L4P Flashcards

1
Q

Which Cisco Meraki product must be deployed in addition to Systems Manager so that Systems Manager Sentry
enrollment can be used?
A. MS Switch
B. Meraki Insight
C. MR Access Point
D. MV Smart Camera

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for
unauthenticated clients to have full network access and not be allow listed? (Choose two.)
A. Controller disconnection behavior
B. Captive Portal strength
C. Simultaneous logins
D. Firewall and traffic shaping
E. RADIUS for splash page settings

A

Correct Answer: AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Meraki Dashboard menu section is accessed to enable Sentry enrollment on an SSID?
A. Wireless > Configure > Access Control
B. Wireless > Configure > Splash page
C. Wireless > Configure > Firewall and Traffic Shaping
D. Wireless > Configure > SSIDs

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which API endpoint clones a new Organization?
A. POST /organizations/clone/{organizationId}
B. PUT /organizations/{organizationId}/clone
C. POST /organizations/{organizationId}/new
D. POST /organizations/{organizationId}/clone

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. A packet arrives on the VPN concentrator with source IP 10.168.70.3 and destined for IP
10.116.32.4. What is the next hop for the packet, based on this concentrator routing table?

A. The concentrator gateway (10.128.124.62) is the next hop.
B. Not enough detail is available to determine the next hop.
C. The packet is stopped.
D. The Auto VPN peer “Store 1532 ?appliance” is the next hop

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

https://www.lead4pass.com/500-220.html
2021 Latest lead4pass 500-220 PDF and VCE dumps DownloadRefer to the exhibit. What are the Loss and Average Latency statistics based on?
A. responses that the MX appliance receives on the connectivity-testing hostnames on the Insight > Web App Health
page
B. responses that the MX appliance receives on the connectivity-testing IP addresses on the Security and SD-WAN >
Firewall page
C. responses that the MX appliance receives on the connectivity-testing IP address that is configured on the Security
and SD-WAN > SD-WAN and Traffic Shaping page
D. responses that the MX appliance receives on the connectivity-testing IP addresses on the Help > Firewall info page

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit. For an AP that displays this alert, which network access control method must be in use?
A. preshared key
B. WPA2-enterprise with my RADIUS server
C. splash page with my RADIUS server
D. MAC-based access control with RADIUS server

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used. Based
on client count, how many APs (rounded to the nearest whole number) are needed?

A. 26
B. 28
C. 30
D. 32

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which design requirement is met by implementing syslog versus SNMP?
A. when automation capabilities are needed
B. when proactive alerts for critical events must be generated
C. when organization-wide information must be collected
D. when information such as flows and client connectivity must be gathered

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which three verbs of request are available in the Cisco Meraki API? (Choose three.)
A. SET
B. PUT
C. PATCH
D. ADD
E. POST
F. GET

A

Correct Answer: BEF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What occurs when a configuration change is made to an MX network that is bound to a configuration template?
A. The configuration change in the bound network is combined with the template configuration inside the template.
B. The more restrictive configuration is preferred.
C. The configuration change in the bound network overrides the template configuration.
D. The template configuration overrides the configuration change in the bound network

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit. During a Meraki AP deployment, the default SSID that the exhibit shows is broadcast. What causes
this behavior?

A. An AP does not have a wired connection to the network.
B. An AP cannot connect to the default gateway.
C. An AP has never connected to the Meraki Cloud Controller.
D. An AP has Site Survey mode enabled

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a Meraki device behave if cloud connectivity is temporarily lost?

A. The offline device continues to run with its last known configuration until cloud connectivity is restored.
B. The offline device reboots every 5 minutes until connection is restored.
C. The offline device stops passing traffic.
D. The offline device tries to form a connection with a local backup sever.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A customer wants to use Microsoft Azure to host corporate application servers.
Which feature does the customer get by using a vMX appliance rather than connecting directly to Azure by VPN

A. malware protection
B. SD-WAN
C. next-generation firewall
D. intrusion prevention

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A customer requires a hub-and-spoke Auto VPN deployment with two NAT-mode hubs with dual uplink connections and
50 remote sites with a single uplink connection. How many tunnels does each hub need to support?
A. 52
B. 54
C. 100
D. 104

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Cisco Meraki best practice method preserves complete historical network event logs?
Options:
A. Configuring the preserved event number to maximize logging.
B. Configuring the preserved event period to unlimited.
C. Configuring a syslog server for the network.
D. Configuring Dashboard logging to preserve only certain event types

A

Answer: A

17
Q

Which design requirement is met by implementing syslog versus SNMP?
Options:
A. when automation capabilities are needed
B. when proactive alerts for critical events must be generated
C. when organization-wide information must be collected
D. when information such as flows and client connectivity must be gathered

A

Answer: D

18
Q

Refer to the exhibit. The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?

A. Add a deny any/any firewall rule to the end of the firewall rules.
B. Remove the connection from Internet 1.
C. Physically disconnect all LAN ports.
D. Configure the MX appliance to Routed mode on the Addressing & VLANS page.

A

Answer: C

19
Q

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through
Systems Manager.

Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?
Options:
A. The “Meraki Management” profile cannot be removed.
B. The “Meraki Management” profile is removed and then pushed automatically by Systems
Manager.
C. The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed
are also
removed.
D. The “Meraki Management” profile is removed. All the profiles Systems Manager pushed
remain.

A

Answer: C