Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 500-220 Engineering Cisco Meraki Solutions (ECMS) v2.2 Exam Practice Test

Page: 1 / 7
Total 72 questions

Engineering Cisco Meraki Solutions (ECMS) v2.2 Questions and Answers

Question 1

There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?

Options:

A.

2

B.

3

C.

4

D.

5

Question 2

Which Cisco Meraki best practice method preserves complete historical network event logs?

Options:

A.

Configuring the preserved event number to maximize logging.

B.

Configuring the preserved event period to unlimited.

C.

Configuring a syslog server for the network.

D.

Configuring Dashboard logging to preserve only certain event types.

Question 3

Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?

Options:

A.

highest VLAN ID that is configured and set to NO to use VPN

B.

lowest VLAN ID that is configured and set to YES to use VPN

C.

highest VLAN ID that is configured and set to YES to use VPN

D.

lowest VLAN ID configured and set to NO to use VPN

Question 4

Refer to the exhibit.

Question # 4

For an AP that displays this alert, which network access control method must be in use?

Options:

A.

preshared key

B.

WPA2-enterprise with my RADIUS server

C.

splash page with my RADIUS server

D.

MAC-based access control with RADIUS server

Question 5

Refer to the exhibit.

Question # 5

Which design recommendation should be considered?

Options:

A.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

B.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

C.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

D.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

Question 6

What are two organization permission types? (Choose two.)

Options:

A.

Full

B.

Read-only

C.

Monitor-only

D.

Write

E.

Write-only

Question 7

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.

Based on client count, how many APs (rounded to the nearest whole number) are needed?

Options:

A.

26

B.

28

C.

30

D.

32

Question 8

What is a feature of distributed Layer 3 roaming?

Options:

A.

An MX Security Appliance is not required as a concentrator.

B.

An MX Security Appliance is required as a concentrator.

C.

All wireless client traffic can be split-tunneled.

D.

All wireless client traffic is tunneled.

Question 9

Refer to the exhibit.

Question # 9

The VPN concentrator is experiencing issues. Which action should be taken to ensure a stable environment?

Options:

A.

Add a deny any/any firewall rule to the end of the firewall rules.

B.

Remove the connection from Internet 1.

C.

Physically disconnect all LAN ports.

D.

Configure the MX appliance to Routed mode on the Addressing & VLANS page.

Question 10

Drag and drop the descriptions from the left onto the permission types on the right.

Question # 10

Options:

Question 11

Refer to the exhibit.

Question # 11

What are two outcomes reflected in the Web App Health application? (Choose two.)

Options:

A.

Users on both networks may be experiencing issues when attempting to reach Google.

B.

Network #1 could not load Google because of a remote server issue.

C.

Network #2 had better application performance than Network #1.

D.

Network #2 could not load Google because of a local client misconfiguration.

E.

Neither network recorded any server-side performance issues.

Question 12

Refer to the exhibit.

Question # 12

Which IDS/IPS mode is the MX Security Appliance configured for?

Options:

A.

quarantine

B.

prevention

C.

detection

D.

blocking

Question 13

Refer to the exhibit.

Question # 13

What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?

Options:

A.

1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.

B.

100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.

C.

100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.

D.

1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.

Question 14

What happens to an unsupervised iOS device when the “Meraki management” profile is removed?

Options:

A.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed remain.

B.

The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed are also removed.

C.

The “Meraki management” profile is removed and then pushed automatically by Systems Manager.

D.

The “Meraki management” profile cannot be removed.

Question 15

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?

Options:

A.

Erase Device

B.

Clear Pushed Data

C.

Unenroll Device

D.

Selective Wipe

Question 16

What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?

Options:

A.

10 milliseconds

B.

100 milliseconds

C.

1 second

D.

10 seconds

Question 17

Which order is accurate for a firmware upgrade on MX appliances in a high-availability configuration?

Options:

A.

starts on the secondary MX appliance and then occurs on the primary MX appliance

B.

starts on both MX appliances at the same time and then reboots both appliances after traffic on the primary MX appliance ceases

C.

starts on both MX appliances at the same time and then immediately reboots both appliances

D.

starts on the primary MX appliance and then occurs on the secondary MX appliance

Question 18

When wireless SSIDs are configured in Dashboard, which setting on the Access Control page affects the ability of a 2.4 GHz only client device from associating to the WLAN for the first time?

Options:

A.

Content filtering

B.

Bridge mode

C.

802.11r

D.

Dual band operating with Band Steering

Question 19

Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.

Question # 19

Options:

Question 20

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

Options:

A.

Controller disconnection behavior

B.

Captive Portal strength

C.

Simultaneous logins

D.

Firewall & traffic shaping

E.

RADIUS for splash page settings

Question 21

Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.

Question # 21

Options:

Page: 1 / 7
Total 72 questions