500-220 Dumps

500-220 Braindumps

500-220 Real Questions

500-220 Practice Test

500-220 Actual Questions


killexams.com


Cisco


500-220


Cisco Meraki Solutions Specialist (ECMS)


https://killexams.com/pass4sure/exam-detail/500-220

Question: 140


Which design requirement is met by implementing syslog versus SNMP?


  1. when automation capabilities are needed

  2. when proactive alerts for critical events must be generated

  3. when organization-wide information must be collected

  4. when information such as flows and client connectivity must be gathered


Answer: A,C,D

Explanation: Reference:

https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Meraki_Device_Reporting_-

_Syslog%2C_SNMP%2C_and_API


Question: 141


When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)


  1. Controller disconnection behavior

  2. Captive Portal strength

  3. Simultaneous logins

  4. Firewall & traffic shaping

  5. RADIUS for splash page settings


Answer: A


Explanation:


Reference: https://documentation.meraki.com/MR/Access_Control


Question: 142


For which two reasons can an organization become âOut of Licenseâ? (Choose two.)


  1. licenses that are in the wrong network

  2. more hardware devices than device licenses

  3. expired device license

  4. licenses that do not match the serial numbers in the organization

  5. MR licenses that do not match the MR models in the organization


Answer: A,B


Explanation:


Reference: https://documentation.meraki.com/General_Administration/Licensing/Meraki_Licensing_FA Qs


Refer to the exhibit.



For an AP that displays this alert, which network access control method must be in use?


  1. preshared key

  2. WPA2-enterprise with my RADIUS server

  3. splash page with my RADIUS server

  4. MAC-based access control with RADIUS server


Answer: A Question: 144

Which type of authentication protocol is used when using OSPF on an MX appliance?


  1. MD5

  2. certificate

  3. plaintext

  4. SHA-1


Answer: A


Explanation:


Reference: https://documentation.meraki.com/MX/Site-to- site_VPN/Using_OSPF_to_Advertise_Remote_VPN_Subnets


Question: 145


Which information is used to calculate whether a WAN link has high usage?


  1. data under Security & SD WAN > Appliance Status > Uplink > Live Data

  2. total historical throughput of an uplink

  3. total number of devices that are actively passing traffic

  4. value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration


Answer: D Question: 146

A new application needs to be pushed to all iOS devices. Some devices report âNotNowâ in the event log and do not install the application.


What does the âNotNowâ event indicate?


  1. The application requires the most recent iOS version.

  2. The device is locked with a passcode.

  3. The device cannot connect to Apple servers.

  4. The device cannot connect to Cisco Meraki servers.


Answer: A,B,C,D


Explanation:


Reference: https://community.meraki.com/t5/Mobile-Device-Management/Check-NotNow-Status/td-p/3887


Question: 147


In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)


  1. Renew the Dashboard license.

  2. License a network.

  3. License more devices.

  4. Call Meraki support.

  5. Wait for the devices to auto-renew.


Answer: A


Explanation:


Reference: https://documentation.meraki.com/General_Administration/Licensing/Meraki_Co- Termination_Licensing_Overview


Question: 148


Which requirement is needed to implement Fast Lane on Cisco Meraki APs?


  1. wireless profile installed on an Apple iOS device

  2. wireless profile installed on a Cisco iOS access point

  3. adaptive 802.11r disabled

  4. traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com


Answer: A,B


Explanation:


Reference: https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Wireless_QoS_and_Fast_Lane


What are two ways peers interact with ports that Auto VPN uses? (Choose two.)


  1. For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

  2. Peers contact the VPN registry at UDP port 9350.

  3. For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

  4. Peers contact the VPN registry at TCP port 9350.

  5. For IPsec tunneling, peers use UDP ports 500 and 4500.


Answer: A,B


Explanation:


Reference: https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN_-

_Configuration_and_Troubleshooting


Question: 150


Air Marshal has contained a malicious SSID.


What are two effects on connectivity? (Choose two.)


  1. Currently associated clients stay connected.

  2. New clients can connect.

  3. Currently associated clients are affected by restrictive traffic shaping rules.

  4. New clients cannot connect.

  5. Currently associated clients are disconnected.


Answer: D,E Question: 151 Refer to the exhibit.


What is the minimal Cisco Meraki Insight licensing requirement?


  1. A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network

  2. A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network

  3. A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network

  4. Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network

  5. Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network


Answer: C Question: 152

A customer wants to use Microsoft Azure to host corporate application servers.


Which feature does the customer get by using a vMX appliance rather than connecting directly to Azure by VPN?


  1. malware protection

  2. SD-WAN

  3. next-generation firewall

  4. intrusion prevention


Answer: C Question: 153

DRAG DROP


Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.



wrong Answer: C Explanation: Table

Description automatically generated with medium confidence


Question: 154


Refer to the exhibit.



Which IDS/IPS mode is the MX Security Appliance configured for?


  1. quarantine

  2. prevention

  3. detection

  4. blocking


Answer: B