cisco 500-220 online test

Engineering Cisco Meraki Solutions

What students need to know about the 500-220 exam

  • Total 57 Questions & Answers

Question 1

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.
Which outcome occurs when a user attempts to remove the Meraki Management profile on an iPad?

  • A. The “Meraki Management” profile cannot be removed.
  • B. The Meraki Management profile is removed and then pushed automatically by Systems Manager.
  • C. The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed are also removed.
  • D. The “Meraki Management” profile is removed. All the profiles Systems Manager pushed remain.
Answer:

C

Discussions

Question 2

Which API endpoint clones a new Organization?

  • A. POST /organizations/clone/{organizationId}
  • B. PUT /organizations/{organizationId}/clone
  • C. POST /organizations/{organizationId}/new
  • D. POST /organizations/{organizationId}/clone
Answer:

C

Discussions

Question 3

Which information do the MXs in a High Availability pair share?

  • A. spanning-tree state
  • B. time synchronization state
  • C. DHCP association database
  • D. stateful firewall database
Answer:

A

Discussions

Question 4


Refer to the exhibit. Which design recommendation should be considered?

  • A. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
  • B. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
  • C. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
  • D. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
Answer:

A

Discussions

Question 5

How does a Meraki device behave if cloud connectivity is temporarily lost?

  • A. The offline device continues to run with its last known configuration until cloud connectivity is restored.
  • B. The offline device reboots every 5 minutes until connection is restored.
  • C. The offline device stops passing traffic.
  • D. The offline device tries to form a connection with a local backup sever.
Answer:

D

Explanation:
Reference: https://community.meraki.com/t5/Security-SD-WAN/Cloud-Services/td-p/43141

Discussions

Question 6

What are two roles of the network and device tags in a Dashboard? (Choose two.)

  • A. Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.
  • B. Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.
  • C. Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.
  • D. Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.
  • E. Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.
Answer:

A E

Explanation:
Reference: https://documentation.meraki.com/General_Administration/
Organizations_and_Networks/Organization_Menu/Manage_Tags

Discussions

Question 7


Refer to the exhibit. What is the minimal Cisco Meraki Insight licensing requirement?

  • A. A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B.
  • B. A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B.
  • C. A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B.
  • D. Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B.
  • E. Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B.
Answer:

E

Discussions

Question 8

What happens to an unsupervised iOS device when the “Meraki management” profile is removed?

  • A. The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed remain.
  • B. The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed are also removed.
  • C. The “Meraki management” profile is removed and then pushed automatically by Systems Manager.
  • D. The “Meraki management” profile cannot be removed.
Answer:

B

Discussions

Question 9

Which design requirement is met by implementing syslog versus SNMP?

  • A. when automation capabilities are needed
  • B. when proactive alerts for critical events must be generated
  • C. when organization-wide information must be collected
  • D. when information such as flows and client connectivity must be gathered
Answer:

D

Explanation:
Reference: https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/
Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API

Discussions

Question 10

Which type of authentication protocol is used when using OSPF on an MX appliance?

  • A. MD5
  • B. certificate
  • C. plaintext
  • D. SHA-1
Answer:

A

Explanation:
Reference: https://documentation.meraki.com/MX/Site-to-site_VPN/
Using_OSPF_to_Advertise_Remote_VPN_Subnets

Discussions
To page 2