Cisco 500-220 Practice Test - Questions Answers, Page 3
List of questions
Related questions
Which Cisco Meraki best practice method preserves complete historical network event logs?
Configuring the preserved event number to maximize logging.
Configuring the preserved event period to unlimited.
Configuring a syslog server for the network.
Configuring Dashboard logging to preserve only certain event types.
Which design requirement is met by implementing syslog versus SNMP?
when automation capabilities are needed
when proactive alerts for critical events must be generated
when organization-wide information must be collected
when information such as flows and client connectivity must be gathered
Refer to the exhibit.
The VPN concentrator is experiencing issues. Which action should be taken to ensure a stable environment?
Add a deny any/any firewall rule to the end of the firewall rules.
Remove the connection from Internet 1.
Physically disconnect all LAN ports.
Configure the MX appliance to Routed mode on the Addressing & VLANS page.
Refer to the exhibit.
A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.
What is the next hop for the packet, based on this concentrator routing table?
The concentrator gateway (10.128.124.62) is the next hop.
Not enough detail is available to determine the next hop.
The packet is stopped.
The Auto VPN peer ''Store 1532 -- appliance'' is the next hop.
Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.
Which outcome occurs when a user attempts to remove the ''Meraki Management'' profile on an iPad?
The ''Meraki Management'' profile cannot be removed.
The ''Meraki Management'' profile is removed and then pushed automatically by Systems Manager.
The ''Meraki Management'' profile is removed. All the profiles that Systems Manager pushed are also removed.
The ''Meraki Management'' profile is removed. All the profiles Systems Manager pushed remain.
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
intrusion prevention
site-to-site VPN
secondary uplinks
DHCP
high availability
DRAG DROP
Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.
Refer to the exhibit.
This Dashboard organization uses Co-Termination licensing model.
What happens when an additional seven APs are claimed on this network without adding licenses?
All APs immediately stop functioning.
All network devices stop functioning in 30 days.
One AP Immediately stops functioning.
All APs stop functioning in 30 days.
Refer to the exhibit.
What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.
100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.
100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.
1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.
What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?
The Dashboard generates the SAML request.
The Dashboard provides user access credentials.
The Dashboard parses the SAML request and authenticates users.
The Dashboard generates the SAML response.
Question