Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

500-220 Sample Questions Answers

Questions 4

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.

Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?

Options:

A.

The “Meraki Management” profile cannot be removed.

B.

The “Meraki Management” profile is removed and then pushed automatically by Systems Manager.

C.

The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed are also removed.

D.

The “Meraki Management” profile is removed. All the profiles Systems Manager pushed remain.

Buy Now
Questions 5

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

Options:

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

B.

Peers contact the VPN registry at UDP port 9350.

C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

D.

Peers contact the VPN registry at TCP port 9350.

E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Buy Now
Questions 6

What happens to an unsupervised iOS device when the “Meraki management” profile is removed?

Options:

A.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed remain.

B.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed are also removed.

C.

The “Meraki management” profile is removed and then pushed automatically by Systems Manager.

D.

The “Meraki management” profile cannot be removed.

Buy Now
Questions 7

Refer to the exhibit.

A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.

What is the next hop for the packet, based on this concentrator routing table?

Options:

A.

The concentrator gateway (10.128.124.62) is the next hop.

B.

Not enough detail is available to determine the next hop.

C.

The packet is stopped.

D.

The Auto VPN peer “Store 1532 – appliance” is the next hop.

Buy Now
Questions 8

What are two organization permission types? (Choose two.)

Options:

A.

Full

B.

Read-only

C.

Monitor-only

D.

Write

E.

Write-only

Buy Now
Questions 9

Which enrollment method must be used when containerization is required on BYOD Android devices managed by Systems Manager?

Options:

A.

Android Enterprise utilizing a Work Profile

B.

Systems Manager network ID

C.

Android Business utilizing a BYOD Profile

D.

Systems Manager container ID

Questions 10

In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)

Options:

A.

Renew the Dashboard license.

B.

License a network.

C.

License more devices.

D.

Call Meraki support.

E.

Wait for the devices to auto-renew.

Buy Now
Questions 11

Which order is accurate for a firmware upgrade on MX appliances in a high-availability configuration?

Options:

A.

starts on the secondary MX appliance and then occurs on the primary MX appliance

B.

starts on both MX appliances at the same time and then reboots both appliances after traffic on the primary MX appliance ceases

C.

starts on both MX appliances at the same time and then immediately reboots both appliances

D.

starts on the primary MX appliance and then occurs on the secondary MX appliance

Buy Now
Questions 12

Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.

Options:

Buy Now
Questions 13

Which Cisco Meraki best practice method preserves complete historical network event logs?

Options:

A.

Configuring the preserved event number to maximize logging.

B.

Configuring the preserved event period to unlimited.

C.

Configuring a syslog server for the network.

D.

Configuring Dashboard logging to preserve only certain event types.

Buy Now
Questions 14

Refer to the exhibit.

During a Meraki AP deployment, the default SSID that the exhibit shows is broadcast. What causes this behavior?

Options:

A.

An AP does not have a wired connection to the network.

B.

An AP cannot connect to the default gateway.

C.

An AP has never connected to the Meraki Cloud Controller.

D.

An AP has Site Survey mode enabled.

Buy Now
Questions 15

Air Marshal has contained a malicious SSID.

What are two effects on connectivity? (Choose two.)

Options:

A.

Currently associated clients stay connected.

B.

New clients can connect.

C.

Currently associated clients are affected by restrictive traffic shaping rules.

D.

New clients cannot connect.

E.

Currently associated clients are disconnected.

Buy Now
Questions 16

Which two actions can extend the video retention of a Cisco Meraki MV Smart Camera? (Choose two.)

Options:

A.

enabling audio compression

B.

installing an SSD memory extension

C.

enabling motion-based retention

D.

enabling maximum retention limit

E.

configuring a recording schedule

Buy Now
Questions 17

Which API endpoint clones a new Organization?

Options:

A.

POST /organizations/clone/{organizationId}

B.

PUT /organizations/{organizationId}/clone

C.

POST /organizations/{organizationId}/new

D.

POST /organizations/{organizationId}/clone

Buy Now
Questions 18

A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?

Options:

A.

Auto VPN route 172.18.0.0/16

B.

static route 172.16.0.0/12

C.

non-Meraki VPN route 172.18.24.0/24

D.

directly connected 172.18.16.0/20

Buy Now
Questions 19

Refer to the exhibit.

What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

Options:

A.

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

B.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

C.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

D.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

Buy Now
Exam Code: 500-220
Exam Name: Engineering Cisco Meraki Solutions (ECMS) v2.2
Last Update: Apr 25, 2024
Questions: 72
$68  $169.99
$52  $129.99
$44  $109.99
buy now 500-220