Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
d
DRAG DROP
Drag and drop the descriptions from the left onto the permission types on the right.
What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)
bc
Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
c
The WAN connection of a Cisco Meraki MX security appliance is congested, and the MX appliance is buffering the traffic from LAN ports going to the WAN ports. High, normal, and low priority queue buffers are all full. Which proportion of the normal traffic is forwarded compared to the other queues?
c
What happens to an unsupervised iOS device when the Meraki management profile is removed?
b
A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?
b
Refer to the exhibit. Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)
bc
What occurs when a configuration change is made to an MX network that is bound to a configuration template?
a
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
a