Go Back on 500-220 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

500-220 Practice Test


Page 1 out of 12 Pages

Which design requirement is met by implementing syslog versus SNMP?


A.

when automation capabilities are needed


B.

when proactive alerts for critical events must be generated


C.

when organization-wide information must be collected


D.

when information such as flows and client connectivity must be gathered





D.
  

when information such as flows and client connectivity must be gathered



Reference:
https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/
Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)


A.

Controller disconnection behavior


B.

Captive Portal strength


C.

Simultaneous logins


D.

Firewall & traffic shaping


E.

RADIUS for splash page settings





A.
  

Controller disconnection behavior



B.
  

Captive Portal strength



Reference: https://documentation.meraki.com/MR/Access_Control

For which two reasons can an organization become “Out of License”? (Choose two.)


A.

licenses that are in the wrong network


B.

more hardware devices than device licenses


C.

expired device license


D.

licenses that do not match the serial numbers in the organization


E.

MR licenses that do not match the MR models in the organization





B.
  

more hardware devices than device licenses



C.
  

expired device license



Reference:
https://documentation.meraki.com/General_Administration/Licensing/Meraki_Licensing_FA
Qs

Refer to the exhibit.

For an AP that displays this alert, which network access control method must be in use?


A.

preshared key


B.

WPA2-enterprise with my RADIUS server


C.

splash page with my RADIUS server


D.

MAC-based access control with RADIUS server





A.
  

preshared key



Which type of authentication protocol is used when using OSPF on an MX appliance?


A.

MD5


B.

certificate


C.

plaintext


D.

SHA-1





A.
  

MD5



Reference: https://documentation.meraki.com/MX/Site-to-site_VPN/
Using_OSPF_to_Advertise_Remote_VPN_Subnets


Page 1 out of 12 Pages