ExamGecko
Home / Cisco / 500-220 / List of questions
Ask Question

Cisco 500-220 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

Peers contact the VPN registry at UDP port 9350.

Peers contact the VPN registry at UDP port 9350.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

Peers contact the VPN registry at TCP port 9350.

Peers contact the VPN registry at TCP port 9350.

For IPsec tunneling, peers use UDP ports 500 and 4500.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Suggested answer: A, B
Explanation:

Ports used to contact the VPN registry:

- Source UDP port range 32768-61000

- Destination UDP port 9350 or UDP port 9351

Ports used for IPsec tunneling:

- Source UDP port range 32768-61000

- Destination UDP port range 32768-61000

https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN_-_Configuration_and_Troubleshooting_Configuration_and_Troubleshooting

asked 11/10/2024
Arun Samuel
50 questions

Question 12

Report Export Collapse

What occurs when a configuration change is made to an MX network that is bound to a configuration template?

The configuration change in the bound network is combined with the template configuration inside the template.

The configuration change in the bound network is combined with the template configuration inside the template.

The more restrictive configuration is preferred.

The more restrictive configuration is preferred.

The configuration change in the bound network overrides the template configuration.

The configuration change in the bound network overrides the template configuration.

The template configuration overrides the configuration change in the bound network.

The template configuration overrides the configuration change in the bound network.

Suggested answer: C
Explanation:

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/MX_Templates_Best_Practices#:~:text=policy%2C%20choose%20Save-,Local%20Overrides,will%20override%20the%20template%20configuration.

asked 11/10/2024
Alejandro Ramirez Cuesta
39 questions

Question 13

Report Export Collapse

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.

Based on client count, how many APs (rounded to the nearest whole number) are needed?

26

26

28

28

30

30

32

32

Suggested answer: B
Explanation:

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MR_Wireless/High_Density_Wi-Fi_Deployments

asked 11/10/2024
Ragul Ponniah
45 questions

Question 14

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 14 119020 10112024184716000000

For an AP that displays this alert, which network access control method must be in use?

preshared key

preshared key

WPA2-enterprise with my RADIUS server

WPA2-enterprise with my RADIUS server

splash page with my RADIUS server

splash page with my RADIUS server

MAC-based access control with RADIUS server

MAC-based access control with RADIUS server

Suggested answer: B
Explanation:

This is because the alert mentions 802.1X failure, which is a network access control method that is used with WPA2-enterprise and RADIUS servers1.

This question is related to the topic ofWireless Access Points Quick Startin the Cisco Meraki documentation. You can find more information about this topic in theWireless Access Points Quick Startarticle or theUsing the Cisco Meraki Device Local Status Pagepage.

asked 11/10/2024
Franko Salajcik
41 questions

Question 15

Report Export Collapse

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?

Wireless > Configure > Access Control

Wireless > Configure > Access Control

Wireless > Configure > Splash page

Wireless > Configure > Splash page

Wireless > Configure > Firewall & Traffic Shaping

Wireless > Configure > Firewall & Traffic Shaping

Wireless > Configure > SSIDs

Wireless > Configure > SSIDs

Suggested answer: A
Explanation:

SM Sentry enrollment can be enabled on any MR network via the Splash page section of the Wireless > Configure > Access control page. https://documentation.meraki.com/MR/MR_Splash_Page/Systems_Manager_Sentry_Enrollment

asked 11/10/2024
Rok Nemec
36 questions

Question 16

Report Export Collapse

DRAG DROP

Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.


Cisco 500-220 image Question 16 119022 10112024064716000
Correct answer: Cisco 500-220 image answer Question 16 119022 10112024064716000
asked 11/10/2024
Joseph Varghese
44 questions

Question 17

Report Export Collapse

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

Controller disconnection behavior

Controller disconnection behavior

Captive Portal strength

Captive Portal strength

Simultaneous logins

Simultaneous logins

Firewall & traffic shaping

Firewall & traffic shaping

RADIUS for splash page settings

RADIUS for splash page settings

Suggested answer: A, B
Explanation:

To clarify, when an SSID is configured with Sign-On Splash page enabled, the two settings that must be configured for unauthenticated clients to have full network access and not be allow listed are:

Controller disconnection behavior: This setting determines how the clients are treated when the Meraki cloud controller is unreachable. The options areRestrictedorUnrestricted. The former option blocks all traffic from unauthenticated clients until the controller is reachable again.The latter option allows unauthenticated clients to access the network without signing on until the controller is reachable again1.

Captive Portal strength: This setting determines how often the clients are redirected to the splash page for authentication. The options areBlock all access until sign-on is completeorAllow non-HTTP traffic prior to sign-on. The latter option allows unauthenticated clients to access other protocols such as DNS, DHCP, ICMP, etc., but blocks HTTP and HTTPS traffic until they sign on.This option is recommended for compatibility with devices that do not support web-based authentication1.

asked 11/10/2024
Sebasteen Lawrance
49 questions

Question 18

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 18 119024 10112024184716000000

Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the ''Conf'' performance class.

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the ''Conf'' performance class.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

WebEx traffic will prefer WAN 2 as long as it is up.

WebEx traffic will prefer WAN 2 as long as it is up.

WebEx traffic will be load-balanced between both active WAN links.

WebEx traffic will be load-balanced between both active WAN links.

Suggested answer: A
Explanation:

Assuming this MX has established a full tunnel with its VPN peer, the MX will route the WebEx traffic based on the SD-WAN policy configured in the exhibit. The SD-WAN policy has two performance classes:ConfandDefault.TheConfperformance class matches the traffic with destination port 9000, which is used by WebEx for VoIP and video RTP3. TheConfperformance class has a preferred uplink of WAN 2 and a failover uplink of WAN 1. It also has thresholds for latency, jitter, and loss that determine when to switch from the preferred uplink to the failover uplink. Therefore, the WebEx traffic will prefer WAN 2 as long as it meets the thresholds in theConfperformance class. If WAN 2 exceeds the thresholds or goes down, the WebEx traffic will switch to WAN 1 as the failover uplink.

asked 11/10/2024
Jose Leston
48 questions

Question 19

Report Export Collapse

For which two reasons can an organization become ''Out of License''? (Choose two.)

licenses that are in the wrong network

licenses that are in the wrong network

more hardware devices than device licenses

more hardware devices than device licenses

expired device license

expired device license

licenses that do not match the serial numbers in the organization

licenses that do not match the serial numbers in the organization

MR licenses that do not match the MR models in the organization

MR licenses that do not match the MR models in the organization

Suggested answer: B, C
Explanation:

More hardware devices than device licenses: An organization needs to have enough device licenses to cover all the hardware devices in its network. A device license is consumed by each device that is added to the network.If the number of devices exceeds the number of licenses, the organization will be out of license and will lose access to some features and support until it purchases more licenses or removes some devices4.

Expired device license: A device license has an expiration date that depends on the license term purchased by the organization. If a device license expires, it will no longer be valid and will not count towards the license limit.The organization will need to renew the expired license or purchase a new one to avoid being out of license4.

asked 11/10/2024
Shane Cook
41 questions

Question 20

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 20 119026 10112024184716000000

Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)

Change the primary uplink to 'none'.

Change the primary uplink to 'none'.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

Enable load balancing.

Enable load balancing.

Set the speed of the cellular uplink to zero.

Set the speed of the cellular uplink to zero.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Suggested answer: C, E
Explanation:

To clarify, to optimize load balancing asymmetrically with a 4:1 ratio between links, two actions that are required are:

Enable load balancing: This option allows the MX to use both of its uplinks for load balancing.When load balancing is enabled under Security & SD-WAN > Configure > SD-WAN & Traffic shaping, traffic flows will be distributed between the two uplinks proportional to the WAN 1 and WAN 2 bandwidths specified under Uplink configuration1.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1: The assigned speed of a WAN link is a value that indicates the bandwidth available on that link.By changing the assigned speeds of WAN 1 and WAN 2 so that they reflect the desired load-balancing ratio, the administrator can ensure that the MX uses both links efficiently and proportionally1. For example, if WAN 1 has a bandwidth of 100 Mbps and WAN 2 has a bandwidth of 25 Mbps, then setting their assigned speeds to 100 Mbps and 25 Mbps respectively will achieve a 4:1 load-balancing ratio.

asked 11/10/2024
Timothy Smith
42 questions
Total 72 questions
Go to page: of 8