1 / 11

Cisco Meraki Solutions Specialist 500-220 Exam Questions

With the help of PassQuestion, you will be able to receive high-quality Cisco Meraki Solutions Specialist 500-220 Exam Questions that will allow you to improve your preparation level for the exam.

Download Presentation

Cisco Meraki Solutions Specialist 500-220 Exam Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 500-220 Free Questions 500-220 Free Questions Engineering Cisco Meraki Solutions Engineering Cisco Meraki Solutions v1.0 v1.0 https://www.passquestion.com/ https://www.passquestion.com/500-220 500-220.html .html

  2. Question 1 Question 1 Which design requirement is met by implementing syslog versus SNMP? Which design requirement is met by implementing syslog versus SNMP? A. when automation capabilities are needed A. when automation capabilities are needed B. when proactive alerts for critical events must be generated B. when proactive alerts for critical events must be generated C. when organization-wide information must be collected C. when organization-wide information must be collected D. when information such as flows and client connectivity must be gathered D. when information such as flows and client connectivity must be gathered Answer: D Answer: D

  3. Question 2 Question 2 When an SSID is configured with Sign-On Splash page enabled, which two settings must When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.) listed? (Choose two.) A. Controller disconnection behavior A. Controller disconnection behavior B. Captive Portal strength B. Captive Portal strength C. Simultaneous logins C. Simultaneous logins D. Firewall & traffic shaping D. Firewall & traffic shaping E. RADIUS for splash page settings E. RADIUS for splash page settings Answer: A,B Answer: A,B

  4. Question 3 Question 3 For which two reasons can an organization become “Out of License”? For which two reasons can an organization become “Out of License”? (Choose two.) (Choose two.) A. licenses that are in the wrong network A. licenses that are in the wrong network B. more hardware devices than device licenses B. more hardware devices than device licenses C. expired device license C. expired device license D. licenses that do not match the serial numbers in the organization D. licenses that do not match the serial numbers in the organization E. MR licenses that do not match the MR models in the organization E. MR licenses that do not match the MR models in the organization Answer: B,C Answer: B,C

  5. Question 4 Question 4 Which type of authentication protocol is used when using OSPF on an MX Which type of authentication protocol is used when using OSPF on an MX appliance? appliance? A. MD5 A. MD5 B. certificate B. certificate C. plaintext C. plaintext D. SHA-1 D. SHA-1 Answer: A Answer: A

  6. Question 5 Question 5 Which information is used to calculate whether a WAN link has high usage? Which information is used to calculate whether a WAN link has high usage? A. data under Security & SD WAN > Appliance Status > Uplink > Live Data A. data under Security & SD WAN > Appliance Status > Uplink > Live Data B. total historical throughput of an uplink B. total historical throughput of an uplink C. total number of devices that are actively passing traffic C. total number of devices that are actively passing traffic D. value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration D. value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration Answer: D Answer: D

  7. Question 6 Question 6 A new application needs to be pushed to all iOS devices. Some devices report “NotNow” A new application needs to be pushed to all iOS devices. Some devices report “NotNow” in the event log and do not install the application. in the event log and do not install the application. What does the “NotNow” event indicate? What does the “NotNow” event indicate? A. The application requires the most recent iOS version. A. The application requires the most recent iOS version. B. The device is locked with a passcode. B. The device is locked with a passcode. C. The device cannot connect to Apple servers. C. The device cannot connect to Apple servers. D. The device cannot connect to Cisco Meraki servers. D. The device cannot connect to Cisco Meraki servers. Answer: B Answer: B

  8. Question 7 Question 7 In an organization that uses the Co-Termination licensing model, which two In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.) operations enable licenses to be applied? (Choose two.) A. Renew the Dashboard license. A. Renew the Dashboard license. B. License a network. B. License a network. C. License more devices. C. License more devices. D. Call Meraki support. D. Call Meraki support. E. Wait for the devices to auto-renew. E. Wait for the devices to auto-renew. Answer: A,C Answer: A,C

  9. Question 8 Question 8 Which requirement is needed to implement Fast Lane on Cisco Meraki APs? Which requirement is needed to implement Fast Lane on Cisco Meraki APs? A. wireless profile installed on an Apple iOS device A. wireless profile installed on an Apple iOS device B. wireless profile installed on a Cisco iOS access point B. wireless profile installed on a Cisco iOS access point C. adaptive 802.11r disabled C. adaptive 802.11r disabled D. traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com D. traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com Answer: A Answer: A

  10. Question 9 Question 9 What are two ways peers interact with ports that Auto VPN uses? (Choose two.) What are two ways peers interact with ports that Auto VPN uses? (Choose two.) A. For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 A. For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range. range. B. Peers contact the VPN registry at UDP port 9350. B. Peers contact the VPN registry at UDP port 9350. C. For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 C. For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range. range. D. Peers contact the VPN registry at TCP port 9350. D. Peers contact the VPN registry at TCP port 9350. E. For IPsec tunneling, peers use UDP ports 500 and 4500. E. For IPsec tunneling, peers use UDP ports 500 and 4500. Answer: B,C Answer: B,C

  11. Question 10 Question 10 Air Marshal has contained a malicious SSID. Air Marshal has contained a malicious SSID. What are two effects on connectivity? (Choose two.) What are two effects on connectivity? (Choose two.) A. Currently associated clients stay connected. A. Currently associated clients stay connected. B. New clients can connect. B. New clients can connect. C. Currently associated clients are affected by restrictive traffic shaping rules. C. Currently associated clients are affected by restrictive traffic shaping rules. D. New clients cannot connect. D. New clients cannot connect. E. Currently associated clients are disconnected. E. Currently associated clients are disconnected. Answer: D,E Answer: D,E

More Related