ExamGecko
Home Home / Cisco / 500-220

Cisco 500-220 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Which Cisco Meraki best practice method preserves complete historical network event logs?

A.

Configuring the preserved event number to maximize logging.

A.

Configuring the preserved event number to maximize logging.

Answers
B.

Configuring the preserved event period to unlimited.

B.

Configuring the preserved event period to unlimited.

Answers
C.

Configuring a syslog server for the network.

C.

Configuring a syslog server for the network.

Answers
D.

Configuring Dashboard logging to preserve only certain event types.

D.

Configuring Dashboard logging to preserve only certain event types.

Answers
Suggested answer: C

Explanation:

Configuring a syslog server for the network is the Cisco Meraki best practice method to preserve complete historical network event logs.A syslog server can be configured to store messages for reporting purposes from MX Security Appliances, MR Access Points, and MS switches1.The syslog server can collect various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events2. The syslog server can also help with troubleshooting and monitoring the network performance and security.

Which design requirement is met by implementing syslog versus SNMP?

A.

when automation capabilities are needed

A.

when automation capabilities are needed

Answers
B.

when proactive alerts for critical events must be generated

B.

when proactive alerts for critical events must be generated

Answers
C.

when organization-wide information must be collected

C.

when organization-wide information must be collected

Answers
D.

when information such as flows and client connectivity must be gathered

D.

when information such as flows and client connectivity must be gathered

Answers
Suggested answer: D

Explanation:

Implementing syslog versus SNMP can meet the design requirement of gathering information such as flows and client connectivity. Syslog can collect and report various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events. Syslog can also provide detailed information about the flows and client connectivity on the network devices, such as source and destination IP addresses, ports, protocols, bytes transferred, etc. SNMP, on the other hand, can collect and report various statistics and information about the network devices, such as CPU utilization, interface status, memory usage, etc. However, SNMP does not provide as much information about the flows and client connectivity as syslog does.

Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API

Refer to the exhibit.

The VPN concentrator is experiencing issues. Which action should be taken to ensure a stable environment?

A.

Add a deny any/any firewall rule to the end of the firewall rules.

A.

Add a deny any/any firewall rule to the end of the firewall rules.

Answers
B.

Remove the connection from Internet 1.

B.

Remove the connection from Internet 1.

Answers
C.

Physically disconnect all LAN ports.

C.

Physically disconnect all LAN ports.

Answers
D.

Configure the MX appliance to Routed mode on the Addressing & VLANS page.

D.

Configure the MX appliance to Routed mode on the Addressing & VLANS page.

Answers
Suggested answer: C

Explanation:

Before deploying MXs as one-arm VPN concentrators, place them into Passthrough or VPN Concentrator mode on the Addressing and VLANs page. In one-armed VPN concentrator mode, the units in the pair are connected to the network 'only' via their respective 'Internet' ports. Make sure they are NOT connected directly via their LAN ports. Each MX must be within the same IP subnet and able to communicate with each other, as well as with the Meraki dashboard. Only VPN traffic is routed to the MX, and both ingress and egress packets are sent through the same interface.

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/Meraki_Auto_VPN_General_Best_Practices

Refer to the exhibit.

A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.

What is the next hop for the packet, based on this concentrator routing table?

A.

The concentrator gateway (10.128.124.62) is the next hop.

A.

The concentrator gateway (10.128.124.62) is the next hop.

Answers
B.

Not enough detail is available to determine the next hop.

B.

Not enough detail is available to determine the next hop.

Answers
C.

The packet is stopped.

C.

The packet is stopped.

Answers
D.

The Auto VPN peer ''Store 1532 -- appliance'' is the next hop.

D.

The Auto VPN peer ''Store 1532 -- appliance'' is the next hop.

Answers
Suggested answer: D

Explanation:

This can be determined by looking at the concentrator routing table and finding the entry for the destination IP 10.116.32.4. The next hop for this entry is the Auto VPN peer ''Store 1532 -- appliance''.

This question is related to the topic ofImplementing Dynamic Routing Protocolsin the Engineering Cisco Meraki Solutions (ECMS) official training documentation. You can find more information about this topic in theECMS v2.2 Course Overviewor theECMS1 v2.1 Course Overview.

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.

Which outcome occurs when a user attempts to remove the ''Meraki Management'' profile on an iPad?

A.

The ''Meraki Management'' profile cannot be removed.

A.

The ''Meraki Management'' profile cannot be removed.

Answers
B.

The ''Meraki Management'' profile is removed and then pushed automatically by Systems Manager.

B.

The ''Meraki Management'' profile is removed and then pushed automatically by Systems Manager.

Answers
C.

The ''Meraki Management'' profile is removed. All the profiles that Systems Manager pushed are also removed.

C.

The ''Meraki Management'' profile is removed. All the profiles that Systems Manager pushed are also removed.

Answers
D.

The ''Meraki Management'' profile is removed. All the profiles Systems Manager pushed remain.

D.

The ''Meraki Management'' profile is removed. All the profiles Systems Manager pushed remain.

Answers
Suggested answer: C

Explanation:

On the device, navigate to Settings > General > Device Management

Select Meraki Management, and select Remove to delete the management profile and any managed configuration profiles installed via SM

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

A.

intrusion prevention

A.

intrusion prevention

Answers
B.

site-to-site VPN

B.

site-to-site VPN

Answers
C.

secondary uplinks

C.

secondary uplinks

Answers
D.

DHCP

D.

DHCP

Answers
E.

high availability

E.

high availability

Answers
Suggested answer: A, B

Explanation:

These are the two features and functions that are supported when using an MX appliance in Passthrough mode. According to the [MX Addressing and VLANs] article, Passthrough mode allows the MX appliance to act as a layer 2 bridge, passing traffic between its LAN and WAN ports without performing any routing or address translation. However, some features such as intrusion prevention and site-to-site VPN are still available in this mode.

Passthrough_Mode_on_the_MX_Security_Appliance_and_Z-series_Teleworker_Gateway

DRAG DROP

Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.


Question 27
Correct answer: Question 27

Refer to the exhibit.

This Dashboard organization uses Co-Termination licensing model.

What happens when an additional seven APs are claimed on this network without adding licenses?

A.

All APs immediately stop functioning.

A.

All APs immediately stop functioning.

Answers
B.

All network devices stop functioning in 30 days.

B.

All network devices stop functioning in 30 days.

Answers
C.

One AP Immediately stops functioning.

C.

One AP Immediately stops functioning.

Answers
D.

All APs stop functioning in 30 days.

D.

All APs stop functioning in 30 days.

Answers
Suggested answer: B

Explanation:

The number of devices in an organization can not exceed the license limits. If this occurs, the organization will enter a 30-day grace period, during which the organization must be brought back into compliance, otherwise it will be shut down until proper licensing is applied to the organization. https://documentation.meraki.com/General_Administration/Licensing/Meraki_Co-Termination_Licensing_Overview

Refer to the exhibit.

What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

A.

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

A.

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

Answers
B.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

B.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

Answers
C.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

C.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

Answers
D.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

D.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

Answers
Suggested answer: B

Explanation:

The performance probe is a small payload (approximately 100 bytes) of UDP data sent over all established VPN tunnels every 1 second. MX appliances track the rate of successful responses and the time that elapses before receiving a response. This data allows the MX to determine the packet loss, latency, and jitter over each VPN tunnel in order to make the necessary performance-based decisions.

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MX_Security_and_SD-WAN/Meraki_SD-WAN#Performance_Probes

What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?

A.

The Dashboard generates the SAML request.

A.

The Dashboard generates the SAML request.

Answers
B.

The Dashboard provides user access credentials.

B.

The Dashboard provides user access credentials.

Answers
C.

The Dashboard parses the SAML request and authenticates users.

C.

The Dashboard parses the SAML request and authenticates users.

Answers
D.

The Dashboard generates the SAML response.

D.

The Dashboard generates the SAML response.

Answers
Suggested answer: C

Explanation:

https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_Dashboard

Total 72 questions
Go to page: of 8