Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

500-220 Questions and Answers

Question # 6

Refer to the exhibit. What Is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?

A.

All flows alternate in a 5:1 ratio.

B.

All flows alternate in a 2:1 ratio.

C.

All flows agrees via WAN 1:1 ratio.

D.

All flows egress via WAN1.

Full Access
Question # 7

Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.

Full Access
Question # 8

A new application needs to be pushed to all iOS devices. Some devices report “NotNow” in the event log and do not install the application.

What does the “NotNow” event indicate?

A.

The application requires the most recent iOS version.

B.

The device is locked with a passcode.

C.

The device cannot connect to Apple servers.

D.

The device cannot connect to Cisco Meraki servers.

Full Access
Question # 9

Refer to the exhibit.

What are the Loss and Average Latency statistics based on?

A.

responses that the MX appliance receives on the connectivity-testing hostnames on the Insight > Web App Health page

B.

responses that the MX appliance receives on the connectivity-testing IP addresses on the Security & SD- WAN > Firewall page

C.

responses that the MX appliance receives on the connectivity-testing IP address that is configured on the Security & SD-WAN > SD-WAN & Traffic Shaping page

D.

responses that the MX appliance receives on the connectivity-testing IP addresses on the Help > Firewall info page

Full Access
Question # 10

Which Cisco Meraki best practice method preserves complete historical network event logs?

A.

Configuring the preserved event number to maximize logging.

B.

Configuring the preserved event period to unlimited.

C.

Configuring a syslog server for the network.

D.

Configuring Dashboard logging to preserve only certain event types.

Full Access
Question # 11

Which two primary metrics does Meraki Insight use to calculate the Application Performance Score? (Choose two.)

A.

Maximum Jitter

B.

Total Bandwidth Usage

C.

Maximum Latency

D.

Per-flow Goodput

E.

Application Response Time

Full Access
Question # 12

Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.

Full Access
Question # 13

Which API endpoint clones a new Organization?

A.

POST /organizations/clone/{organizationId}

B.

PUT /organizations/{organizationId}/clone

C.

POST /organizations/{organizationId}/new

D.

POST /organizations/{organizationId}/clone

Full Access
Question # 14

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

A.

intrusion prevention

B.

site-to-site VPN

C.

secondary uplinks

D.

DHCP

E.

high availability

Full Access
Question # 15

Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.

Full Access
Question # 16

Refer to the exhibit.

What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?

A.

The MX appliance performs IDS/IPS for inter-VLAN traffic.

B.

The MX appliance performs AMP for inter-VLAN traffic.

C.

The MX appliance performs data encryption for inter-VLAN traffic.

D.

The MX appliance performs content filtering for inter-VLAN traffic.

Full Access
Question # 17

Refer to the exhibit.

This Dashboard organization uses Co-Termination licensing model.

What happens when an additional seven APs are claimed on this network without adding licenses?

A.

All APs immediately stop functioning.

B.

All network devices stop functioning in 30 days.

C.

One AP Immediately stops functioning.

D.

All APs stop functioning in 30 days.

Full Access
Question # 18

Which type of authentication protocol is used when using OSPF on an MX appliance?

A.

MD5

B.

certificate

C.

plaintext

D.

SHA-1

Full Access
Question # 19

A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.

Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?

A.

zone exclusion

B.

privacy window

C.

area or interest

D.

sensor crop

E.

restricted mode

Full Access
Question # 20

Which design requirement is met by implementing syslog versus SNMP?

A.

when automation capabilities are needed

B.

when proactive alerts for critical events must be generated

C.

when organization-wide information must be collected

D.

when information such as flows and client connectivity must be gathered

Full Access
Question # 21

A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and 50 remote sites with a single uplink connection.

How many tunnels does each hub need to support?

A.

52

B.

54

C.

100

D.

104

Full Access