ExamGecko
Home / Cisco / 500-220 / List of questions
Ask Question

Cisco 500-220 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which Cisco Meraki best practice method preserves complete historical network event logs?

Configuring the preserved event number to maximize logging.

Configuring the preserved event number to maximize logging.

Configuring the preserved event period to unlimited.

Configuring the preserved event period to unlimited.

Configuring a syslog server for the network.

Configuring a syslog server for the network.

Configuring Dashboard logging to preserve only certain event types.

Configuring Dashboard logging to preserve only certain event types.

Suggested answer: C
Explanation:

Configuring a syslog server for the network is the Cisco Meraki best practice method to preserve complete historical network event logs.A syslog server can be configured to store messages for reporting purposes from MX Security Appliances, MR Access Points, and MS switches1.The syslog server can collect various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events2. The syslog server can also help with troubleshooting and monitoring the network performance and security.

asked 11/10/2024
Linda Jannina Sourander
43 questions

Question 22

Report Export Collapse

Which design requirement is met by implementing syslog versus SNMP?

when automation capabilities are needed

when automation capabilities are needed

when proactive alerts for critical events must be generated

when proactive alerts for critical events must be generated

when organization-wide information must be collected

when organization-wide information must be collected

when information such as flows and client connectivity must be gathered

when information such as flows and client connectivity must be gathered

Suggested answer: D
Explanation:

Implementing syslog versus SNMP can meet the design requirement of gathering information such as flows and client connectivity. Syslog can collect and report various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events. Syslog can also provide detailed information about the flows and client connectivity on the network devices, such as source and destination IP addresses, ports, protocols, bytes transferred, etc. SNMP, on the other hand, can collect and report various statistics and information about the network devices, such as CPU utilization, interface status, memory usage, etc. However, SNMP does not provide as much information about the flows and client connectivity as syslog does.

Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API

asked 11/10/2024
Sharankumar Nadarajah
42 questions

Question 23

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 23 119029 10112024184716000000

The VPN concentrator is experiencing issues. Which action should be taken to ensure a stable environment?

Add a deny any/any firewall rule to the end of the firewall rules.

Add a deny any/any firewall rule to the end of the firewall rules.

Remove the connection from Internet 1.

Remove the connection from Internet 1.

Physically disconnect all LAN ports.

Physically disconnect all LAN ports.

Configure the MX appliance to Routed mode on the Addressing & VLANS page.

Configure the MX appliance to Routed mode on the Addressing & VLANS page.

Suggested answer: C
Explanation:

Before deploying MXs as one-arm VPN concentrators, place them into Passthrough or VPN Concentrator mode on the Addressing and VLANs page. In one-armed VPN concentrator mode, the units in the pair are connected to the network 'only' via their respective 'Internet' ports. Make sure they are NOT connected directly via their LAN ports. Each MX must be within the same IP subnet and able to communicate with each other, as well as with the Meraki dashboard. Only VPN traffic is routed to the MX, and both ingress and egress packets are sent through the same interface.

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/Meraki_Auto_VPN_General_Best_Practices

asked 11/10/2024
Michael Sheard
52 questions

Question 24

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 24 119030 10112024184716000000

A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.

What is the next hop for the packet, based on this concentrator routing table?

The concentrator gateway (10.128.124.62) is the next hop.

The concentrator gateway (10.128.124.62) is the next hop.

Not enough detail is available to determine the next hop.

Not enough detail is available to determine the next hop.

The packet is stopped.

The packet is stopped.

The Auto VPN peer ''Store 1532 -- appliance'' is the next hop.

The Auto VPN peer ''Store 1532 -- appliance'' is the next hop.

Suggested answer: D
Explanation:

This can be determined by looking at the concentrator routing table and finding the entry for the destination IP 10.116.32.4. The next hop for this entry is the Auto VPN peer ''Store 1532 -- appliance''.

This question is related to the topic ofImplementing Dynamic Routing Protocolsin the Engineering Cisco Meraki Solutions (ECMS) official training documentation. You can find more information about this topic in theECMS v2.2 Course Overviewor theECMS1 v2.1 Course Overview.

asked 11/10/2024
femke vroome
52 questions

Question 25

Report Export Collapse

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.

Which outcome occurs when a user attempts to remove the ''Meraki Management'' profile on an iPad?

The ''Meraki Management'' profile cannot be removed.

The ''Meraki Management'' profile cannot be removed.

The ''Meraki Management'' profile is removed and then pushed automatically by Systems Manager.

The ''Meraki Management'' profile is removed and then pushed automatically by Systems Manager.

The ''Meraki Management'' profile is removed. All the profiles that Systems Manager pushed are also removed.

The ''Meraki Management'' profile is removed. All the profiles that Systems Manager pushed are also removed.

The ''Meraki Management'' profile is removed. All the profiles Systems Manager pushed remain.

The ''Meraki Management'' profile is removed. All the profiles Systems Manager pushed remain.

Suggested answer: C
Explanation:

On the device, navigate to Settings > General > Device Management

Select Meraki Management, and select Remove to delete the management profile and any managed configuration profiles installed via SM

asked 11/10/2024
Solomon Nidish
40 questions

Question 26

Report Export Collapse

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

intrusion prevention

intrusion prevention

site-to-site VPN

site-to-site VPN

secondary uplinks

secondary uplinks

DHCP

DHCP

high availability

high availability

Suggested answer: A, B
Explanation:

These are the two features and functions that are supported when using an MX appliance in Passthrough mode. According to the [MX Addressing and VLANs] article, Passthrough mode allows the MX appliance to act as a layer 2 bridge, passing traffic between its LAN and WAN ports without performing any routing or address translation. However, some features such as intrusion prevention and site-to-site VPN are still available in this mode.

Passthrough_Mode_on_the_MX_Security_Appliance_and_Z-series_Teleworker_Gateway

asked 11/10/2024
Peter Lilley
59 questions

Question 27

Report Export Collapse

DRAG DROP

Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.


Cisco 500-220 image Question 27 119033 10112024064716000
Correct answer: Cisco 500-220 image answer Question 27 119033 10112024064716000
asked 11/10/2024
christopher patrick
34 questions

Question 28

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 28 119034 10112024184716000000

This Dashboard organization uses Co-Termination licensing model.

What happens when an additional seven APs are claimed on this network without adding licenses?

All APs immediately stop functioning.

All APs immediately stop functioning.

All network devices stop functioning in 30 days.

All network devices stop functioning in 30 days.

One AP Immediately stops functioning.

One AP Immediately stops functioning.

All APs stop functioning in 30 days.

All APs stop functioning in 30 days.

Suggested answer: B
Explanation:

The number of devices in an organization can not exceed the license limits. If this occurs, the organization will enter a 30-day grace period, during which the organization must be brought back into compliance, otherwise it will be shut down until proper licensing is applied to the organization. https://documentation.meraki.com/General_Administration/Licensing/Meraki_Co-Termination_Licensing_Overview

asked 11/10/2024
Website Subscription
43 questions

Question 29

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 29 119035 10112024184716000000

What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

Suggested answer: B
Explanation:

The performance probe is a small payload (approximately 100 bytes) of UDP data sent over all established VPN tunnels every 1 second. MX appliances track the rate of successful responses and the time that elapses before receiving a response. This data allows the MX to determine the packet loss, latency, and jitter over each VPN tunnel in order to make the necessary performance-based decisions.

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/Meraki_SD-WAN#Performance_Probes

asked 11/10/2024
Donn Policarpio
48 questions

Question 30

Report Export Collapse

What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?

The Dashboard generates the SAML request.

The Dashboard generates the SAML request.

The Dashboard provides user access credentials.

The Dashboard provides user access credentials.

The Dashboard parses the SAML request and authenticates users.

The Dashboard parses the SAML request and authenticates users.

The Dashboard generates the SAML response.

The Dashboard generates the SAML response.

Suggested answer: C
Explanation:

https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_Dashboard

asked 11/10/2024
Donald Wu
41 questions
Total 72 questions
Go to page: of 8
Search