Download Cisco Meraki Solutions Specialist.500-220.ExamTopics.2025-12-28.85q.vcex

Vendor: Cisco
Exam Code: 500-220
Exam Name: Cisco Meraki Solutions Specialist
Date: Dec 28, 2025
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Which Radio Frequency (RF) Profile setting is typically used to decrease the Service Set Identifier (SSID) overhead, exclude legacy clients, and promote more efficient client roaming?
  1. Minimum bitrate
  2. Channel width
  3. Band selection
  4. Transmit power range
Correct answer: A
Question 2
Which two limitations are addressed by the implementation of Adaptive Policy? (Choose two.)
  1. managing network policies when IP addresses are prone to changes over time
  2. applying segmentation inside a VLAN
  3. preventing the micro-segmentation of clients within the network
  4. ensuring dedicated bandwidth for specific applications
  5. implementing Quality of Service (QoS) policies within a flat Layer 2 network
Correct answer: AB
Question 3
Refer to the exhibit. After associating with the Officers SSID and receiving an IP address on the 10.0.0/8 subnet, a wireless user submitted a support ticket that they cannot access wired network resources. Which configuration will provide successful network communication?
  1. The ‘DHCP guard’ setting should be adjusted from ‘Disabled’ to ‘Enabled.’
  2. The Layer 7 firewall rules prevent wired IP traffic from being forwarded and should be disabled.
  3. An ‘Allow’ rule must be added to the Outbound rules list to connect to the necessary resources.
  4. The Layer 2 LAN isolation setting should be adjusted from ‘Disabled’ to ‘Enabled.’
Correct answer: C
Question 4
A legacy wireless client, supporting WPA2 security, cannot associate to a guest wireless network. What is the cause?
  1. The guest wireless network is configured with layer 2 LAN isolation.
  2. The guest wireless network is configured with Open (no encryption).
  3. The guest wireless network is configured with WPA3 transition mode with 802.1w set to “Enabled.”
  4. The guest wireless network is configured with Opportunistic Wireless Encryption (OWE) with 802.1w set to “Required.”
Correct answer: D
Question 5
Which technique is not a PCI requirement but is considered a best practice for limiting the cardholder data environment (CDE) from the remainder of a corporate network?
  1. Limit inbound connections to the CDE while allowing all outbound connections originating from the CDE.
  2. Establishing wired network segmentation between the CDE and the rest of the corporate network.
  3. Implementing identical firewall rules between corporate and CDE egress points.
  4. Incorporate the CDE within the corporate network's established Demilitarized Zone (DMZ).
Correct answer: B
Question 6
Which two features can be configured on a Cisco Meraki MX security appliance and on a vMX virtual instance? (Choose two.)
  1. SD-WAN policies
  2. client VPN
  3. Active Directory
  4. Layer 3 and Layer 7 firewall rules
  5. threat protection
Correct answer: AD
Question 7
Which two wireless threats can be automatically mitigated by the dedicated security radio when using Air Marshal? (Choose two.)
  1. Malicious broadcasts
  2. Packet floods
  3. Network impersonation
  4. Wired LAN compromise
  5. SSID spoofing
Correct answer: BC
Question 8
Refer to the exhibit. Meraki Insight aggregates network statistics on the MX and sends those aggregates back to the Meraki Cloud. In which three ways are aggregated statistics sent? (Choose three.)
  1. 443
  2. UDP
  3. TCP
  4. 7351
  5. SYSLOG traffic
  6. TLS-SYSLOG traffic
Correct answer: A
Question 9
Refer to the exhibit. 172.16.0.0/24 is a configured local VLAN on the Cisco Meraki MX security appliance. What happens to inbound traffic flow to the MX WAN with a destination of TCP port 1813?
  1. The traffic is forwarded to 172.16.0.30 on the WAN.
  2. The traffic is dropped on the WAN of the MX security appliance.
  3. The traffic is forwarded to 172.16.0.30 on the LAN.
  4. The traffic is dropped on the WAN of the MX security appliance due to the “any” allow remote IP rule.
Correct answer: B
Question 10
Refer to the exhibit. Which condition or conditions will cause the “All Databases & cloud services” SD-WAN traffic to be routed via a VPN tunnel on WAN2?
  1. WAN1 tunnel latency is 20 ms or more, irrespective of WAN2 tunnel performance.
  2. WAN1 tunnel latency is 20 ms or more, and WAN2 tunnel meets the configured performance criteria.
  3. WAN1 tunnel latency is 20 ms or less, irrespective of WAN2 tunnel performance.
  4. WAN1 tunnel latency is 20 ms or less, and WAN2 tunnel meets the configured performance criteria.
Correct answer: B
Question 11
What happens to an unsupervised iOS device when the “Meraki management” profile is removed?
  1. The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed remain.
  2. The “Meraki management” profile is removed. All configuration profiles that Systems Manager pushed are also removed.
  3. The “Meraki management” profile is removed and then pushed automatically by Systems Manager.
  4. The “Meraki management” profile cannot be removed.
Correct answer: A
Question 12
What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)
  1. by defining a range of serial numbers
  2. by defining the scope
  3. by using device tags
  4. by using Wi-Fi tags
  5. by using dynamic IP tags
Correct answer: BC
Question 13
Drag and drop the descriptions from the left onto the permission types on the right.
Correct answer: To work with this question, an Exam Simulator is required.
Question 14
A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?
  1. Auto VPN route 172.18.0.0/16
  2. non-Meraki VPN route 172.18.24.0/24
  3. directly connected 172.18.16.0/20
  4. static route 172.16.0.0/12
Correct answer: B
Question 15
There will be 100 concurrent users streaming video to their laptops. A 30/70 split between 2.4 Ghz and 5 Ghz will be used. Roughly how many APs (rounded to the nearest whole number) are needed based on client count?
  1. 2
  2. 3
  3. 4
  4. 5
Correct answer: B
Question 16
Refer to the exhibit. Why does the end user complain of poor wireless performance?
  1. Channel 48 utilization is at 84 percent.
  2. The client is using 20 MHz channel width to connect.
  3. Non-802.11 traffic of 18 percent indicates poor AP placement.
  4. The client is connected to the secondary radio of the AP instead of the primary radio.
Correct answer: A
Question 17
Refer to the exhibit. What is the ratio of internet-bound flows that route via WAN 1 compared with WAN 2?
  1. All flows egress via WAN 1.
  2. All flows alternate in a 1:1 ratio.
  3. All flows alternate in a 5:1 ratio.
  4. All flows alternate in a 2:1 ratio.
Correct answer: B
Question 18
The WAN connection of a Cisco Meraki MX security appliance is congested, and the MX appliance is buffering the traffic from LAN ports going to the WAN ports. High, normal, and low priority queue buffers are all full. Which proportion of the normal traffic is forwarded compared to the other queues?
  1. 4/10 packets
  2. 2/10 packets
  3. 2/7 packets
  4. 5/15 packets
Correct answer: C
Question 19
An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user’s device?
  1. Unenroll Device
  2. Clear Pushed Data
  3. Selective Wipe
  4. Erase Device
Correct answer: C
Question 20
What is the default frequency of SD-WAN probes sent between VPN peers in a Cisco Meraki MX SD-WAN deployment?
  1. 10 milliseconds
  2. 100 milliseconds
  3. 1 second
  4. 10 seconds
Correct answer: C
Question 21
Drag and drop the settings from the left onto the OS system or systems that support it on the right. Settings can be used more than once.
Correct answer: To work with this question, an Exam Simulator is required.
Question 22
Refer to the exhibit. Which two configurations are needed to successfully monitor custom applications that a user is accessing using Cisco Meraki Insight? (Choose two.)
  1. The custom application uses TLS on any ports.
  2. The custom application uses HTTP on port 8080.
  3. The custom application uses HTTPS on TCP 443.
  4. The custom application uses SMB/CIFS.
  5. The custom application uses HTTPS on port 8080.
Correct answer: BC
Question 23
Which enrollment method must be used when containerization is required on BYOD Android devices managed by Systems Manager?
  1. Systems Manager network ID
  2. Android Enterprise utilizing a Work Profile
  3. Android Business utilizing a BYOD Profile
  4. Systems Manager container ID
Correct answer: B
Question 24
What is out of scope when considering the best practices for high-density wireless designs?
  1. number of SSIDs
  2. maximum beamforming
  3. band selection
  4. minimum bitrate
Correct answer: B
Question 25
Drag and drop the steps from the left into the sequence on the right to manage device control, according to Cisco Meraki best practice.
Correct answer: To work with this question, an Exam Simulator is required.
Question 26
When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)
  1. Controller disconnection behavior
  2. Captive Portal strength
  3. Simultaneous logins
  4. Firewall & traffic shaping
  5. RADIUS for splash page settings
Correct answer: AB
Question 27
Drag and drop the settings from the left onto the available or non-available methods of applying a group policy to a Cisco Meraki MR access point on the right.
Correct answer: To work with this question, an Exam Simulator is required.
Question 28
When deploying network-wide alerts, which three active alerting techniques can be sent from the Cisco Meraki dashboard? (Choose three.)
  1. Email
  2. Event logs
  3. Change logs
  4. Webhooks
  5. Teams
  6. SMS
Correct answer: ADF
Question 29
There will be 700 concurrent users streaming video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz RF bands is expected. Using a ratio of 50 clients per AP, roughly how many (rounded to the nearest whole number) APs are needed?
  1. 6
  2. 7
  3. 9
  4. 10
Correct answer: D
Question 30
A customer needs inline traffic tagging to assign a Security Group Tag (SGT) that identifies the group from which the source traffic originates. Which feature provides this capability?
  1. Software Defined Access
  2. Rapid Threat Containment
  3. Secure Connect
  4. Adaptive Policy
Correct answer: D
Question 31
A Cisco Meraki MV camera monitors an office, and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation. Which feature in Dashboard should be used to preserve the current position of the camera while also meeting regulation requirements?
  1. area or interest
  2. zone exclusion
  3. privacy window
  4. sensor crop
Correct answer: C
Question 32
Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.
Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?
  1. The “Meraki Management” profile cannot be removed.
  2. The “Meraki Management” profile is removed and then pushed automatically by Systems Manager.
  3. The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed are also removed.
  4. The “Meraki Management” profile is removed. All the profiles Systems Manager pushed remain.
Correct answer: C
Question 33
Refer to the exhibit. This Dashboard organization uses Co-Termination licensing model.
What happens when an additional seven APs are claimed on this network without adding licenses?
  1. All APs immediately stop functioning.
  2. All network devices stop functioning in 30 days.
  3. One AP Immediately stops functioning.
  4. All APs stop functioning in 30 days.
Correct answer: B
Question 34
Which Cisco Meraki product must be deployed in addition to Systems Manager so that Systems Manager Sentry enrollment can be used?
  1. MS Switch
  2. Meraki Insight
  3. MR Access Point
  4. MV Smart Camera
Correct answer: C
Question 35
Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?
  1. highest VLAN ID that is configured and set to NO to use VPN
  2. lowest VLAN ID that is configured and set to YES to use VPN
  3. highest VLAN ID that is configured and set to YES to use VPN
  4. lowest VLAN ID configured and set to NO to use VPN
Correct answer: C
Question 36
What are two roles of the network and device tags in a Dashboard? (Choose two.)
  1. Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.
  2. Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.
  3. Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.
  4. Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.
  5. Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.
Correct answer: AC
Question 37
Which three verbs of request are available in the Cisco Meraki API? (Choose three.)
  1. SET
  2. PUT
  3. PATCH
  4. ADD
  5. POST
  6. GET
Correct answer: BEF
Question 38
Where should a network admin navigate to investigate wireless mesh information between Meraki APs?
  1. Wireless > Monitor > Access Points > AP > RF
  2. Wireless > Configure > Radio Settings
  3. Wireless > Monitor > Wireless Health
  4. Wireless > Monitor > RF Spectrum
Correct answer: A
Question 39
Which design requirement is met by implementing syslog versus SNMP?
  1. when automation capabilities are needed
  2. when proactive alerts for critical events must be generated
  3. when organization-wide information must be collected
  4. when information such as flows and client connectivity must be gathered
Correct answer: D
Question 40
Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP 10.116.32.4.
What is the next hop for the packet, based on this concentrator routing table?
  1. The concentrator gateway (10.128.124.62) is the next hop.
  2. Not enough detail is available to determine the next hop.
  3. The packet is stopped.
  4. The Auto VPN peer “Store 1532 – appliance” is the next hop.
Correct answer: D
Question 41
Refer to the exhibit. The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?
  1. Add a deny any/any firewall rule to the end of the firewall rules.
  2. Remove the connection from Internet 1.
  3. Physically disconnect all LAN ports.
  4. Configure the MX appliance to Routed mode on the Addressing & VLANS page.
Correct answer: C
Question 42
Which two actions can extend the video retention of a Cisco Meraki MV Smart Camera? (Choose two.)
  1. enabling audio compression
  2. installing an SSD memory extension
  3. enabling motion-based retention
  4. enabling maximum retention limit
  5. configuring a recording schedule
Correct answer: CE
Question 43
A new application needs to be pushed to all iOS devices. Some devices report “NotNow” in the event log and do not install the application.
What does the “NotNow” event indicate?
  1. The application requires the most recent iOS version.
  2. The device is locked with a passcode.
  3. The device cannot connect to Apple servers.
  4. The device cannot connect to Cisco Meraki servers.
Correct answer: B
Question 44
Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
  1. Wireless > Configure > Access Control
  2. Wireless > Configure > Splash page
  3. Wireless > Configure > Firewall & Traffic Shaping
  4. Wireless > Configure > SSIDs
Correct answer: A
Question 45
Which order is accurate for a firmware upgrade on MX appliances in a high-availability configuration?
  1. starts on the secondary MX appliance and then occurs on the primary MX appliance
  2. starts on both MX appliances at the same time and then reboots both appliances after traffic on the primary MX appliance ceases
  3. starts on both MX appliances at the same time and then immediately reboots both appliances
  4. starts on the primary MX appliance and then occurs on the secondary MX appliance
Correct answer: D
Question 46
Refer to the exhibit. Which IDS/IPS mode is the MX Security Appliance configured for?
  1. quarantine
  2. prevention
  3. detection
  4. blocking
Correct answer: B
Question 47
When wireless SSIDs are configured in Dashboard, which setting on the Access Control page affects the ability of a 2.4 GHz only client device from associating to the WLAN for the first time?
  1. Content filtering
  2. Bridge mode
  3. 802.11r
  4. Dual band operating with Band Steering
Correct answer: D
Question 48
Which type of authentication protocol is used when using OSPF on an MX appliance?
  1. MD5
  2. certificate
  3. plaintext
  4. SHA-1
Correct answer: A
Question 49
Which requirement is needed to implement Fast Lane on Cisco Meraki APs?
  1. wireless profile installed on an Apple iOS device
  2. wireless profile installed on a Cisco iOS access point
  3. adaptive 802.11r disabled
  4. traffic shaping rule tagging traffic with a DSCP value of 46 to Apple.com
Correct answer: A
Question 50
Air Marshal has contained a malicious SSID.
What are two effects on connectivity? (Choose two.)
  1. Currently associated clients stay connected.
  2. New clients can connect.
  3. Currently associated clients are affected by restrictive traffic shaping rules.
  4. New clients cannot connect.
  5. Currently associated clients are disconnected.
Correct answer: DE
Question 51
What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?
  1. The Dashboard generates the SAML request.
  2. The Dashboard provides user access credentials.
  3. The Dashboard parses the SAML request and authenticates users.
  4. The Dashboard generates the SAML response.
Correct answer: A
Question 52
What are two organization permission types? (Choose two.)
  1. Full
  2. Read-only
  3. Monitor-only
  4. Write
  5. Write-only
Correct answer: AB
Question 53
In an organization that uses the Co-Termination licensing model, which two operations enable licenses to be applied? (Choose two.)
  1. Renew the Dashboard license.
  2. License a network.
  3. License more devices.
  4. Call Meraki support.
  5. Wait for the devices to auto-renew.
Correct answer: AC
Question 54
For which two reasons can an organization become “Out of License”? (Choose two.)
  1. licenses that are in the wrong network
  2. more hardware devices than device licenses
  3. expired device license
  4. licenses that do not match the serial numbers in the organization
  5. MR licenses that do not match the MR models in the organization
Correct answer: BC
Question 55
What is a feature of distributed Layer 3 roaming?
  1. An MX Security Appliance is not required as a concentrator.
  2. An MX Security Appliance is required as a concentrator.
  3. All wireless client traffic can be split-tunneled.
  4. All wireless client traffic is tunneled.
Correct answer: A
Question 56
How is high-availability supported for Cisco Meraki devices?
  1. Only the MX Security Appliances that use VRRP support high availability.
  2. An active/active high-availability pair is recommended for MX Security Appliances.
  3. The MX Security Appliances and MS Series Switches that use VRRP support an active/passive high-availability pair.
  4. The MX Security Appliances and MS Series Switches that use HSRP support an active/passive high-availability pair.
Correct answer: C
Question 57
Which two Systems Manager Live tools are available only for Apple Macs and Windows PCs and cannot be used on iOS or Android mobile devices? (Choose two.)
  1. OS updates
  2. Send notification
  3. Selective wipe
  4. Screenshot
  5. Remote Desktop
Correct answer: DE
Question 58
Refer to the exhibit. During a Meraki AP deployment, the default SSID that the exhibit shows is broadcast.
What causes this behavior?
  1. An AP does not have a wired connection to the network.
  2. An AP cannot connect to the default gateway.
  3. An AP has never connected to the Meraki Cloud Controller.
  4. An AP has Site Survey mode enabled.
Correct answer: B
Question 59
Which Cisco Meraki best practice method preserves complete historical network event logs?
  1. Configuring the preserved event number to maximize logging.
  2. Configuring the preserved event period to unlimited.
  3. Configuring a syslog server for the network.
  4. Configuring Dashboard logging to preserve only certain event types.
Correct answer: C
Question 60
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
  1. intrusion prevention
  2. site-to-site VPN
  3. secondary uplinks
  4. DHCP
  5. high availability
Correct answer: AB
Question 61
A customer wants to use Microsoft Azure to host corporate application servers.
Which feature does the customer get by using a vMX appliance rather than connecting directly to Azure by VPN?
  1. malware protection
  2. SD-WAN
  3. next-generation firewall
  4. intrusion prevention
Correct answer: B
Question 62
Which API endpoint clones a new Organization?
  1. POST /organizations/clone/{organizationId}
  2. PUT /organizations/{organizationId}/clone
  3. POST /organizations/{organizationId}/new
  4. POST /organizations/{organizationId}/clone
Correct answer: D
Question 63
Drag and drop the settings from the left into the boxes on the right to indicate if the setting will be cloned or not cloned using the Cisco Meraki MS switch cloning feature.
Correct answer: To work with this question, an Exam Simulator is required.
Question 64
What occurs when a configuration change is made to an MX network that is bound to a configuration template?
  1. The configuration change in the bound network is combined with the template configuration inside the template.
  2. The more restrictive configuration is preferred.
  3. The configuration change in the bound network overrides the template configuration.
  4. The template configuration overrides the configuration change in the bound network.
Correct answer: C
Question 65
Refer to the exhibit. What does the MX Security Appliance send to determine whether VPN traffic exceeds the configured latency threshold in the VoIP custom performance class?
  1. 1000-byte TCP probes every second, through VPN tunnels that are established over the primary WAN link.
  2. 100-byte UDP probes every second, through VPN tunnels that are established over every WAN link.
  3. 100-byte UDP probes every second, through VPN tunnels that are established over the primary WAN link.
  4. 1000-byte TCP probes every second, through VPN tunnels that are established over every WAN link.
Correct answer: B
Question 66
Refer to the exhibit. What is the minimal Cisco Meraki Insight licensing requirement?
  1. A single Meraki Insight license must be configured on network A to gain Web App Health visibility on network B.
  2. A single Meraki Insight license must be configured on network B to gain Web App Health visibility on network B.
  3. A single Meraki Insight license must be configured on network A, and a single license must be configured on network B, to gain Web App Health visibility on network B.
  4. Two Meraki Insight licenses must be configured on network A to gain Web App Health visibility on network B.
  5. Two Meraki Insight licenses must be configured on network A and a single license must be configured on network B, to gain Web App Health visibility on network B.
Correct answer: B
Question 67
Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?
  1. No configuration step is necessary; automatic updating is the default behavior.
  2. Configure automatic updating of iOS devices in the Meraki installed profile.
  3. Create a security policy that enables automatic updates.
  4. Create a profile with automatic update enabled and apply it to iOS devices.
Correct answer: A
Question 68
Refer to the exhibit. Which outcome occurs when logging is set to Enabled?
  1. Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.
  2. The hits counter within this section is now enabled.
  3. This firewall rule is now enabled.
  4. Inbound flows are sent to a configured syslog server if a syslog server configured for flows.
Correct answer: A
Question 69
Refer to the exhibit. For an AP that displays this alert, which network access control method must be in use?
  1. preshared key
  2. WPA2-enterprise with my RADIUS server
  3. splash page with my RADIUS server
  4. MAC-based access control with RADIUS server
Correct answer: B
Question 70
Refer to the exhibit. What are the Loss and Average Latency statistics based on?
  1. responses that the MX appliance receives on the connectivity-testing hostnames on the Insight > Web App Health page
  2. responses that the MX appliance receives on the connectivity-testing IP addresses on the Security & SD-WAN > Firewall page
  3. responses that the MX appliance receives on the connectivity-testing IP address that is configured on the Security & SD-WAN > SD-WAN & Traffic Shaping page
  4. responses that the MX appliance receives on the connectivity-testing IP addresses on the Help > Firewall info page
Correct answer: C
Question 71
A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and 50 remote sites with a single uplink connection.
How many tunnels does each hub need to support?
  1. 52
  2. 54
  3. 100
  4. 104
Correct answer: D
Question 72
Which information is used to calculate whether a WAN link has high usage?
  1. data under Security & SD WAN > Appliance Status > Uplink > Live Data
  2. total historical throughput of an uplink
  3. total number of devices that are actively passing traffic
  4. value under Security & SD WAN > SD WAN & Traffic Shaping > Uplink Configuration
Correct answer: D
Question 73
Refer to the exhibit. Assuming this MX has established a full tunnel with its VPN peer, how will the MX route the WebEx traffic?
  1. WebEx traffic will prefer WAN 2 as long as it meets the thresholds in the “Conf” performance class.
  2. WebEx traffic will prefer WAN 1 as it is the primary uplink.
  3. WebEx traffic will prefer WAN 2 as long as it is up.
  4. WebEx traffic will be load-balanced between both active WAN links.
Correct answer: B
Question 74
A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.
Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?
  1. zone exclusion
  2. privacy window
  3. area or interest
  4. sensor crop
  5. restricted mode
Correct answer: B
Question 75
Refer to the exhibit. Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)
  1. Change the primary uplink to "none".
  2. Add an internet traffic preference that defines the load-balancing ratio as 4:1.
  3. Enable load balancing.
  4. Set the speed of the cellular uplink to zero.
  5. Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.
Correct answer: CE
Question 76
How does a Meraki device behave if cloud connectivity is temporarily lost?
  1. The offline device continues to run with its last known configuration until cloud connectivity is restored.
  2. The offline device reboots every 5 minutes until connection is restored.
  3. The offline device stops passing traffic.
  4. The offline device tries to form a connection with a local backup sever.
Correct answer: A
Question 77
Refer to the exhibit. What is an advantage of implementing inter-VLAN routing on an MX Security Appliance rather than performing inter-VLAN routing on an MS Series Switch?
  1. The MX appliance performs IDS/IPS for inter-VLAN traffic.
  2. The MX appliance performs AMP for inter-VLAN traffic.
  3. The MX appliance performs data encryption for inter-VLAN traffic.
  4. The MX appliance performs content filtering for inter-VLAN traffic.
Correct answer: A
Question 78
Drag and drop the descriptions from the left onto the corresponding MX operation mode on the right.
Correct answer: To work with this question, an Exam Simulator is required.
Question 79
Which information do the MXs in a High Availability pair share?
  1. spanning-tree state
  2. time synchronization state
  3. DHCP association database
  4. stateful firewall database
Correct answer: C
Question 80
One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.
Based on client count, how many APs (rounded to the nearest whole number) are needed?
  1. 26
  2. 28
  3. 30
  4. 32
Correct answer: B
Question 81
What are two ways peers interact with ports that Auto VPN uses? (Choose two.)
  1. For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.
  2. Peers contact the VPN registry at UDP port 9350.
  3. For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.
  4. Peers contact the VPN registry at TCP port 9350.
  5. For IPsec tunneling, peers use UDP ports 500 and 4500.
Correct answer: AB
Question 82
Refer to the exhibit. Which design recommendation should be considered?
  1. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
  2. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
  3. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
  4. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
Correct answer: C
Question 83
What is the best practice Systems Manager enrollment method when deploying corporate-owned iOS devices?
  1. manual
  2. Apple Configurator
  3. Sentry enrollment
  4. DEP
Correct answer: D
Question 84
Refer to the exhibit. What are two outcomes reflected in the Web App Health application? (Choose two.)
  1. Users on both networks may be experiencing issues when attempting to reach Google.
  2. Network #1 could not load Google because of a remote server issue.
  3. Network #2 had better application performance than Network #1.
  4. Network #2 could not load Google because of a local client misconfiguration.
  5. Neither network recorded any server-side performance issues.
Correct answer: AE
Question 85
Which two primary metrics does Meraki Insight use to calculate the Application Performance Score? (Choose two.)
  1. Maximum Jitter
  2. Total Bandwidth Usage
  3. Maximum Latency
  4. Per-flow Goodput
  5. Application Response Time
Correct answer: DE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!