Cisco 500-220 Practice Test - Questions Answers, Page 2

List of questions
Question 11

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)
For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.
Peers contact the VPN registry at UDP port 9350.
For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.
Peers contact the VPN registry at TCP port 9350.
For IPsec tunneling, peers use UDP ports 500 and 4500.
Ports used to contact the VPN registry:
- Source UDP port range 32768-61000
- Destination UDP port 9350 or UDP port 9351
Ports used for IPsec tunneling:
- Source UDP port range 32768-61000
- Destination UDP port range 32768-61000
https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN_-_Configuration_and_Troubleshooting_Configuration_and_Troubleshooting
Question 12

What occurs when a configuration change is made to an MX network that is bound to a configuration template?
The configuration change in the bound network is combined with the template configuration inside the template.
The more restrictive configuration is preferred.
The configuration change in the bound network overrides the template configuration.
The template configuration overrides the configuration change in the bound network.
https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/MX_Templates_Best_Practices#:~:text=policy%2C%20choose%20Save-,Local%20Overrides,will%20override%20the%20template%20configuration.
Question 13

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.
Based on client count, how many APs (rounded to the nearest whole number) are needed?
26
28
30
32
https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MR_Wireless/High_Density_Wi-Fi_Deployments
Question 14

Refer to the exhibit.
For an AP that displays this alert, which network access control method must be in use?
Question 15

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
Question 16

DRAG DROP
Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.
Question 17

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)
Question 18

Refer to the exhibit.
Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?
Question 19

For which two reasons can an organization become ''Out of License''? (Choose two.)
Question 20

Refer to the exhibit.
Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)
Question