500-220 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest 500-220 Exam Questions and Practice Tests 2024 - Killexams.com
500-220 Dumps
500-220 Braindumps
500-220 Real Questions
500-220 Practice Test
500-220 Actual Questions
Cisco
500-220
Cisco Meraki Solutions Specialist (ECMS)
https://killexams.com/pass4sure/exam-detail/500-220
Question: 140
Which design requirement is met by implementing syslog versus SNMP?
when automation capabilities are needed
when proactive alerts for critical events must be generated
when organization-wide information must be collected
when information such as flows and client connectivity must be gathered
Answer: A,C,D
Explanation: Reference:
https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Meraki_Device_Reporting_-
_Syslog%2C_SNMP%2C_and_API
Question: 141
When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)
Controller disconnection behavior
Captive Portal strength
Simultaneous logins
Firewall & traffic shaping
RADIUS for splash page settings
Answer: A
Explanation:
Reference: https://documentation.meraki.com/MR/Access_Control
Question: 142
For which two reasons can an organization become âOut of Licenseâ? (Choose two.)
licenses that are in the wrong network
more hardware devices than device licenses
expired device license
licenses that do not match the serial numbers in the organization
MR licenses that do not match the MR models in the organization
Answer: A,B
Explanation:
Reference: https://documentation.meraki.com/General_Administration/Licensing/Meraki_Licensing_FA Qs
Refer to the exhibit.
For an AP that displays this alert, which network access control method must be in use?
preshared key
WPA2-enterprise with my RADIUS server
splash page with my RADIUS server
MAC-based access control with RADIUS server
Answer: A Question: 144
Which type of authentication protocol is used when using OSPF on an MX appliance?
MD5
certificate
plaintext
SHA-1
Answer: A
Explanation:
Reference: https://documentation.meraki.com/MX/Site-to- site_VPN/Using_OSPF_to_Advertise_Remote_VPN_Subnets
Question: 145
Which information is used to calculate whether a WAN link has high usage?
data under Security & SD WAN > Appliance Status > Uplink > Live Data
total historical throughput of an uplink
total number of devices that are actively passing traffic
value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration
Answer: D Question: 146
A new application needs to be pushed to all iOS devices. Some devices report âNotNowâ in the event log and do not install the application.
What does the âNotNowâ event indicate?
The application requires the most recent iOS version.
The device is locked with a passcode.
The device cannot connect to Apple servers.
The device cannot connect to Cisco Meraki servers.
Answer: A,B,C,D
Explanation:
Reference: https://community.meraki.com/t5/Mobile-Device-Management/Check-NotNow-Status/td-p/3887
Question: 147
In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)
Renew the Dashboard license.
License a network.
License more devices.
Call Meraki support.
Wait for the devices to auto-renew.
Answer: A
Explanation:
Reference: https://documentation.meraki.com/General_Administration/Licensing/Meraki_Co- Termination_Licensing_Overview
Question: 148
Which requirement is needed to implement Fast Lane on Cisco Meraki APs?
wireless profile installed on an Apple iOS device
wireless profile installed on a Cisco iOS access point
adaptive 802.11r disabled
traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com
Answer: A,B
Explanation:
Reference: https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Wireless_QoS_and_Fast_Lane
What are two ways peers interact with ports that Auto VPN uses? (Choose two.)
For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.
Peers contact the VPN registry at UDP port 9350.
For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.
Peers contact the VPN registry at TCP port 9350.
For IPsec tunneling, peers use UDP ports 500 and 4500.
Answer: A,B
Explanation:
Reference: https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN_-
_Configuration_and_Troubleshooting
Question: 150
Air Marshal has contained a malicious SSID.
What are two effects on connectivity? (Choose two.)
Currently associated clients stay connected.
New clients can connect.
Currently associated clients are affected by restrictive traffic shaping rules.
New clients cannot connect.
Currently associated clients are disconnected.
Answer: D,E Question: 151 Refer to the exhibit.
What is the minimal Cisco Meraki Insight licensing requirement?
A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network
A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network
A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network
Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network
Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network
Answer: C Question: 152
A customer wants to use Microsoft Azure to host corporate application servers.
Which feature does the customer get by using a vMX appliance rather than connecting directly to Azure by VPN?
malware protection
SD-WAN
next-generation firewall
intrusion prevention
Answer: C Question: 153
DRAG DROP
Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.
wrong Answer: C Explanation: Table
Description automatically generated with medium confidence
Question: 154
Refer to the exhibit.
Which IDS/IPS mode is the MX Security Appliance configured for?
quarantine
prevention
detection
blocking
Answer: B
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »