Travis Flashcards
Your company wants to implement a custom Splash page for the ‘Guest’ SSID. The redirect URL is already configured in the dashboard but needs to be added to the walled garden list.
Where in the dashboard would you go to add the Splash page URL to the walled garden list for the ‘Guest’ SSID?
A. Wireless > Configure > Walled garden
B. Wireless > Configure > Splash page
C. Wireless > Configure > Firewall & traffic shaping
D. Wireless > Configure > Access control
D
Refer to the exhibit. A dashboard administrator shared this screenshot reporting a missing access to the Monitor column for this specific network.
Why is the Monitor column not present?
A. Organization administrative privilege for this user are set to ‘Configure-only’
B. The monitor column will appear after the first MS Switch is added to this network
C. The monitor column is not available for template networks
D. MS in this network are currently performing an upgrade, the monitor column will appear when the upgrade is completed
C
Refer to the exhibit. You are currently managing an organization that is using the OSPF capabilities of the MX security appliances to redistribute auto VPN routes to neighboring L3 switches.
Due to a new security policy the MD5 Authentication key for OSPF messages needs to be updated.
Where in Dashboard would you go to update the MD5 Authentication key for the ‘Site A’ MX?
A. Network (Site A) > Security & SD-WAN > Configure > Site¬-to-¬site VPN > OSPF settings
B. Organization > Configure > Settings > (Site A) OSPF Settings
C. Network (Site A) > Security & SD-WAN > Configure > Addressing & VLANs > OSPF settings
D. Network (Site A) > Security & SD-WAN > Configure > Security Center > OSPF security settings
A
On Security & SD-WAN -> Monitor -> Appliance Status -> Uplink you see the following output:
Where can you configure the Connectivity-Destinations (like 103.112.104.41)?
(Select all that apply)
a) Security & SD-WAN -> Configure -> Addressing & VLANs -> Connectivity
b) Security & SD-WAN -> Configure -> SD-WAN & traffic shaping -> Uplink configuration
c) Network-wide -> Configure -> Alerts -> Uplink configuration
d) Organisation -> Configure -> Alerts -> Global Uplink configuration
e) none of the above
B
Which of the following families of products can leverage the local override functionality when included in a network bound to a template? (Choose 2)
a. MX Security appliance
b. MV Cameras
c. MT Sensors
d. MG Gateway
e. MR Access point
f. MI Meraki Insight
A, E
A customer has 3 MX security appliances deployed in 3 different locations, All the MX’s are in Routed mode and participate in the VPN topology as hubs. MX 1 and MX 2 report no issue in the dashboard, while MX 3 reports a “NAT unfriendly” warning message in the VPN status page.
Which of the following might be causing the issue?
a. MX 1 is behind an upstream device that is rewriting the source port when trying to establishing the VPN tunnel with MX 3
b. MX 3 is behind an upstream device that is rewriting the destination port when communicating with the two VPN cloud registry
c. MX 3 NAT functionality for the LAN to WAN traffic is not configured properly
d. MX 3 is behind an upstream device the is rewriting different source port when communicating with the two VPN cloud registry
d
Refer to the exhibit. This is the configuration for an SSID to be used as MR Teleworker VPN.
Which of the following statements is true regarding clients connecting to an SSID with no firewall & traffic shaping rules and this configuration applied?
a. Clients connected will be able to communicate with each other
b. Clients with a static IP address will not be able to associate with this SSID
c. Clients connecting to this SSID will receive IP addresses in an isolated 10.0.0.0/8 network
d. Clients traffic with destination IP address 8.8.8.8 will always be sent over the VPN tunnel
a
Look at the image below. It contains information about a device managed via Systems Manager. Which sentence is true about that device?
a. Between 9am and 5pm on weekdays and all day on weekends, some apps will be uninstalled from the device.
b. Between 6am and 6pm on weekdays and all day weekends, some apps will be uninstalled from the device.
c. The Corp security policy has been violated because a disk storage threshold was broken
d. The device has been rebooted within the past couple of days.
d
Fill in the blanks: When enabling IDS/IPS on the Meraki Dashboard, there are 3 different rulesets you can choose: You can leave it as ________ (default, matching CVSS 9 and 10), or you can change it to ________ (matching CVSS 10 only) or ________ (matching CVSS 8, 9 or 10).
a. Balanced - Connectivity - Security
b. Security - Balanced - Connectivity
c. Connectivity - Balanced - Security
d. Connectivity - Security - Balanced
a
Refer to the exhibit. Exhibit A is the current saved configuration on the MX. A network administrator wants to update the IP address configuration for VLAN ID 128 as shown in exhibit B but while saving the new configuration dashboard returns the error shown in exhibit C. What is the root cause of the error?
a. The MX IP address must be the first IP available in the network
b. There is 1 range of reserved IP addresses in the DHCP server configuration for VLAN ID 128 with the previous addressing scheme
c. There is 1 range of reserved IP addresses and 1 fixed IP address in the DHCP server configuration for VLAN ID 128 with the previous addressing scheme
d. There are 2 ranges of reserved IP addresses and 1 fixed IP address in the DHCP server configuration for VLAN ID 128 with the previous addressing scheme
C
On the Meraki Dashboard, where should you navigate to make sure your MV cameras are in the correct time zone, and change it if you need to?
- Cameras > Monitor > General
- Cameras > Configure > General
- Network-wide > Monitor > General
- Network-wide > Configure > General
4
How many class of service (CoS) queues are supported on MS switches?
a. 4
b. 6
c. 8
d. 10
b
Look at the image below. It shows a layer 2 network topology diagram inside the Meraki Dashboard. Which sentence is true regarding the topology?
a. It can be downloaded in JPEG format.
b. It shows two devices that are offline.
c. It supports both Meraki and non-Meraki devices.
d. It is built based on the default routes (0.0.0.0/0) in the switches.
e. It allows administrators to see static routes for particular nodes by hovering over them.
c
When cloning a Meraki Switch, what does not get copied across?
A.) Local Settings
B.) STP Bridge priority
C.) Port Tag
D.) Interface state
A
Which section of the Meraki Dashboard allows the configuration of System Manager Sentry policies?
a. Systems Manager > Manage > Sentry policies
b. Security & SD-WAN > Configure > Sentry policies
c. Network-wide > Configure > Sentry policies
d. Systems Manager > Configure > Sentry policies
C