ExamGecko
Home Home / Cisco / 500-220

Cisco 500-220 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

DRAG DROP

Drag and drop the settings from the left onto the available or non-available methods of applying a group policy to a Cisco Meraki MR access point on the right.


Question 51
Correct answer: Question 51

DRAG DROP

Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.


Question 52
Correct answer: Question 52

Refer to the exhibit.

Refer to the exhibit. What Is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?

A.

All flows alternate in a 5:1 ratio.

A.

All flows alternate in a 5:1 ratio.

Answers
B.

All flows alternate in a 2:1 ratio.

B.

All flows alternate in a 2:1 ratio.

Answers
C.

All flows agrees via WAN 1:1 ratio.

C.

All flows agrees via WAN 1:1 ratio.

Answers
D.

All flows egress via WAN1.

D.

All flows egress via WAN1.

Answers
Suggested answer: C

Explanation:

https://documentation.meraki.com/MX/Firewall_and_Traffic_Shaping/MX_Load_Balancing_and_Flow_Preferences#Load_Balancing

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?

A.

Erase Device

A.

Erase Device

Answers
B.

Clear Pushed Data

B.

Clear Pushed Data

Answers
C.

Unenroll Device

C.

Unenroll Device

Answers
D.

Selective Wipe

D.

Selective Wipe

Answers
Suggested answer: D

Explanation:

https://documentation.meraki.com/SM/Monitoring_and_Reporting/Selective_Wipe_and_Device_Quarantine_in_Systems_Manager

Refer to the exhibit.

Which condition or conditions will cause the 'All Databases & cloud services' SD-WAN traffic to be routed via a VPN2 tunnel on WAN2?

A.

WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.

A.

WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.

Answers
B.

WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.

B.

WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.

Answers
C.

WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.

C.

WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.

Answers
D.

WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.

D.

WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.

Answers
Suggested answer: B

Explanation:

This is because the SD-WAN policy for ''All Databases & cloud services'' has the following settings:

Uplink selection policy: Prefer WAN1, Fail over if down

Traffic filters: Custom performance classes

Custom performance classes: Database

Database performance criteria: Maximum latency 200 ms, Maximum jitter 20 ms, Maximum loss 1%

This means that the SD-WAN traffic will be routed via WAN1 by default, unless WAN1 is down or fails to meet the database performance criteria. In that case, the traffic will be routed via WAN2, if WAN2 meets the database performance criteria. Therefore, the condition that will cause the traffic to be routed via WAN2 is when WAN1 tunnel latency is 20 ms or more (which exceeds the maximum jitter of 20 ms), and WAN2 tunnel meets the configured performance criteria (maximum latency 200 ms, maximum jitter 20 ms, maximum loss 1%).

Refer to the exhibit.

Which two configurations are needed to successfully monitor custom applications that a user is accessing using Cisco Meraki Insight? (Choose two)

A.

The custom application uses TLS on any ports.

A.

The custom application uses TLS on any ports.

Answers
B.

The custom application uses HTTP on port 8080.

B.

The custom application uses HTTP on port 8080.

Answers
C.

The custom application uses HTTPS on TCP 443.

C.

The custom application uses HTTPS on TCP 443.

Answers
D.

The custom application uses SMB/CIFS.

D.

The custom application uses SMB/CIFS.

Answers
E.

The custom application uses HTTPS on port 8080.

E.

The custom application uses HTTPS on port 8080.

Answers
Suggested answer: B, C

Explanation:

https://documentation.meraki.com/MI/MI_Web_App_Health/Overview#:~:text=On%20this%20page%2C%20you%20can,that%20ports%20cannot%20be%20specified.

DRAG DROP

Drag and drop the descriptions from the left onto the permission types on the right.


Question 57
Correct answer: Question 57

What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)

A.

by using Wi-Fi tags

A.

by using Wi-Fi tags

Answers
B.

by defining the scope

B.

by defining the scope

Answers
C.

by defining a range of serial numbers

C.

by defining a range of serial numbers

Answers
D.

by using device tags

D.

by using device tags

Answers
E.

by using dynamic IP tags

E.

by using dynamic IP tags

Answers
Suggested answer: B, D

Explanation:

The correct answer is B and D. These are the two methods of targeting and applying management profiles to System Manager clients, according to the [System Manager: Getting Started] article. The article explains that:

Defining the scope: This method allows you to target devices based on their network, tag, or owner. You can define the scope of a profile from the Systems Manager > Manage > Settings page or from the Systems Manager > Monitor > Overview page.

Using device tags: This method allows you to target devices based on their attributes, such as OS, model, location, or user. You can use device tags to create dynamic groups of devices that share common characteristics. You can apply device tags from the Systems Manager > Monitor > Devices page or from the Systems Manager > Manage > Tags page.

There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?

A.

2

A.

2

Answers
B.

3

B.

3

Answers
C.

4

C.

4

Answers
D.

5

D.

5

Answers
Suggested answer: C

Explanation:

This is the approximate number of APs that are needed based on client count, assuming that each AP can support up to 25 concurrent video streaming users. This can be calculated by using the formula:

Number of APs = (Number of Users x Percentage of Users on a Band) / Number of Users per AP on that Band

Where Number of Users is 100, Percentage of Users on 2.4 Ghz is 30%, Percentage of Users on 5 Ghz is 70%, Number of Users per AP on 2.4 Ghz is 15, and Number of Users per AP on 5 Ghz is 30. Therefore,

Number of APs = (100 x 0.3 / 15) + (100 x 0.7 / 30) Number of APs = (3.33) + (2.33) Number of APs = 5.66

Rounding to the nearest whole number, the number of APs is4.

This question is related to the topic ofWireless Capacity Planningin the Cisco Meraki documentation. You can find more information about this topic in the [Wireless Capacity Planning] article or the [Best Practice Design - MR Wireless] page.

What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?

A.

10 milliseconds

A.

10 milliseconds

Answers
B.

100 milliseconds

B.

100 milliseconds

Answers
C.

1 second

C.

1 second

Answers
D.

10 seconds

D.

10 seconds

Answers
Suggested answer: C

Explanation:

https://www.ciscolive.com/c/dam/r/ciscolive/latam/docs/2019/pdf/BRKCRS-1579.pdf

Total 72 questions
Go to page: of 8