Meraki SMB Solutions Training For Apple Consultants

30 Questions | Total Attempts: 156

SettingsSettingsSettings
Please wait...
Meraki SMB Solutions Training For Apple Consultants

Welcome to the assessment part of the Meraki SMB Solutions Training for Apple Consultants! The exam is designed to evaluate your understanding of the fundamental Meraki concepts, features, best practices, and solution selling taught during the course. Please Note: All 4 training videos are must be completed before taking this assessment. Results from the test will be matched with records of those who have completed the training videos in full before issuing training badges. Time Limit: No time limit Number of Questions: 30 Passing Score: 80% or above Exam results will be available as soon as you submit your answers. Please verify your result before continuing to take the survey.


Questions and Answers
  • 1. 
    What are TWO examples of Meraki's Systems Manager's Intelligent Policies, in which SMB customers can automate security?  (Choose TWO.)
    • A. 

      Security Policy

    • B. 

      Wi-Fi Usage Policy

    • C. 

      Geo-fencing Policy

    • D. 

      Battery Usage Policy

  • 2. 
    Which solution is NOT part of Cisco's Security Connector?  
    • A. 

      Cisco Umbrella

    • B. 

      Cisco AMP for Endpoint (Clarity)

    • C. 

      Cisco ISE

    • D. 

      Meraki Systems Manager

  • 3. 
    Which of the following is NOT true about Meraki Systems Manager's Self Service Portal?
    • A. 

      Grant end-user access to device information, tracking, and tools

    • B. 

      24/7 phone & e-mail support with lifetime warranty (for hardware that qualifies)

    • C. 

      Employees can bypass security policy

    • D. 

      View and install allowed apps

    • E. 

      Reduce number of tier zero support ticket requests

  • 4. 
    Which of the following is an INCORRECT statement about Meraki's Systems Manager?
    • A. 

      Systems Manager was selected Gartner's peer insight customer choice in 2018

    • B. 

      Systems Manager is the ONLY endpoint management solution with a native network integration

    • C. 

      Systems Manager includes 24/7 support, 365 day support.

    • D. 

      Systems Manager charges setup fees, and offers a tiered support model

  • 5. 
    The Meraki Enterprise MX line (Security Appliance) provides which two of the following functions: (Choose TWO)
    • A. 

      SD-WAN Solution

    • B. 

      Endpoint Management Solution

    • C. 

      Security Camera Solution

    • D. 

      Firewall Solution

  • 6. 
    Apple and Cisco started partnering together -- to facilitate the very best app experience for iPhone and iPad, allowing iOS apps connected to Cisco & Meraki WiFi access points to be prioritized. This technology is called..
    • A. 

      Priority

    • B. 

      Fast Lane

    • C. 

      Quick Pass

    • D. 

      App Performance

  • 7. 
    What is the key component of the Meraki Map & Floor Plan for SMB businesses?   
    • A. 

      Enabling desired features and modifying configurations

    • B. 

      Allocating PoE budget for individual switch ports

    • C. 

      Creating and defining a 'network'

    • D. 

      Allows for a more visual approach to managing large numbers of devices and for keeping track of their locations

    • E. 

      Adding devices and licenses

  • 8. 
    With the Meraki Enterprise Wireless, what function is performed by the dedicated third radio? 
    • A. 

      DHCP addressing

    • B. 

      WLAN controller

    • C. 

      Wireless IPS (Air Marshal)

    • D. 

      Site survey planning

  • 9. 
    Which Meraki Enterprise (MR) technology uses a cloud-brokered VPN registry to help orchestrate site-to-site VPN tunnels across MX security appliances?
    • A. 

      Dynamic Multipoint VPN (DMVPN)

    • B. 

      Generic Routing Encapsulation (GRE)

    • C. 

      Secure Shell tunneling (SSH)

    • D. 

      Auto VPN (auto-provisioning IPsec VPN)

    • E. 

      Software-defined WAN (SDWAN)

  • 10. 
    Which solution is responsible for intelligent network insight, giving Meraki SMB customers an easy way to monitor the performance of Web Applications on their networks and easily identify if any issues are likely being caused by the Network or the Application?
    • A. 

      (MI) - Meraki Insight

    • B. 

      (MX) - Meraki Security Appliance

    • C. 

      (MR) - Meraki Wireless

    • D. 

      (SM) - Meraki Systems Manager

    • E. 

      (MS) - Meraki Switching

  • 11. 
    What advantages does the Virtual Stacking feature (see diagram) on Meraki enterprise switches (MS) provide to IT administrators?
    • A. 

      Provides efficient and scalable management through bulk switchport configuration changes

    • B. 

      Allows for the aggregation of parallel connections to increase link throughput and provide redundancy

    • C. 

      Streamlines the rollout of a high volume of locations and synchronizes network configurations

    • D. 

      Provides admins with a logical network diagram as discovered through L2 packets (RSTP, STP, PoE, and Link status)

  • 12. 
    What are the primary functions of the Network Topology feature in the Meraki Enterprise Dashboard for SMB customers?
    • A. 

      It provides an intelligent mapping of physical links, dynamic device searching, and overall usage statistics alongside device health status

    • B. 

      It provides administrators optimization recommendations based on what has been detected in the existing topology

    • C. 

      It compiles a report presenting a variety of statistics broken out across product-specific sections based on the current network

    • D. 

      It is an add-on diagramming and vector graphics application that consolidates Cisco Meraki-only devices into a summary document

  • 13. 
    Meraki Enterprise Cameras (MV) retains all footage for the last 72 hours, ensuring complete coverage of recent critical incidents. For footage older than 72 hours, only motion events will be saved. This solution is called...  
    • A. 

      Motion Heat Maps

    • B. 

      Video Streaming

    • C. 

      Quality Recording

    • D. 

      Motion-based retention

  • 14. 
    How does The Meraki Enterprise Security Appliance (MX) detect malicious activity associated with ransomware threat?  
    • A. 

      Firewall

    • B. 

      Meraki AMP

    • C. 

      Meraki Intrusion Detection & Intrusion Prevention Solution

    • D. 

      Effective software updates & patching

    • E. 

      All of the Above

  • 15. 
    Advanced Malware Protection (AMP) is designed to keep the network safe from?
    • A. 

      Black Listed Apps

    • B. 

      Poor VPN Connection

    • C. 

      Malicious Files

    • D. 

      Web Searches

  • 16. 
    Which of the following acts as the cloud, network controller for the Meraki Enterprise line?
    • A. 

      MX-Security Appliance

    • B. 

      MS-Switching

    • C. 

      MR- Wireless Access Point

    • D. 

      MV- Physical Security

    • E. 

      MI- Meraki Insight

    • F. 

      Meraki Dashboard

  • 17. 
    The biggest benefit for SMB utilizing the Meraki Enterprise SD-WAN solution (Broadband-Broadband or Augmented MPLS) is...
    • A. 

      Supporting More Clients

    • B. 

      Saving Costs

    • C. 

      Adding Security

    • D. 

      Managing Apps

  • 18. 
    Which is NOT one of our Meraki Enterprise Security Appliance (MX)  capabilities?  
    • A. 

      Content Filtering

    • B. 

      Air Marshall

    • C. 

      Application aware firewall

    • D. 

      Geo-IP based firewall

  • 19. 
    Which figure in the following diagram is one of Dashboard's built-in tools that provides administrators to manage network clients?
    • A. 

      Figure 1: Tools Tab

    • B. 

      Figure 2: Packet Capture Tool

    • C. 

      Figure 3: Local Status Page

    • D. 

      Figure 4: Network Clients Table

  • 20. 
    Meraki's Systems Manager has a unique integration with the Meraki fullstack. Which feature is unlocked when you add Systems Manager to a Meraki fullstack (wireless, switching, & security)?  
    • A. 

      Sentry Enrollment-Integrated self service EMM on-boarding

    • B. 

      Sentry VPN Security-Auto provision mobile client VPN

    • C. 

      Sentry Wi-Fi Security- Certificate based authentication

    • D. 

      Sentry Policy-Network policy enforcement based on posture

    • E. 

      All of the Above

  • 21. 
    In Meraki's Systems Manager, Dynamic Tag changes based on the reported posture of the device. Which is NOT an example of Dynamic Tagging?  
    • A. 

      Dashboard Check-In

    • B. 

      Geo Location

    • C. 

      Device Type

    • D. 

      Security Posture

    • E. 

      Time of Day

  • 22. 
    What is the core principle of the Meraki Enterprise line for SMB?
    • A. 

      Controller based management

    • B. 

      On-prem management

    • C. 

      Data center management

    • D. 

      Managing the entire network from a single-pane-of-glass

  • 23. 
    Organizations can now leverage data to better understand foot traffic patterns and behavior in an SMB environment. This location information, based predominantly on 802.11 wireless and bluetooth standards, can be used to engage users and optimize marketing strategies and is available with the Meraki Wireless Enterprise line.  What is this solution called?
    • A. 

      Client Data

    • B. 

      Heat Mapping

    • C. 

      Site Survey

    • D. 

      Location Analytics

  • 24. 
    Meraki Go access points require a subscription and must be setup and cloud managed using the Meraki Go mobile app.
    • A. 

      True

    • B. 

      False

  • 25. 
    Which of the following are included with a Meraki Go subscription?
    • A. 

      Lifetime hardware warranty

    • B. 

      Software, feature, security, and firmware updates

    • C. 

      One year hardware warranty

    • D. 

      24/7 Meraki Technical Support

    • E. 

      The Meraki Go app for cloud management and remote troubleshooting capabilities

Back to Top Back to top