لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which API endpoint clones a new Organization?
A. POST /organizations/clone/{organizationId}
B. PUT /organizations/{organizationId}/clone
C. POST /organizations/{organizationId}/new
D. POST /organizations/{organizationId}/clone
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which design requirement is met by implementing syslog versus SNMP?
A. dd a deny any/any firewall rule to the end of the firewall rules
B. emove the connection from Internet 1
C. hysically disconnect all LAN ports
D. onfigure the MX appliance to Routed mode on the Addressing & VLANS page
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
A. Wireless > Configure > Access Control
B. Wireless > Configure > Splash page
C. Wireless > Configure > Firewall & Traffic Shaping
D. Wireless > Configure > SSIDs
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which enrollment method must be used when containerization is required on BYOD Android devices managed by Systems Manager?
A. Systems Manager network ID
B. Android Enterprise utilizing a Work Profile
C. Android Business utilizing a BYOD Profile
D. Systems Manager container ID
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Refer to the exhibit. Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)
A. onfiguring the preserved event number to maximize logging
B. onfiguring the preserved event period to unlimited
C. onfiguring a syslog server for the network
D. onfiguring Dashboard logging to preserve only certain event types
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
Which two Systems Manager Live tools are available only for Apple Macs and Windows PCs and cannot be used on iOS or Android mobile devices? (Choose two.)
A. OS updates
B. Send notification
C. Selective wipe
D. Screenshot
E. Remote Desktop
عرض الإجابة
اجابة صحيحة: CE
السؤال #7
Which two primary metrics does Meraki Insight use to calculate the Application Performance Score? (Choose two.)
A. lease refer to Exhibit B for answer
عرض الإجابة
اجابة صحيحة: DE
السؤال #8
A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?
A. Auto VPN route 172
B. non-Meraki VPN route 172
C. directly connected 172
D. static route 172
عرض الإجابة
اجابة صحيحة: B
السؤال #9
When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)
A. ebEx traffic will prefer WAN 2 as long as it meets the thresholds in the “Conf” performance class
B. ebEx traffic will prefer WAN 1 as it is the primary uplink
C. ebEx traffic will prefer WAN 2 as long as it is up
D. ebEx traffic will be load-balanced between both active WAN links
عرض الإجابة
اجابة صحيحة: AB
السؤال #10
One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.Based on client count, how many APs (rounded to the nearest whole number) are needed?
A. 6
B. 8
C. 0
D. 2
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Refer to the exhibit. This Dashboard organization uses Co-Termination licensing model.What happens when an additional seven APs are claimed on this network without adding licenses?
A. ll APs immediately stop functioning
B. ll network devices stop functioning in 30 days
C. ne AP Immediately stops functioning
D. ll APs stop functioning in 30 days
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Refer to the exhibit. This Dashboard organization uses Co-Termination licensing model.What happens when an additional seven APs are claimed on this network without adding licenses?
A. ll APs immediately stop functioning
B. ll network devices stop functioning in 30 days
C. ne AP Immediately stops functioning
D. ll APs stop functioning in 30 days
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which three verbs of request are available in the Cisco Meraki API? (Choose three.)
A. SET
B. PUT
C. PATCH
D. ADD
E. POST
F. GET
عرض الإجابة
اجابة صحيحة: BEF
السؤال #14
Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?
A. he “Meraki Management” profile cannot be removed
B. he “Meraki Management” profile is removed and then pushed automatically by Systems Manager
C. he “Meraki Management” profile is removed
D. he “Meraki Management” profile is removed
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
A. esponses that the MX appliance receives on the connectivity-testing hostnames on the Insight > Web App Health page
B. esponses that the MX appliance receives on the connectivity-testing IP addresses on the Security & SD-WAN > Firewall page
C. esponses that the MX appliance receives on the connectivity-testing IP address that is configured on the Security & SD-WAN > SD-WAN & Traffic Shaping page
D. esponses that the MX appliance receives on the connectivity-testing IP addresses on the Help > Firewall info page
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
Which order is accurate for a firmware upgrade on MX appliances in a high-availability configuration?
A. starts on the secondary MX appliance and then occurs on the primary MX appliance
B. starts on both MX appliances at the same time and then reboots both appliances after traffic on the primary MX appliance ceases
C. starts on both MX appliances at the same time and then immediately reboots both appliances
D. starts on the primary MX appliance and then occurs on the secondary MX appliance
عرض الإجابة
اجابة صحيحة: D
السؤال #17
What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?
A. he Dashboard generates the SAML request
B. he Dashboard provides user access credentials
C. he Dashboard parses the SAML request and authenticates users
D. he Dashboard generates the SAML response
عرض الإجابة
اجابة صحيحة: A
السؤال #18
DRAG DROPDrag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.Select and Place:Exhibit A:Exhibit B:
A. lease refer to Exhibit B for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Refer to the exhibit. During a Meraki AP deployment, the default SSID that the exhibit shows is broadcast.What causes this behavior?
A. An AP does not have a wired connection to the network
B. An AP cannot connect to the default gateway
C. An AP has never connected to the Meraki Cloud Controller
D. An AP has Site Survey mode enabled
عرض الإجابة
اجابة صحيحة: C
السؤال #20
In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)
A. enew the Dashboard license
B. icense a network
C. icense more devices
D. all Meraki support
E. ait for the devices to auto-renew
عرض الإجابة
اجابة صحيحة: AC
السؤال #21
02. A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and 50 remote sites with a single uplink connection. How many tunnels does each hub need to support?
A. ireless>Monitor>RFSpectrum
B. ireless>Configure>RadioSetti
C. ireless>Monitor>WirelessHealth
D. ireless>Monitor>AccessPoints>AP>RF
عرض الإجابة
اجابة صحيحة: D
السؤال #22
A new application needs to be pushed to all iOS devices. Some devices report “NotNow” in the event log and do not install the application.What does the “NotNow” event indicate?
A. The application requires the most recent iOS version
B. The device is locked with a passcode
C. The device cannot connect to Apple servers
D. The device cannot connect to Cisco Meraki servers
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4. What is the next hop for the packet, based on this concentrator routing table?
A. he concentrator gateway (10
B. ot enough detail is available to determine the next hop
C. he packet is stopped
D. he Auto VPN peer “Store 1532 – appliance” is the next hop
عرض الإجابة
اجابة صحيحة: B
السؤال #24
Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
A. 000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link
B. 00-byte UDP probes every second, through VPN tunnels that are established over every WAN link
C. 00-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link
D. 000-byte TCP probes every second, through VPN tunnels that are established over every WAN link
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which information is used to calculate whether a WAN link has high usage?
A. ata under Security & SD WAN > Appliance Status > Uplink > Live Data
B. otal historical throughput of an uplink
C. otal number of devices that are actively passing traffic
D. alue under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration
عرض الإجابة
اجابة صحيحة: D
السؤال #26
What are two roles of the network and device tags in a Dashboard? (Choose two.)
A. Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks
B. Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks
C. Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks
D. Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators
E. Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network
عرض الإجابة
اجابة صحيحة: AE
السؤال #27
What happens to an unsupervised iOS device when the “Meraki management” profile is removed?
A. The “Meraki management” profile is removed
B. The “Meraki management” profile is removed
C. The “Meraki management” profile is removed and then pushed automatically by Systems Manager
D. The “Meraki management” profile cannot be removed
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?
A. The “Meraki Management” profile cannot be removed
B. The “Meraki Management” profile is removed and then pushed automatically by Systems Manager
C. The “Meraki Management” profile is removed
D. The “Meraki Management” profile is removed
عرض الإجابة
اجابة صحيحة: C
السؤال #29
A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?
A. uto VPN route 172
B. tatic route 172
C. on-Meraki VPN route 172
D. irectly connected 172
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which information do the MXs in a High Availability pair share?
A. panning-tree state
B. ime synchronization state
C. HCP association database
D. tateful firewall database
عرض الإجابة
اجابة صحيحة: C
السؤال #31
In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)
A. he configuration change in the bound network is combined with the template configuration inside the template
B. he more restrictive configuration is preferred
C. he configuration change in the bound network overrides the template configuration
D. he template configuration overrides the configuration change in the bound network
عرض الإجابة
اجابة صحيحة: AC
السؤال #32
Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
A. highest VLAN ID that is configured and set to NO to use VPN
B. lowest VLAN ID that is configured and set to YES to use VPN
C. highest VLAN ID that is configured and set to YES to use VPN
D. lowest VLAN ID configured and set to NO to use VPN
عرض الإجابة
اجابة صحيحة: C
السؤال #33
DRAG DROPDrag and drop the descriptions from the left onto the corresponding MX operation mode on the right.Select and Place:Exhibit A:Exhibit B:
A. lease refer to Exhibit B for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #34
Refer to the exhibit. What is the minimal Cisco Meraki Insight licensing requirement?
A. single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B
B. single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B
C. single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B
D. wo Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B
E. wo Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B
عرض الإجابة
اجابة صحيحة: E
السؤال #35
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
A. ireless > Configure > Access Control
B. ireless > Configure > Splash page
C. ireless > Configure > Firewall & Traffic Shaping
D. ireless > Configure > SSIDs
عرض الإجابة
اجابة صحيحة: A
السؤال #36
DRAG DROPDrag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.Select and Place:Exhibit A: Exhibit B:
A. n MX Security Appliance is not required as a concentrator
B. n MX Security Appliance is required as a concentrator
C. ll wireless client traffic can be split-tunneled
D. ll wireless client traffic is tunneled
عرض الإجابة
اجابة صحيحة: A
السؤال #37
Which Cisco Meraki best practice method preserves complete historical network event logs?
A. hen automation capabilities are needed
B. hen proactive alerts for critical events must be generated
C. hen organization-wide information must be collected
D. hen information such as flows and client connectivity must be gathered
عرض الإجابة
اجابة صحيحة: A
السؤال #38
Refer to the exhibit. For an AP that displays this alert, which network access control method must be in use?
A. reshared key
B. PA2-enterprise with my RADIUS server
C. plash page with my RADIUS server
D. AC-based access control with RADIUS server
عرض الإجابة
اجابة صحيحة: A
السؤال #39
Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?
A. uarantine
B. revention
C. etection
D. locking
عرض الإجابة
اجابة صحيحة: B
السؤال #40
A new application needs to be pushed to all iOS devices. Some devices report ''NotNow'' in the event log and do not install the application.What does the ''NotNow'' event indicate?
A. he application requires the most recent iOS version
B. he device is locked with a passcode
C. he device cannot connect to Apple servers
D. he device cannot connect to Cisco Meraki servers
عرض الإجابة
اجابة صحيحة: B
السؤال #41
For which two reasons can an organization become “Out of License”? (Choose two.)
A. icenses that are in the wrong network
B. ore hardware devices than device licenses
C. xpired device license
D. icenses that do not match the serial numbers in the organization
E. R licenses that do not match the MR models in the organization
عرض الإجابة
اجابة صحيحة: BC
السؤال #42
Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
A. ighest VLAN ID that is configured and set to NO to use VPN
B. owest VLAN ID that is configured and set to YES to use VPN
C. ighest VLAN ID that is configured and set to YES to use VPN
D. owest VLAN ID configured and set to NO to use VPN
عرض الإجابة
اجابة صحيحة: C
السؤال #43
01. Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
A. orIPsectunneling,peersusehighUDPportswithinthe32768to61000range
B. eerscontacttheVPNregistryatUDPport9350
C. orIPsectunneling,peersusehighTCPportswithinthe32768to61000range
D. eerscontacttheVPNregistryatTCPport9350
EForIPsectunneling,peersuseUDPports500and4500.
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: