ExamGecko
Home / Cisco / 500-220 / List of questions
Ask Question

Cisco 500-220 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 31 119037 10112024184716000000

Which IDS/IPS mode is the MX Security Appliance configured for?

quarantine

quarantine

prevention

prevention

detection

detection

blocking

blocking

Suggested answer: B
Explanation:

You can enable intrusion prevention by setting the Mode drop-down to Prevention under Security & SD-WAN > Configure > Threat protection > Intrusion detection and prevention. Traffic will be automatically blocked by best effort if it is detected as malicious based on the detection ruleset specified above. https://documentation.meraki.com/MX/Content_Filtering_and_Threat_Protection/Threat_Protection

asked 11/10/2024
nir avron
45 questions

Question 32

Report Export Collapse

Which two primary metrics does Meraki Insight use to calculate the Application Performance Score? (Choose two.)

Maximum Jitter

Maximum Jitter

Total Bandwidth Usage

Total Bandwidth Usage

Maximum Latency

Maximum Latency

Per-flow Goodput

Per-flow Goodput

Application Response Time

Application Response Time

Suggested answer: D, E
asked 11/10/2024
Mohammed Meddah
42 questions

Question 33

Report Export Collapse

DRAG DROP

Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.


Cisco 500-220 image Question 33 119039 10112024064716000
Correct answer: Cisco 500-220 image answer Question 33 119039 10112024064716000
asked 11/10/2024
Robert Miletich
51 questions

Question 34

Report Export Collapse

What is a feature of distributed Layer 3 roaming?

An MX Security Appliance is not required as a concentrator.

An MX Security Appliance is not required as a concentrator.

An MX Security Appliance is required as a concentrator.

An MX Security Appliance is required as a concentrator.

All wireless client traffic can be split-tunneled.

All wireless client traffic can be split-tunneled.

All wireless client traffic is tunneled.

All wireless client traffic is tunneled.

Suggested answer: A
Explanation:

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_MR_Wireless/Wireless_Layer_3_Roaming_Best_Practices

This is a feature of distributed Layer 3 roaming, which maintains layer 3 connections for end devices as they roam across layer 3 boundaries without a concentrator1.The first access point that a device connects to will become the anchor access point1.

asked 11/10/2024
eddie alvarez
45 questions

Question 35

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 35 119041 10112024184716000000

What are two outcomes reflected in the Web App Health application? (Choose two.)

Users on both networks may be experiencing issues when attempting to reach Google.

Users on both networks may be experiencing issues when attempting to reach Google.

Network #1 could not load Google because of a remote server issue.

Network #1 could not load Google because of a remote server issue.

Network #2 had better application performance than Network #1.

Network #2 had better application performance than Network #1.

Network #2 could not load Google because of a local client misconfiguration.

Network #2 could not load Google because of a local client misconfiguration.

Neither network recorded any server-side performance issues.

Neither network recorded any server-side performance issues.

Suggested answer: A, E
asked 11/10/2024
Patricia Escobar
39 questions

Question 36

Report Export Collapse

What are two organization permission types? (Choose two.)

Full

Full

Read-only

Read-only

Monitor-only

Monitor-only

Write

Write

Write-only

Write-only

Suggested answer: A, B
Explanation:

Managing_Dashboard_Administrators_and_Permissions

asked 11/10/2024
Barry Richards
35 questions

Question 37

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 37 119043 10112024184716000000

Which design recommendation should be considered?

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

Suggested answer: C
Explanation:

https://documentation.meraki.com/MR/Deployment_Guides/Mesh_Deployment_Guide

There will be a throughput reduction (~50% reduction) with each ''hop'' in a mesh. It is recommended that a mesh network be designed for no more than one mesh hop from the gateway to client device.

asked 11/10/2024
Guillermo Fontaine
56 questions

Question 38

Report Export Collapse

What are two roles of the network and device tags in a Dashboard? (Choose two.)

Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.

Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.

Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.

Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.

Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.

Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.

Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.

Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.

Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.

Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.

Suggested answer: A, C
Explanation:

See Permissions by Network Tag section To simplify the assignment of network-level permissions in an organization with many networks, permissions can be granted to users for a given network tag. https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Managing_Dashboard_Administrators_and_Permissions

The Organization > Configure > Manage Tags page allows Administrators to configure a combination of Network and Device specific tags to create Summary Reports filtered for specific devices across multiple networks. https://documentation.meraki.com/General_Administration/Organizations_and_Networks/Organization_Menu/Manage_Tags

asked 11/10/2024
Benvindo Almeida
42 questions

Question 39

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 39 119045 10112024184716000000

Which outcome occurs when logging is set to Enabled?

Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.

Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.

The hits counter within this section is now enabled.

The hits counter within this section is now enabled.

This firewall rule is now enabled.

This firewall rule is now enabled.

Inbound flows are sent to a configured syslog server if a syslog server configured for flows.

Inbound flows are sent to a configured syslog server if a syslog server configured for flows.

Suggested answer: A
Explanation:

'Inbound and outbound flows will generate a syslog message showing the source and destination along with port numbers and the firewall rule that they matched. For inbound rules, 1=deny and 0=allow.' https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Syslog_Server_Overview_and_Configuration

asked 11/10/2024
Bradley Coetzee
36 questions

Question 40

Report Export Collapse

Refer to the exhibit.

Cisco 500-220 image Question 40 119046 10112024184716000000

What is the minimal Cisco Meraki Insight licensing requirement?

A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B.

A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B.

A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B.

A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B.

A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B.

A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B.

Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B.

Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B.

Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B.

Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B.

Suggested answer: B
Explanation:

If you only need traffic statistics from your spoke site clients then you only need to enable insight on the spoke network as the hub site will not gather data for remote sites. https://community.meraki.com/t5/Wireless-LAN/Meraki-Insight-Licensing/m-p/152684

A license is only required for those networks where Meraki Insight functionality is desired. One license is required per network, regardless of whether that network has a single MX or HA pair. Licenses can be moved between networks, but historical data for the old network will be lost. https://meraki.cisco.com/lib/pdf/meraki_datasheet_mi.pdf

asked 11/10/2024
adil benmekki
40 questions
Total 72 questions
Go to page: of 8