Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?

A.

The Dashboard generates the SAML request.

B.

The Dashboard provides user access credentials.

C.

The Dashboard parses the SAML request and authenticates users.

D.

The Dashboard generates the SAML response.

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?

A.

Wireless > Configure > Access Control

B.

Wireless > Configure > Splash page

C.

Wireless > Configure > Firewall & Traffic Shaping

D.

Wireless > Configure > SSIDs

Refer to the exhibit.

Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?

A.

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the “Conf” performance class.

B.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

C.

WebEx traffic will prefer WAN 2 as long as it is up.

D.

WebEx traffic will be load-balanced between both active WAN links.

Which Cisco Meraki product must be deployed in addition to Systems Manager so that Systems Manager Sentry enrollment can be used?

A.

MS Switch

B.

Meraki Insight

C.

MR Access Point

D.

MV Smart Camera

Refer to the exhibit.

What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?

A.

The MX appliance performs IDS/IPS for inter-VLAN traffic.

B.

The MX appliance performs AMP for inter-VLAN traffic.

C.

The MX appliance performs data encryption for inter-VLAN traffic.

D.

The MX appliance performs content filtering for inter-VLAN traffic.

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

A.

intrusion prevention

B.

site-to-site VPN

C.

secondary uplinks

D.

DHCP

E.

high availability

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

B.

Peers contact the VPN registry at UDP port 9350.

C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

D.

Peers contact the VPN registry at TCP port 9350.

E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.

Drag and drop the descriptions from the left onto the permission types on the right.

Refer to the exhibit.

A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.

What is the next hop for the packet, based on this concentrator routing table?

A.

The concentrator gateway (10.128.124.62) is the next hop.

B.

Not enough detail is available to determine the next hop.

C.

The packet is stopped.

D.

The Auto VPN peer “Store 1532 – appliance” is the next hop.