Cisco® 500-220 Exam Practice Questions (P. 3)
- Full Access (72 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11

Refer to the exhibit. Which design recommendation should be considered?
- AA 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.
- BA 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
- CA 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.Most Voted
- DA 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.
Correct Answer:
A
A
send
light_mode
delete
Question #12
Which two features and functions are supported when using an MX appliance in Passthrough mode? (Choose two.)
- Aintrusion prevention
- Bsite-to-site VPNMost Voted
- Csecondary uplinks
- DDHCP
- Ehigh availabilityMost Voted
Correct Answer:
AB
AB

Absolutely, intrusion prevention and site-to-site VPN are both supported in Passthrough mode on an MX appliance. This configuration allows the MX to engage in robust security practices like intrusion prevention while also handling VPN traffic efficiently. Passthrough mode essentially enables the MX to effectively manage and protect network traffic without the complexities of full routing capabilities, which is key for maintaining streamlined and secure network operations.
send
light_mode
delete
Question #13
What are two ways peers interact with ports that Auto VPN uses? (Choose two.)
- AFor IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.Most Voted
- BPeers contact the VPN registry at UDP port 9350.Most Voted
- CFor IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.
- DPeers contact the VPN registry at TCP port 9350.
- EFor IPsec tunneling, peers use UDP ports 500 and 4500.
Correct Answer:
BC
BC

The correct answers involve the use of UDP for both contacting the VPN registry and for IPsec tunneling. For VPN registry interaction, the destination UDP port specifically used is 9350. For IPsec tunneling, the process utilizes source and destination UDP ports in the range of 32768 to 61000, indicating a higher range of ports in use for secure tunneling connections. This is backed by documentation from Cisco Meraki, underscoring the importance of understanding port usage for network setups involving Auto VPN. Thus, both implementing and troubleshooting VPN configurations rely on this knowledge for optimal performance and security.
send
light_mode
delete
Question #14
One thousand concurrent users stream video to their laptops. A 30/70 split between 2.4 GHz and 5 GHz is used.
Based on client count, how many APs (rounded to the nearest whole number) are needed?
Based on client count, how many APs (rounded to the nearest whole number) are needed?
- A26
- B28Most Voted
- C30
- D32
Correct Answer:
C
C

Great catch on the calculations provided by the users. It does seem like 28 APs would efficiently handle the load given that an AP can support 25 concurrent 5GHz users, which better matches the breakdown of clients between 2.4GHz and 5GHz frequencies detailed in the Meraki documentation and user calculations. We should always cross-reference the resource capacity with the total demand to come to the right conclusion.
send
light_mode
delete
Question #15
What is the best practice Systems Manager enrollment method when deploying corporate-owned iOS devices?
- Amanual
- BApple Configurator
- CSentry enrollment
- DDEPMost Voted
Correct Answer:
B
B

For deploying corporate-owned iOS devices, Apple Configurator is indeed recommended as the best practice for Systems Manager enrollment. This method allows more granular control during initial device setup. Through Apple Configurator, you can also integrate devices into the Device Enrollment Program (DEP), streamline wireless settings, and ensure that the devices are managed effectively from the start. By using Apple Configurator, administrators can ensure that devices conform to organizational policies right out of the box, simplifying both setup and ongoing management.
send
light_mode
delete
All Pages