Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

500-220 Exam Dumps - Engineering Cisco Meraki Solutions v1.0

Question # 4

Refer to the exhibit.

Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)

A.

Change the primary uplink to "none".

B.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

C.

Enable load balancing.

D.

Set the speed of the cellular uplink to zero.

E.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Full Access
Question # 5

Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)

A.

intrusion prevention

B.

site-to-site VPN

C.

secondary uplinks

D.

DHCP

E.

high availability

Full Access
Question # 6

When wireless SSIDs are configured in Dashboard, which setting on the Access Control page affects the ability of a 2.4 GHz only client device from associating to the WLAN for the first time?

A.

Content filtering

B.

Bridge mode

C.

802.11r

D.

Dual band operating with Band Steering

Full Access
Question # 7

Refer to the exhibit.

What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?

A.

The MX appliance performs IDS/IPS for inter-VLAN traffic.

B.

The MX appliance performs AMP for inter-VLAN traffic.

C.

The MX appliance performs data encryption for inter-VLAN traffic.

D.

The MX appliance performs content filtering for inter-VLAN traffic.

Full Access
Question # 8

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?

A.

Erase Device

B.

Clear Pushed Data

C.

Unenroll Device

D.

Selective Wipe

Full Access
Question # 9

What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)

A.

by using Wi-Fi tags

B.

by defining the scope

C.

by defining a range of serial numbers

D.

by using device tags

E.

by using dynamic IP tags

Full Access
Question # 10

Refer to the exhibit.

Which outcome occurs when logging is set to Enabled?

A.

Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.

B.

The hits counter within this section is now enabled.

C.

This firewall rule is now enabled.

D.

Inbound flows are sent to a configured syslog server if a syslog server configured for flows.

Full Access
Question # 11

How does a Meraki device behave if cloud connectivity is temporarily lost?

A.

The offline device continues to run with its last known configuration until cloud connectivity is restored.

B.

The offline device reboots every 5 minutes until connection is restored.

C.

The offline device stops passing traffic.

D.

The offline device tries to form a connection with a local backup sever.

Full Access
Question # 12

Which Cisco Meraki best practice method preserves complete historical network event logs?

A.

Configuring the preserved event number to maximize logging.

B.

Configuring the preserved event period to unlimited.

C.

Configuring a syslog server for the network.

D.

Configuring Dashboard logging to preserve only certain event types.

Full Access
Question # 13

There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?

A.

2

B.

3

C.

4

D.

5

Full Access
Question # 14

What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?

A.

The Dashboard generates the SAML request.

B.

The Dashboard provides user access credentials.

C.

The Dashboard parses the SAML request and authenticates users.

D.

The Dashboard generates the SAML response.

Full Access
Question # 15

Which two actions can extend the video retention of a Cisco Meraki MV Smart Camera? (Choose two.)

A.

enabling audio compression

B.

installing an SSD memory extension

C.

enabling motion-based retention

D.

enabling maximum retention limit

E.

configuring a recording schedule

Full Access
Question # 16

Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?

A.

No configuration step is necessary; automatic updating is the default behavior.

B.

Configure automatic updating of iOS devices in the Meraki installed profile.

C.

Create a security policy that enables automatic updates.

D.

Create a profile with automatic update enabled and apply it to iOS devices.

Full Access
Question # 17

Air Marshal has contained a malicious SSID.

What are two effects on connectivity? (Choose two.)

A.

Currently associated clients stay connected.

B.

New clients can connect.

C.

Currently associated clients are affected by restrictive traffic shaping rules.

D.

New clients cannot connect.

E.

Currently associated clients are disconnected.

Full Access
Question # 18

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.

Based on client count, how many APs (rounded to the nearest whole number) are needed?

A.

26

B.

28

C.

30

D.

32

Full Access
Question # 19

Which two primary metrics does Meraki Insight use to calculate the Application Performance Score? (Choose two.)

A.

Maximum Jitter

B.

Total Bandwidth Usage

C.

Maximum Latency

D.

Per-flow Goodput

E.

Application Response Time

Full Access
Question # 20

Refer to the exhibit.

Which condition or conditions will cause the "All Databases & cloud services" SD-WAN traffic to be routed via a VPN2 tunnel on WAN2?

A.

WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.

B.

WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.

C.

WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.

D.

WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.

Full Access