Summer Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Cisco Meraki Solutions Specialist > 500-220

500-220 Engineering Cisco Meraki Solutions v1.0 Question and Answers

Question # 4

For which two reasons can an organization become “Out of License”? (Choose two.)

A.

licenses that are in the wrong network

B.

more hardware devices than device licenses

C.

expired device license

D.

licenses that do not match the serial numbers in the organization

E.

MR licenses that do not match the MR models in the organization

Full Access
Question # 5

How does a Meraki device behave if cloud connectivity is temporarily lost?

A.

The offline device continues to run with its last known configuration until cloud connectivity is restored.

B.

The offline device reboots every 5 minutes until connection is restored.

C.

The offline device stops passing traffic.

D.

The offline device tries to form a connection with a local backup sever.

Full Access
Question # 6

A new application needs to be pushed to all iOS devices. Some devices report “NotNow” in the event log and do not install the application.

What does the “NotNow” event indicate?

A.

The application requires the most recent iOS version.

B.

The device is locked with a passcode.

C.

The device cannot connect to Apple servers.

D.

The device cannot connect to Cisco Meraki servers.

Full Access
Question # 7

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

B.

Peers contact the VPN registry at UDP port 9350.

C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

D.

Peers contact the VPN registry at TCP port 9350.

E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Full Access
Question # 8

Which enrollment method must be used when containerization is required on BYOD Android devices managed by Systems Manager?

A.

Android Enterprise utilizing a Work Profile

B.

Systems Manager network ID

C.

Android Business utilizing a BYOD Profile

D.

Systems Manager container ID

Full Access
Question # 9

When wireless SSIDs are configured in Dashboard, which setting on the Access Control page affects the ability of a 2.4 GHz only client device from associating to the WLAN for the first time?

A.

Content filtering

B.

Bridge mode

C.

802.11r

D.

Dual band operating with Band Steering

Full Access
Question # 10

Refer to the exhibit.

This Dashboard organization uses Co-Termination licensing model.

What happens when an additional seven APs are claimed on this network without adding licenses?

A.

All APs immediately stop functioning.

B.

All network devices stop functioning in 30 days.

C.

One AP Immediately stops functioning.

D.

All APs stop functioning in 30 days.

Full Access
Question # 11

Which three verbs of request are available in the Cisco Meraki API? (Choose three.)

A.

SET

B.

PUT

C.

PATCH

D.

ADD

E.

POST

F.

GET

Full Access
Question # 12

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.

Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?

A.

The “Meraki Management” profile cannot be removed.

B.

The “Meraki Management” profile is removed and then pushed automatically by Systems Manager.

C.

The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed are also removed.

D.

The “Meraki Management” profile is removed. All the profiles Systems Manager pushed remain.

Full Access
Question # 13

Which requirement is needed to implement Fast Lane on Cisco Meraki APs?

A.

wireless profile installed on an Apple iOS device

B.

wireless profile installed on a Cisco iOS access point

C.

adaptive 802.11r disabled

D.

traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com

Full Access
Question # 14

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

A.

Controller disconnection behavior

B.

Captive Portal strength

C.

Simultaneous logins

D.

Firewall & traffic shaping

E.

RADIUS for splash page settings

Full Access
Question # 15

What is out of scope when considering the Best practices for high-density wireless designs?

A.

maximum beamforming

B.

band selection

C.

minimum bitrate

D.

number of SSIDs

Full Access
Question # 16

Which type of authentication protocol is used when using OSPF on an MX appliance?

A.

MD5

B.

certificate

C.

plaintext

D.

SHA-1

Full Access
Question # 17

Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?

A.

No configuration step is necessary; automatic updating is the default behavior.

B.

Configure automatic updating of iOS devices in the Meraki installed profile.

C.

Create a security policy that enables automatic updates.

D.

Create a profile with automatic update enabled and apply it to iOS devices.

Full Access
Question # 18

A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.

Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?

A.

zone exclusion

B.

privacy window

C.

area or interest

D.

sensor crop

E.

restricted mode

Full Access
Question # 19

There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?

A.

2

B.

3

C.

4

D.

5

Full Access
Question # 20

Which design requirement is met by implementing syslog versus SNMP?

A.

when automation capabilities are needed

B.

when proactive alerts for critical events must be generated

C.

when organization-wide information must be collected

D.

when information such as flows and client connectivity must be gathered

Full Access