Cisco 500-220 Practice Test - Questions Answers, Page 6
List of questions
Related questions
DRAG DROP
Drag and drop the settings from the left onto the available or non-available methods of applying a group policy to a Cisco Meraki MR access point on the right.
DRAG DROP
Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.
Refer to the exhibit.
Refer to the exhibit. What Is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?
All flows alternate in a 5:1 ratio.
All flows alternate in a 2:1 ratio.
All flows agrees via WAN 1:1 ratio.
All flows egress via WAN1.
An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?
Erase Device
Clear Pushed Data
Unenroll Device
Selective Wipe
Refer to the exhibit.
Which condition or conditions will cause the 'All Databases & cloud services' SD-WAN traffic to be routed via a VPN2 tunnel on WAN2?
WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.
WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.
WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.
WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.
Refer to the exhibit.
Which two configurations are needed to successfully monitor custom applications that a user is accessing using Cisco Meraki Insight? (Choose two)
The custom application uses TLS on any ports.
The custom application uses HTTP on port 8080.
The custom application uses HTTPS on TCP 443.
The custom application uses SMB/CIFS.
The custom application uses HTTPS on port 8080.
DRAG DROP
Drag and drop the descriptions from the left onto the permission types on the right.
What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)
by using Wi-Fi tags
by defining the scope
by defining a range of serial numbers
by using device tags
by using dynamic IP tags
There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?
2
3
4
5
What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?
10 milliseconds
100 milliseconds
1 second
10 seconds
Question