Free 500-220 Exam Braindumps (page: 8)

Page 8 of 19

What are two organization permission types? (Choose two.)

  1. Full
  2. Read-only
  3. Monitor-only
  4. Write
  5. Write-only

Answer(s): A,B


Reference:

https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/ Managing_Dashboard_Administrators_and_Permissions



Refer to the exhibit.



Which design recommendation should be considered?

  1. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1- hop maximum.
  2. A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2- hop maximum.
  3. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1- hop maximum.
  4. A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2- hop maximum.

Answer(s): C

Explanation:

https://documentation.meraki.com/MR/Deployment_Guides/Mesh_Deployment_Guide There will be a throughput reduction (~50% reduction) with each "hop" in a mesh. It is recommended that a mesh network be designed for no more than one mesh hop from the gateway to client device.



What are two roles of the network and device tags in a Dashboard? (Choose two.)

  1. Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.
  2. Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.
  3. Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.
  4. Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.
  5. Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.

Answer(s): A,C

Explanation:

See Permissions by Network Tag section To simplify the assignment of network-level permissions in an organization with many networks, permissions can be granted to users for a given network tag. https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Managi ng_Dashboard_Administrators_and_Permissions

The Organization > Configure > Manage Tags page allows Administrators to configure a combination of Network and Device specific tags to create Summary Reports filtered for specific devices across multiple networks.
https://documentation.meraki.com/General_Administration/Organizations_and_Networks/Organiza tion_Menu/Manage_Tags



Refer to the exhibit.



Which outcome occurs when logging is set to Enabled?

  1. Outbound flows are sent to a configured syslog server if a syslog sender is configured for flows.
  2. The hits counter within this section is now enabled.
  3. This firewall rule is now enabled.
  4. Inbound flows are sent to a configured syslog server if a syslog server configured for flows.

Answer(s): A

Explanation:

"Inbound and outbound flows will generate a syslog message showing the source and destination along with port numbers and the firewall rule that they matched. For inbound rules, 1=deny and 0=allow."
https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Syslog_Ser ver_Overview_and_Configuration



Page 8 of 19



Post your Comments and Discuss Cisco® 500-220 exam with other Community members:

Pierre commented on August 01, 2022
The study product is well formatted and very useful. I recommend.
FRANCE
upvote