01. What is the primary objective of configuring QoS on MS switches in an enterprise deployment?
a) Increase SSID broadcast rate
b) Prioritize latency-sensitive traffic on the wired campus
c) Disable firmware upgrades during business hours
d) Replace the need for Layer 3 routing
02. You are rolling out 40 access switches with nearly identical port roles. Which method best supports replicating a switch configuration at scale?
a) Configure each port manually per switch without templates
b) Replace MS switches with MR access points
c) Disable VLANs and use a flat network
d) Use a standardized baseline and clone/replicate switch settings where supported
03. In a high-density wireless design, what is the most common risk of setting minimum bitrate too low?
a) Clients cannot connect to any SSID
b) Automatic firmware rollback
c) Increased airtime utilization by low-rate clients, reducing overall capacity
d) Duplicate DHCP scopes on the MX
04. Where in Dashboard would you most likely investigate suspected malware beaconing seen from multiple clients?
a) Security Center
b) RF Profiles
c) Camera Quality & Retention
d) Organization License Info
05. Users complain a SaaS app is “slow,” but only during afternoon peaks. Which two data sources are most relevant?
Choose two.
a) Meraki Insight application performance indicators
b) Camera retention utilization graphs
c) WAN uplink performance (loss/latency) and SD-WAN path metrics
d) License co-termination timeline
06. A financial firm needs 120 branches to reach two regional data centers with minimal manual tunnel configuration. Which design approach best aligns with scalable Meraki Auto VPN?
a) Use Meraki Auto VPN hub-and-spoke with standardized templates
b) Manually configure IPSec tunnels on each branch to each peer
c) Use only L2 extensions between every branch and data center
d) Disable VPN and rely on public internet ACLs for security
07. What is a common reason to deploy a vMX in a public cloud?
a) To replace MR APs with a virtual controller
b) To act as an Auto VPN termination point for cloud workloads
c) To provide PoE power for cloud-hosted endpoints
d) To perform Layer 1 cable diagnostics remotely
08. When using the Meraki Event Log to triage an incident, which two actions most directly improve signal-to-noise?
Choose two.
a) Filter by device/client and relevant event types
b) Export every event without filtering for manual review
c) Disable logging to reduce dashboard load
d) Narrow the time window to the incident timeframe
09. Mini-Sim: Your script queries Dashboard and receives:
{"serial":"Q2XX-ABCD-1234","status":"offline","lastReportedAt":"2026-02-04T02:14:00Z"}
What is the best next operational action before dispatching onsite support?
a) Immediately factory reset the device from Dashboard
b) Validate WAN uplink status history and recent connectivity events for that site
c) Change all SSIDs to WPA3-only
d) Disable Auto VPN for the organization
10. Which sequence best aligns with designing enterprise services end-to-end (wired + wireless)?
a) Define segmentation/security → Define QoS intent → Validate redundancy/HA → Finalize wireless capacity plan
b) Finalize wireless capacity plan → Define segmentation/security → Validate redundancy/HA → Define QoS intent
c) Define QoS intent → Finalize wireless capacity plan → Define segmentation/security → Validate redundancy/HA
d) Validate redundancy/HA → Define QoS intent → Finalize wireless capacity plan → Define segmentation/security