cisco 500-220 practice test

cisco meraki solutions specialist

Last exam update: Sep 01 ,2024
Page 1 out of 8. Viewing questions 1-10 out of 72

Question 1


Refer to the exhibit. The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?

  • A. Add a deny any/any firewall rule to the end of the firewall rules.
  • B. Remove the connection from Internet 1.
  • C. Physically disconnect all LAN ports.
  • D. Configure the MX appliance to Routed mode on the Addressing & VLANS page.
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which type of authentication protocol is used when using OSPF on an MX appliance?

  • A. MD5
  • B. certificate
  • C. plaintext
  • D. SHA-1
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

When wireless SSIDs are configured in Dashboard, which setting on the Access Control page affects the ability of a 2.4 GHz only client device from associating to the WLAN for the first time?

  • A. Content filtering
  • B. Bridge mode
  • C. 802.11r
  • D. Dual band operating with Band Steering
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4


Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?

  • A. quarantine
  • B. prevention
  • C. detection
  • D. blocking
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

DRAG DROP Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.

Answer:

Discussions
0 / 1000

Question 6

Which design requirement is met by implementing syslog versus SNMP?

  • A. when automation capabilities are needed
  • B. when proactive alerts for critical events must be generated
  • C. when organization-wide information must be collected
  • D. when information such as flows and client connectivity must be gathered
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

DRAG DROP Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.

Answer:

Discussions
0 / 1000

Question 8

What is a feature of distributed Layer 3 roaming?

  • A. An MX Security Appliance is not required as a concentrator.
  • B. An MX Security Appliance is required as a concentrator.
  • C. All wireless client traffic can be split-tunneled.
  • D. All wireless client traffic is tunneled.
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9


Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

  • A. 1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.
  • B. 100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.
  • C. 100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.
  • D. 1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and 50 remote sites with a single uplink connection.
How many tunnels does each hub need to support?

  • A. 52
  • B. 54
  • C. 100
  • D. 104
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2