Group Tag (SGT) that identifies the group from which the source traffic originates. Which feature provides this capability?

  • A. Software Defined Access
  • B. Rapid Threat Containment
  • C. Secure Connect
  • D. Adaptive Policy


Answer : D

Which Cisco Meraki best practice method preserves complete historical network event logs?

  • A. Configuring the preserved event number to maximize logging.
  • B. Configuring the preserved event period to unlimited.
  • C. Configuring a syslog server for the network.
  • D. Configuring Dashboard logging to preserve only certain event types.


Answer : C

Page:    1 / 6   
Exam contains 85 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy