Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Questions 4

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

Options:

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Buy Now
Questions 5

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

Options:

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Buy Now
Questions 6

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

Options:

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Buy Now
Questions 7

Cisco ACI fabric contains 10 standalone leaf switches. An engineer must configure only the first two leaf switches in a VPC. Which VPC protection type must be configured to accomplish goal?

Options:

A.

serial

B.

explicit

C.

reciprocal

D.

consecutive

Buy Now
Questions 8

Cisco ACI fabric must detect all silent endpoints for the Layer 3 bridge domain. Which actions accomplish this goal?

Options:

A.

Disable Unicast Routing.

Enable L2 Unknown Unicast Hardware Proxy.

B.

Disable Unicast Routing.

Enable L2 Unknown Unicast Flood.

C.

Enable Unicast Routing. Disable ARP Flooding.

D.

Enable Unicast Routing. Enable ARP Flooding.

Buy Now
Questions 9

Refer to the exhibit. An administrator configures inter-VRF route leaking between Production:vrf-prod and Non-Production:vrf-nonprod. However, the route in the Non-Production:vrf-nonprod VRF to the production tenant is missing. Which action resolves the VRF route leaking issue?

Options:

A.

Change the contract scope to Global.

B.

Enable the Shared between VRFs option for the BD subnet in the production VRF.

C.

Enable the Shared between VRFs option for the EPG subnet in the non-production VRF.

D.

Export the contract from provider to consumer tenant.

Buy Now
Questions 10

Which type of policy configures the suppression of faults that are generated from a port being down?

Options:

A.

fault lifecycle assignment

B.

event lifecycle assignment

C.

fault severity assignment

D.

event severity assignment

Buy Now
Questions 11

Refer to the exhibit.

A Cisco ACI fabric is newly deployed, and the security team requires more visibility of all inter-EPG traffic flows. All traffic in a VRF must be forwarded to an existing firewall pair. During fallover, the standby firewall must continue to use the same IP and MAC as the primary firewall. Drag and drop the steps from the left Into the Implementation order on the right to configure the service graph that meets the requirements. (Not all steps are used.)

Options:

Buy Now
Questions 12

An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a Cisco ACI fabric. Which action must be taken to receive the required messages?

Options:

A.

Add Faults and Events to the monitor policy.

B.

Add Session Logs and Audit Logs to the monitor policy.

C.

Include Audit Logs and Events in the Syslog source policy.

D.

Include Events and Session Logs in the Syslog source policy.

Buy Now
Questions 13

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

Options:

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Buy Now
Questions 14

What does a bridge domain represent?

Options:

A.

Layer 3 cloud

B.

Layer 2 forwarding construct

C.

tenant

D.

physical domain

Buy Now
Questions 15

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 16

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Buy Now
Questions 17

What are two descriptions of ACI multi-site? (Choose two.)

Options:

A.

The Inter-Site network routers should run OSPF to establish peering with the spines.

B.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

C.

Routers in the inter-Site network must run OSPF. DHCP relay, and MP-BGP

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites

E.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site

Buy Now
Questions 18

Which two hardware models are supported as fixed spine in Cisco ACI fabrics? (Choose two.)

Options:

A.

Cisco Nexus 9508

B.

Cisco Nexus 9236C

C.

Cisco Nexus 9364C

D.

Cisco Nexus 9336C-FX2

E.

Cisco Nexus 9332C

Buy Now
Questions 19

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

Options:

A.

Enable the BPDU interface controls under the spanning tree interface policy.

B.

Configure a new STP interface policy.

C.

Bind the spanning tree policy to the switch policy group.

D.

Associate the STP interface policy to the appropriate interface policy group.

E.

Create a new region policy under the spanning tree policy.

F.

Map VLAN range to MAT instance number.

Buy Now
Questions 20

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

Options:

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Buy Now
Questions 21

Refer to the exhibit.

An engineer is implementing Cisco ACI – VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in “route based on originating virtual port” on the VMware VDS?

Options:

A.

Static Channel – Mode On

B.

MAC Pinning-Physical-NIC-load

C.

LACP Passive

D.

MAC Pinning+

E.

LACP Active

Buy Now
Questions 22

Refer to the exhibit. A client is configuring a new Cisco ACI fabric. All VLANs will be extended during the migration phase using the VPC connections on leaf switches 3. 4 and leaf switches toward the legacy network. The migration phase has these requirements;

* If The legacy switches must be able to transfer BPDUs through the ACI fabric.

* If the legacy switches fail to break a loop. Cisco ACI must break the loop.

Which group settings must be configured on VPC interface policy groups ipg_vpc-legacy_1 and ipg_vpc-legacy_2 to meet these requirements?

Options:

A.

MCP: enabled

BPDU Guard: enabled

BPDU Filter: disabled

B.

MCP: enabled

BPDU Guard: disabled

BPDU Filter: disabled

C.

MCP: disabled

BPDU Guard: disabled

BPDU Filter: enabled

D.

MCP: disabled

BPDU Guard: enabled

BPDU Filter enable

Buy Now
Questions 23

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

Options:

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

Buy Now
Questions 24

An engineer implements a configuration backup on the Cisco APIC. The backup job must meet these requirements:

• The backup must transfer the encrypted data to the remote server.

• The transfer must be resumed if the connection is interrupted.

Which configuration set meets these requirements?

Options:

A.

Select protocol HTTP in Create Remote Location. Choose JSON format in Configuration Export Policy.

B.

Select protocol TFTP in Create Remote Location. Choose JSON format in Configuration Export Policy

C.

Select protocol FTP in Create Remote Location. Choose XML format in Configuration Export Policy.

D.

Select protocol SFTP in Create Remote Location. Choose XML format in Configuration Export Policy.

Buy Now
Questions 25

Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from

being learned by the fabric?

Options:

A.

enable Limit IP Learning to Subnet

B.

enable Unicast Routing

C.

enable IP Data-plane Learning

D.

enable ARP Flooding to BD

Buy Now
Questions 26

Where are STP BPDUSs flooded in Cisco ACI fabric?

Options:

A.

in the access encapsulation VLAN part of different VLAN pools

B.

in the bridge domain VLAN

C.

in the native VLAN ID

D.

in the VNID that is assigned to the FD VLAN

Buy Now
Questions 27

A bridge domain for a new endpoint group in the Cisco ACI fabric must meet these requirements:

The bridge domain must function as the default gateway for the subnet so that routing remains within the Cisco ACI fabric.

ARP requests must be managed via Layer 3 unicast packets or be dropped to reduce excessive broadcast traffic.

The impact of misconfigured virtual machines must be kept to a minimum by preventing IP addresses outside of the configured subnet from being routed.

Which set of actions must be taken?

Options:

A.

Disable ARP Flooding.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

B.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set Multi-Destination Flooding to Flood in BD.

C.

Set Endpoint Retention Policy to default.

Enable ARP Flooding.

Enable Unicast Routing on the bridge domain and configure a subnet.

D.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set L2 Unknown Unicast to Flood.

Disable Endpoint Retention Policy.

Buy Now
Questions 28

Refer to the exhibit. An engineer must disable the communication between the two backup servers in the backup EPG. Which action accomplishes this goal?

Options:

A.

Set Preferred Group Member to Excluded.

B.

Set the physical domain to None.

C.

Set a different static binding for the encap VLAN.

D.

Set Intra EPG Isolation to Enforced.

Buy Now
Questions 29

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Options:

A.

Change the switch APIC Connectivity Preference to in-band management

B.

Remove the in-band management address from the APIC.

C.

Add a Fabric Access Policy to allow management connections.

D.

Modify the Pod Profile to use the default Management Access Policy

Buy Now
Questions 30

An ACI engineer is implementing a Layer 3 out inside the Cisco ACI fabric that must meet these requirements:

    The data center core switch must be connected to one of the leaf switches with a single 1G link.

    The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.

    The data center core switch interface must be using 802.1Q tagging, and each vlan will be configured with a dedicated IP address.

Which set of steps accomplishes these goals?

Options:

A.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Set up the Routed External Network object ana Node Profile, selecting ElGRP Create the Switch profile, selecting Port-channel and the appropriate interfaces Create the default network and associate it with the Routed Outside object.

B.

Set up the BGP Protocol policy with the Autonomous System number of 0.

Configure an interface policy and an External Bridged Domain.

Create an External Bridged Network using the configured VLAN pool.

Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.

C.

Configure the OSPF Protocol policy with an area of 0.

Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol. Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN. Configure the External Network object with a network of 0.0.0.0/0.

D.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile selecting ElGRP Configure the Interface profile selecting Routed Interface and the appropriate interfaces. Create the External Network object with a network of 0.0.0.0/0.

Buy Now
Questions 31

Cisco ACI fabric is integrated with a VMware environment. The engineer must back up the current configuration of the fabric and restore the vCenter password when the configuration is ... Which action accomplishes this goal?

Options:

A.

Select SCP protocol for the remote location.

B.

Create a Configuration Import Policy.

C.

Enable the Global AES Encryption setting.

D.

Set the Authentication type to Use Password.

Buy Now
Questions 32

What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination

endpoint?

Options:

A.

The leaf switch does not learn the source endpoint through data plane learning.

B.

The leaf switch drops the traffic that is destined to the endpoint.

C.

The leaf switch floods the traffic to the endpoint throughout the fabric.

D.

The leaf switch sends the traffic to the wrong destination leaf.

Buy Now
Questions 33

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

Options:

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Buy Now
Questions 34

What is the name of the automatically configured VLAN 3600 presented during Cisco ACI fabric discovery?

Options:

A.

Transit VLAN

B.

Infrastructure VLAN

C.

Loopback VLAN

D.

Fabric VLAN

Buy Now
Questions 35

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

Options:

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Buy Now
Questions 36

An engineer discovered an outage on the mgmt0 port of Leaf113 and Leaf114. Both leaf switches were recently registered in the fabric and have health scores of 100. The engineer overs there is no IP address assigned to the mgmt0 interface of the switches. Which action resolves the outage?

Options:

A.

Statically bind the mgmt0 interface of Leaf113 and Leaf114 to the oob-default EPG.

B.

Enable Leaf 113 and Leaf 114 mgmt0 under the leaf switch.

C.

Associate the oobbrc-default contract to Leaf113 and Leaf114.

D.

Add Leaf113 and Leaf114 to the node management address policy.

Buy Now
Questions 37

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

Options:

A.

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

Buy Now
Questions 38

An Cisco ACI leaf switch learns the source IP address of a packet that enters the front panel port of the switch. Which bridge domain setting is used?

Options:

A.

Unicast Routing

B.

L3 Unknown Multicast Flooding - Flood

C.

ARP Flooding

D.

Unknown Unicast - Hardware proxy

Buy Now
Questions 39

How many ARP requests are sent from leaf switches to perform host tracking for local endpoints?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 40

What must be configured to allow SNMP traffic on the APIC controller?

Options:

A.

out-of-band management interface

B.

contract under tenant mgmt

C.

SNMP relay policy

D.

out-of-band bridge domain

Buy Now
Questions 41

Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)

Options:

A.

iBGP

B.

VXLAN

C.

IS-IS

D.

RIPv2

E.

eBGP

Buy Now
Questions 42

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 43

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

Options:

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Buy Now
Questions 44

Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

Options:

A.

“Limit IP learning to network” setting within the bridge domain.

B.

“Limit IP learning to subnet” setting within the EPG.

C.

“Limit IP learning to network” setting within the EPG.

D.

“Limit IP learning to subnet” setting within the bridge domain.

Buy Now
Questions 45

Which description regarding the initial APIC cluster discovery process is true?

Options:

A.

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.

Every switch is assigned a unique AV by the APIC.

C.

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.

The ACI fabric is discovered starting with the spine switches.

Buy Now
Questions 46

Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.

Options:

Buy Now
Questions 47

Regarding the MTU value of MP-BGP EVPN control plane packets in Cisco ACI, which statement about communication between spine nodes in different sites is true?

Options:

A.

By default, spine nodes generate 9000-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 9000-bytes packets.

B.

By default, spine nodes generate 1500-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 1800-bytes packets.

C.

By default, spine nodes generate 1500-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 1500-bytes packets.

D.

By default, spine nodes generate 9000-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 9100-bytes packets.

Buy Now
Questions 48

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

Options:

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Buy Now
Questions 49

Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

Options:

A.

The source MAC and IP address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

No source MAC or IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a remote endpoint.

Buy Now
Questions 50

What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

Options:

A.

L2 unknown unicast: flood

B.

GARP based detection

C.

unicast routing

D.

subnet scope

Buy Now
Questions 51

Cisco ACI fabric has three different endpoints S1, S2. and S3. These endpoints must communicate with each other without contracts. These objects have been created in APIC:

•Two EPGs named DNS_EPG and Database_EPG

•Two application profiles. PROD_App and Data_App

•Two bridge domains DNS_BD and Database_BD

•PROD_APP and Database_BD mapped to Tenant PROD

•Data_App and DNS_BD mapped to Tenant Data

Which set of actions completes the fabric configuration?

Options:

A.

Add S1, S2, S3 under Database_EPG.

MAP Database_EPG under PROD_ App.

Associate Datbase_EPG with DNS_BD.

B.

Add S1, S2, S3, under DNS_EPG.

MAP DNS_EPG to Data_App.

Associate DNS_EPG with Dns_BD.

C.

Add S1, S2, S3 under DNS_EPG.

MAP DNS_EPG to Data_App.

Associate DNS_EPG with Database_BD.

D.

Add S1, S2, S3 under Database_EPG.

MAP Database_EPG under Data_App.

Associate Datbase_EPG with Database_BD.

Buy Now
Questions 52

What is a requirement for Cisco ACI IPN to manage multidestination traffic?

Options:

A.

pervasive gateway

B.

unicast routing

C.

anycast gateway

D.

multicast routing

Buy Now
Questions 53

A Cisco ACI fabric is integrated with a Cisco ASA firewall using a service graph under the tenant called Operations. The fabric must permit the firewall used on tenant Operations to be referenced by the tenant called Management. Which export action must be used to accomplish this goal?

Options:

A.

Layer4-Layer7 device

B.

router configurations

C.

service graph template

D.

device selection policies

Buy Now
Questions 54

In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

Options:

A.

Endpoint information is not exchanged across sites unless COOP protocol is used.

B.

Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.

C.

Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.

D.

Endpoint information is exchanged across sites when the endpoints are discovered in both sites.

Buy Now
Questions 55

An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy?

Options:

A.

LACP Active

B.

MAC Pinning

C.

LACP Passive

D.

MAC Pinning-Physical-NIC-load

Buy Now
Questions 56

An engineer must limit management access to me Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

Options:

A.

policy In the management tenant

B.

policy on the management VLAN

C.

ACL on the management interface of the APIC

D.

ACL on the console interface

Buy Now
Questions 57

Which class of ACI object is presented in this output?

Options:

A.

Contract

B.

Bridge Domain

C.

Tenant

D.

Endpoint

Buy Now
Questions 58

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

Options:

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Buy Now
Questions 59

Where is the COOP database located?

Options:

A.

leaf

B.

spine

C.

APIC

D.

endpoint

Buy Now
Questions 60

What represents the unique identifier of an ACI object?

Options:

A.

universal resource identifier (URI)

B.

application programming interface

C.

management information tree

D.

distinguished name

Buy Now
Questions 61

Refer to the exhibit. A company merges three of its departments: CORP, HR, and SERVICES, Currently, the connectivity between departments is achieved by using VRF route leaking. The requirement is to redesign the Cisco ACI networking architecture to communicate between EPGs and BDs from any tenant without configuring contracts or VRF route leaking. Which configuration meets these criteria?

Options:

A.

Configure an unenforced VRF in the user tenant and map all required EPGs to it.

B.

Implement an enforced VRF in the common tenant and map all required BDs to it.

C.

Configure an enforced VRF in the user tenant and map all required EPGs to it.

D.

Implement an unenforced VRF in the common tenant and map all required BDs to it.

Buy Now
Questions 62

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

Options:

A.

access policy

B.

infra tenant

C.

switch profile

D.

fabric policy

Buy Now
Questions 63

A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

Options:

A.

tenant

B.

security domain

C.

primary Cisco APIC

D.

managed object class

Buy Now
Questions 64

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

Options:

A.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Buy Now
Questions 65

A network administrator configures AAA inside the Cisco ACI fabric. The authentication goes through the local users if the TACACS+ server is not reachable. If the Cisco APIC is out of the cluster, the access must be granted through the fallback domain. Which configuration set meets these requirements?

Options:

A.

Ping Check: True

Default Authentication Realm: Local

Fallback Check: True

B.

Ping Check: True

Default Authentication Realm: TACACS+

Fallback Check: False

C.

Ping Check: False

Default Authentication Realm: Local

Fallback Check: False

D.

Ping Check: False

Default Authentication Realm: TACACS+

Fallback Check: True

Buy Now
Questions 66

What is the result of selecting the On Demand attribute in the Deploy Immediacy feature during VMM domain association to an EPG?

Options:

A.

The EPG policy is downloaded to the leaf when a hypervisor is connected, and a VM is placed in a port group.

B.

The EPG policy is programmed in the hardware policy CAM only when the first packet is received through the data path.

C.

The EPG policy is programmed in the hardware policy CAM as soon as the policy is downloaded in the leaf software.

D.

The EPG policy is downloaded to the leaf when a hypervisor is attached to a DVS. and CDP or LLDP adjacency is formed.

Buy Now
Questions 67

Refer to the exhibit. Server A is connected to the Cisco ACI fabric using two teamed interfaces. One interface in a team is configured as active and the other remains in standby mode. When a failover occurs and the standby interface becomes active, it uses its built-in MAC address to send traffic. Which bridge domain configuration must be applied to resolve the issue?

Options:

A.

Configure Hardware proxy.

B.

Set L2 Unknown Unicast to Flood.

C.

Enable ARP flooding.

D.

Activate Limit IP Learning to Subnet.

Buy Now
Questions 68

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

Options:

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

Buy Now
Questions 69

Refer to the exhibit. A company decided to decrease its routing footprint and remove RT-2 and RT-3 devices from its data center. Because of that, the exit point must be created from all the tenants by using the common tenant. Which two configuration tasks must be completed to meet these requirements? (Choose two.)

Options:

A.

Move subnets from all the bridge domains to the EPG level and mark them with flag Shared between VRFs.

B.

Update the L3Out ExtEPG subnet in the common tenant with flag Shared Route Control Subnet and Aggregate Shared Routes.

C.

Mark all subnets with flag Shared between VRFs and attach contract Ctr-3 as a provider to all the EPGs.

D.

Change contract Ctr-3 scope to Global, consume it by all EPGs, and flag all subnets with flag Shared between VRFs.

E.

Export contract Ctr-2 into the tenant TN-1 and attach it as a consumer to all the EPGs in the tenant TN-1.

Buy Now
Questions 70

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 71

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

Options:

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Buy Now
Questions 72

When Layer 3 routed traffic is destined to a Cisco ACI fabric, which mechanism does ACI use to detect silent hosts?

Options:

A.

gratuitous ARP

B.

inverse ARP

C.

ARP gleaning

D.

proxy ARP

Buy Now
Questions 73

An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 74

Refer to the exhibit.

Which two objects are created as a result of the configuration? (Choose two.)

Options:

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Buy Now
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (300-620 DCACI)
Last Update: Jun 15, 2025
Questions: 247
300-620 pdf

300-620 PDF

$33.25  $94.99
300-620 Engine

300-620 Testing Engine

$38.5  $109.99
300-620 PDF + Engine

300-620 PDF + Testing Engine

$50.75  $144.99