Pass the Cisco Cisco Meraki Solutions Specialist 500-220 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Refer to the exhibit.

Question # 11

A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.

What is the next hop for the packet, based on this concentrator routing table?

Options:

A.

The concentrator gateway (10.128.124.62) is the next hop.


B.

Not enough detail is available to determine the next hop.


C.

The packet is stopped.


D.

The Auto VPN peer “Store 1532 – appliance” is the next hop.


Expert Solution
Questions # 12:

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?

Options:

A.

Erase Device


B.

Clear Pushed Data


C.

Unenroll Device


D.

Selective Wipe


Expert Solution
Questions # 13:

Which two actions can extend the video retention of a Cisco Meraki MV Smart Camera? (Choose two.)

Options:

A.

enabling audio compression


B.

installing an SSD memory extension


C.

enabling motion-based retention


D.

enabling maximum retention limit


E.

configuring a recording schedule


Expert Solution
Questions # 14:

Refer to the exhibit.

Question # 14

Which outcome occurs when logging is set to Enabled?

Options:

A.

Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.


B.

The hits counter within this section is now enabled.


C.

This firewall rule is now enabled.


D.

Inbound flows are sent to a configured syslog server if a syslog server configured for flows.


Expert Solution
Questions # 15:

For which two reasons can an organization become “Out of License”? (Choose two.)

Options:

A.

licenses that are in the wrong network


B.

more hardware devices than device licenses


C.

expired device license


D.

licenses that do not match the serial numbers in the organization


E.

MR licenses that do not match the MR models in the organization


Expert Solution
Questions # 16:

What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)

Options:

A.

by using Wi-Fi tags


B.

by defining the scope


C.

by defining a range of serial numbers


D.

by using device tags


E.

by using dynamic IP tags


Expert Solution
Questions # 17:

The WAN connection of a Cisco Meraki MX security appliance is congested, and the MX appliance is buffering the traffic from LAN ports going to the WAN ports. High, normal, and low priority queue buffers are all full. Which proportion of the normal traffic is forwarded compared to the other queues?

Options:

A.

4/10 packets


B.

2/7 packets


C.

2/10 packets


D.

5/15 packets


Expert Solution
Questions # 18:

Which type of authentication protocol is used when using OSPF on an MX appliance?

Options:

A.

MD5


B.

certificate


C.

plaintext


D.

SHA-1


Expert Solution
Questions # 19:

Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?

Options:

A.

highest VLAN ID that is configured and set to NO to use VPN


B.

lowest VLAN ID that is configured and set to YES to use VPN


C.

highest VLAN ID that is configured and set to YES to use VPN


D.

lowest VLAN ID configured and set to NO to use VPN


Expert Solution
Questions # 20:

There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?

Options:

A.

2


B.

3


C.

4


D.

5


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions