ExamGecko
Home Home / Cisco / 500-220

Cisco 500-220 Practice Test - Questions Answers, Page 2

Question list
Search
Search

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

Answers
B.

Peers contact the VPN registry at UDP port 9350.

B.

Peers contact the VPN registry at UDP port 9350.

Answers
C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

Answers
D.

Peers contact the VPN registry at TCP port 9350.

D.

Peers contact the VPN registry at TCP port 9350.

Answers
E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Answers
Suggested answer: A, B

Explanation:

Ports used to contact the VPN registry:

- Source UDP port range 32768-61000

- Destination UDP port 9350 or UDP port 9351

Ports used for IPsec tunneling:

- Source UDP port range 32768-61000

- Destination UDP port range 32768-61000

https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN_-_Configuration_and_Troubleshooting_Configuration_and_Troubleshooting

What occurs when a configuration change is made to an MX network that is bound to a configuration template?

A.

The configuration change in the bound network is combined with the template configuration inside the template.

A.

The configuration change in the bound network is combined with the template configuration inside the template.

Answers
B.

The more restrictive configuration is preferred.

B.

The more restrictive configuration is preferred.

Answers
C.

The configuration change in the bound network overrides the template configuration.

C.

The configuration change in the bound network overrides the template configuration.

Answers
D.

The template configuration overrides the configuration change in the bound network.

D.

The template configuration overrides the configuration change in the bound network.

Answers
Suggested answer: C

Explanation:

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/MX_Templates_Best_Practices#:~:text=policy%2C%20choose%20Save-,Local%20Overrides,will%20override%20the%20template%20configuration.

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.

Based on client count, how many APs (rounded to the nearest whole number) are needed?

A.

26

A.

26

Answers
B.

28

B.

28

Answers
C.

30

C.

30

Answers
D.

32

D.

32

Answers
Suggested answer: B

Explanation:

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MR_Wireless/High_Density_Wi-Fi_Deployments

Refer to the exhibit.

For an AP that displays this alert, which network access control method must be in use?

A.

preshared key

A.

preshared key

Answers
B.

WPA2-enterprise with my RADIUS server

B.

WPA2-enterprise with my RADIUS server

Answers
C.

splash page with my RADIUS server

C.

splash page with my RADIUS server

Answers
D.

MAC-based access control with RADIUS server

D.

MAC-based access control with RADIUS server

Answers
Suggested answer: B

Explanation:

This is because the alert mentions 802.1X failure, which is a network access control method that is used with WPA2-enterprise and RADIUS servers1.

This question is related to the topic ofWireless Access Points Quick Startin the Cisco Meraki documentation. You can find more information about this topic in theWireless Access Points Quick Startarticle or theUsing the Cisco Meraki Device Local Status Pagepage.

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?

A.

Wireless > Configure > Access Control

A.

Wireless > Configure > Access Control

Answers
B.

Wireless > Configure > Splash page

B.

Wireless > Configure > Splash page

Answers
C.

Wireless > Configure > Firewall & Traffic Shaping

C.

Wireless > Configure > Firewall & Traffic Shaping

Answers
D.

Wireless > Configure > SSIDs

D.

Wireless > Configure > SSIDs

Answers
Suggested answer: A

Explanation:

SM Sentry enrollment can be enabled on any MR network via the Splash page section of the Wireless > Configure > Access control page. https://documentation.meraki.com/MR/MR_Splash_Page/Systems_Manager_Sentry_Enrollment

DRAG DROP

Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.


Question 16
Correct answer: Question 16

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

A.

Controller disconnection behavior

A.

Controller disconnection behavior

Answers
B.

Captive Portal strength

B.

Captive Portal strength

Answers
C.

Simultaneous logins

C.

Simultaneous logins

Answers
D.

Firewall & traffic shaping

D.

Firewall & traffic shaping

Answers
E.

RADIUS for splash page settings

E.

RADIUS for splash page settings

Answers
Suggested answer: A, B

Explanation:

To clarify, when an SSID is configured with Sign-On Splash page enabled, the two settings that must be configured for unauthenticated clients to have full network access and not be allow listed are:

Controller disconnection behavior: This setting determines how the clients are treated when the Meraki cloud controller is unreachable. The options areRestrictedorUnrestricted. The former option blocks all traffic from unauthenticated clients until the controller is reachable again.The latter option allows unauthenticated clients to access the network without signing on until the controller is reachable again1.

Captive Portal strength: This setting determines how often the clients are redirected to the splash page for authentication. The options areBlock all access until sign-on is completeorAllow non-HTTP traffic prior to sign-on. The latter option allows unauthenticated clients to access other protocols such as DNS, DHCP, ICMP, etc., but blocks HTTP and HTTPS traffic until they sign on.This option is recommended for compatibility with devices that do not support web-based authentication1.

Refer to the exhibit.

Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?

A.

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the ''Conf'' performance class.

A.

WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the ''Conf'' performance class.

Answers
B.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

B.

WebEx traffic will prefer WAN 1 as it is the primary uplink.

Answers
C.

WebEx traffic will prefer WAN 2 as long as it is up.

C.

WebEx traffic will prefer WAN 2 as long as it is up.

Answers
D.

WebEx traffic will be load-balanced between both active WAN links.

D.

WebEx traffic will be load-balanced between both active WAN links.

Answers
Suggested answer: A

Explanation:

Assuming this MX has established a full tunnel with its VPN peer, the MX will route the WebEx traffic based on the SD-WAN policy configured in the exhibit. The SD-WAN policy has two performance classes:ConfandDefault.TheConfperformance class matches the traffic with destination port 9000, which is used by WebEx for VoIP and video RTP3. TheConfperformance class has a preferred uplink of WAN 2 and a failover uplink of WAN 1. It also has thresholds for latency, jitter, and loss that determine when to switch from the preferred uplink to the failover uplink. Therefore, the WebEx traffic will prefer WAN 2 as long as it meets the thresholds in theConfperformance class. If WAN 2 exceeds the thresholds or goes down, the WebEx traffic will switch to WAN 1 as the failover uplink.

For which two reasons can an organization become ''Out of License''? (Choose two.)

A.

licenses that are in the wrong network

A.

licenses that are in the wrong network

Answers
B.

more hardware devices than device licenses

B.

more hardware devices than device licenses

Answers
C.

expired device license

C.

expired device license

Answers
D.

licenses that do not match the serial numbers in the organization

D.

licenses that do not match the serial numbers in the organization

Answers
E.

MR licenses that do not match the MR models in the organization

E.

MR licenses that do not match the MR models in the organization

Answers
Suggested answer: B, C

Explanation:

More hardware devices than device licenses: An organization needs to have enough device licenses to cover all the hardware devices in its network. A device license is consumed by each device that is added to the network.If the number of devices exceeds the number of licenses, the organization will be out of license and will lose access to some features and support until it purchases more licenses or removes some devices4.

Expired device license: A device license has an expiration date that depends on the license term purchased by the organization. If a device license expires, it will no longer be valid and will not count towards the license limit.The organization will need to renew the expired license or purchase a new one to avoid being out of license4.

Refer to the exhibit.

Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)

A.

Change the primary uplink to 'none'.

A.

Change the primary uplink to 'none'.

Answers
B.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

B.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

Answers
C.

Enable load balancing.

C.

Enable load balancing.

Answers
D.

Set the speed of the cellular uplink to zero.

D.

Set the speed of the cellular uplink to zero.

Answers
E.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

E.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Answers
Suggested answer: C, E

Explanation:

To clarify, to optimize load balancing asymmetrically with a 4:1 ratio between links, two actions that are required are:

Enable load balancing: This option allows the MX to use both of its uplinks for load balancing.When load balancing is enabled under Security & SD-WAN > Configure > SD-WAN & Traffic shaping, traffic flows will be distributed between the two uplinks proportional to the WAN 1 and WAN 2 bandwidths specified under Uplink configuration1.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1: The assigned speed of a WAN link is a value that indicates the bandwidth available on that link.By changing the assigned speeds of WAN 1 and WAN 2 so that they reflect the desired load-balancing ratio, the administrator can ensure that the MX uses both links efficiently and proportionally1. For example, if WAN 1 has a bandwidth of 100 Mbps and WAN 2 has a bandwidth of 25 Mbps, then setting their assigned speeds to 100 Mbps and 25 Mbps respectively will achieve a 4:1 load-balancing ratio.

Total 72 questions
Go to page: of 8