Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Questions 4

Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

Options:

A.

VMM domain profile

B.

EPG static port binding

C.

Layer 3 outside interface association

D.

IP address pool association

E.

EPG association

Buy Now
Questions 5

Refer to the exhibit. An engineer connects a Cisco ACI fabric to two different Cisco Nexus 9000 Series Switches. The fabric must be configured to ensure a loop-free topology and N9K1 be configured as the root bridge for VLAN 10. Which action meets these requirements?

Options:

A.

Enable STP on ports between the leaf and spine.

B.

Activate MCP on ports between the leaf and Nexus 9000 Series Switches.

C.

Enable Cisco Discovery Protocol on ports between the leaf and spine.

D.

Set BPDU Guard on ports between the leaf and Nexus 9000 Series Switches.

Buy Now
Questions 6

Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

Options:

A.

The source MAC and IP address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

No source MAC or IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a remote endpoint.

Buy Now
Questions 7

An engineer must advertise a bridge domain subnet out of the ACI fabric to an OSPF neighbor. Which two configuration steps are required? (Choose two.)

Options:

A.

Configure Subnet scope to Advertised Externally

B.

Add External Subnet for External EPG flag under External EPG.

C.

Create Route Control Profile with the export direction under External EPG.

D.

Add L30ut profile to the bridge domain using Associated L30uts section

E.

Configure the Subnet under the EPG level.

Buy Now
Questions 8

When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

Options:

A.

all leaf switches and all spine nodes

B.

only spine switches where the bridge domain of the tenant is present

C.

only leaf switches where the bridge domain of the tenant is present

D.

all border leaf nodes where the bridge domain of the tenant is present

Buy Now
Questions 9

Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

Options:

A.

“Limit IP learning to network” setting within the bridge domain.

B.

“Limit IP learning to subnet” setting within the EPG.

C.

“Limit IP learning to network” setting within the EPG.

D.

“Limit IP learning to subnet” setting within the bridge domain.

Buy Now
Questions 10

Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

Options:

A.

vzAny contracts

B.

standard contracts

C.

application EPGs

D.

uSeg EPGs

Buy Now
Questions 11

How many ARP requests are sent from leaf switches to perform host tracking for local endpoints?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 12

In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

Options:

A.

Endpoint information is not exchanged across sites unless COOP protocol is used.

B.

Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.

C.

Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.

D.

Endpoint information is exchanged across sites when the endpoints are discovered in both sites.

Buy Now
Questions 13

An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

Options:

A.

merge

B.

atomic

C.

best effort

D.

replace

Buy Now
Questions 14

A Cisco ACI environment consists of multiple silent hosts that are often relocated between leaf switches. When the host is relocated, the bridge domain takes more than a few seconds to relearn the host’s new location. The requirement is to minimize the relocation impact and make the ACI fabric relearn the new location of the host faster. Which action must be taken to meet these requirements?

Options:

A.

Set Unicast Routing to Enabled.

B.

Configure ARP Flooding to Enabled.

C.

Set L2 Unknown Unicast to Hardware Proxy.

D.

Configure IP Data-Plane Learning to No.

Buy Now
Questions 15

An engineer must configure a service graph for the policy-based redirect to redirect traffic to a transparent firewall. The policy must be vendor-agnostic to support any firewall appliance, Which two actions accomplish these goals? (Choose two.)

Options:

A.

Set the Service Type to Other.

B.

Set Promiscuous Mode to True.

C.

Set Function Type to L2.

D.

Set Managed to True.

E.

Set Context Aware to Single.

Buy Now
Questions 16

Refer to the exhibit. The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?

Options:

A.

Export Route Control Subnet

Import Route Control Subnet

Aggregate Shared Routes

B.

External Subnets for External EPG

Shared Route Control Subnet

Shared Security Import Subnet

C.

External Subnets for External EPG

Import Route Control Subnet

Shared Route Control Subnet

D.

Export Route Control Subnet

Shared Security Import Subnet

Aggregate Shared Routes

Buy Now
Questions 17

Refer to the exhibit.

Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

Options:

A.

Adjust the priority of server 10.1.1.1 to 1.

B.

Set the fallback login to local.

C.

Assign the user to the default role.

D.

Set the default login realm to LDAP

Buy Now
Questions 18

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

Options:

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Buy Now
Questions 19

Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)

Options:

A.

iBGP

B.

VXLAN

C.

IS-IS

D.

RIPv2

E.

eBGP

Buy Now
Questions 20

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

Options:

A.

FD

B.

EPG

C.

VRF

D.

BD

Buy Now
Questions 21

An engineer created a monitoring policy called Test in a Cisco ACI fabric and had to change the severity level of the monitored object Call home source. Which set of actions prevent the event from appearing in event reports?

Options:

A.

Select Event Severity Assignment Policies. Set severity level to cleared.

B.

Select Faults Severity Assignment Policies. Set severity level to cleared.

C.

Select Event Severity Assignment Policies. Set severity level to squelched.

D.

Select Faults Severity Assignment Policies. Set severity level to squelched.

Buy Now
Questions 22

An ACI engineer is implementing a Layer 3 out inside the Cisco ACI fabric that must meet these requirements:

    The data center core switch must be connected to one of the leaf switches with a single 1G link.

    The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.

    The data center core switch interface must be using 802.1Q tagging, and each vlan will be configured with a dedicated IP address.

Which set of steps accomplishes these goals?

Options:

A.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Set up the Routed External Network object ana Node Profile, selecting ElGRP Create the Switch profile, selecting Port-channel and the appropriate interfaces Create the default network and associate it with the Routed Outside object.

B.

Set up the BGP Protocol policy with the Autonomous System number of 0.

Configure an interface policy and an External Bridged Domain.

Create an External Bridged Network using the configured VLAN pool.

Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.

C.

Configure the OSPF Protocol policy with an area of 0.

Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol. Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN. Configure the External Network object with a network of 0.0.0.0/0.

D.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile selecting ElGRP Configure the Interface profile selecting Routed Interface and the appropriate interfaces. Create the External Network object with a network of 0.0.0.0/0.

Buy Now
Questions 23

Which feature should be disabled on a bridge domain when a default gateway for endpoints is on an external device instead of a Cisco ACI bridge domain SVI?

Options:

A.

unknown unicast flooding

B.

ARP flooding

C.

unicast routing

D.

proxy ARP

Buy Now
Questions 24

Refer to the exhibit. A Cisco ACI environment hosts two e-commerce applications. The default contract from a common tenant between different application tiers is used, and the applications work as expected. The customer wants to move to more specific contracts to prevent unwanted traffic between EPGs. A network administrator creates the app-to-db contract to meet this objective for the application and database tiers. The application EPGs must communicate only with their respective database EPGs. How should this contract be configured to meet this requirement?

Options:

A.

Set the app-to-db scope to Global.

B.

Set the app-to-db scope to Application Profile.

C.

Implement the app-to-db scope as VRF.

D.

Implement the app-to-db as a Taboo contract.

Buy Now
Questions 25

Engineer must configure SNMP inside a Cisco ACI fabric. The engineer has created an SNMP Policy, called SNMP-policy and an SNMP Monitoring Group called SNMP-group1 that Contains five trap receivers. Which configuration set completes the configuration?

Options:

A.

Edit oobbrc to permit traffic using UDP port 16. Associate the client group policy to SNMP-group1.

B.

Permit OOB management traffic using UDP port 161. Associate client group policy with the OOB management EPG.

C.

Allow all OOB management traffic. Configure three trap receivers on SNMP-group1.

D.

Create an OOB management contract. Include the SNMP server in the OOB management EPG.

Buy Now
Questions 26

Refer to the exhibit. An engineer configures communication between the EPGs in different tenants. Which action should be taken to create the subnet?

Options:

A.

Change Scope to Shared between VRFs.

B.

Leave Scope set to Private to VRF.

C.

Add the L3Out for Route Profile value.

D.

Change Scope to Advertised Externally.

Buy Now
Questions 27

A Cisco ACI endpoint group must have its gateway address migrated out of the ACI fabric. An engineer configures EPG-TEST with a static port binding and configures the encap VLAN with the required VLAN. Which configuration set must be used on the bridge domain to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

Unicast Routing: Disabled

ARP Flooding: Enabled

B.

L2 Unknown Unicast: Hardware Proxy

Unicast Routing: Disabled

ARP Flooding: Disabled

C.

L2 Unknown Unicast: Flood

Unicast Routing: Disabled

ARP Flooding: Enabled

D.

L2 Unknown Unicast: Flood

Unicast Routing: Enabled

ARP Flooding: Enabled

Buy Now
Questions 28

Refer to the exhibit. New e-commerce software is deployed on Cisco ACI fabric. The environment must meet these requirements:

The overall number of contracts must be reduced by reusing the existing contracts within a VRF when possible.

The e-commerce software must communicate only with software EPGs that are part of the same ANP.

The e-commerce software must be prevented from communicating with applications in different ANPs.

Which scope must be selected to meet these requirements?

Options:

A.

Application Profile

B.

Endpoint Group

C.

Tenant

D.

Global

Buy Now
Questions 29

An engineer discovered an outage on the mgmt0 port of Leaf113 and Leaf114. Both leaf switches were recently registered in the fabric and have health scores of 100. The engineer overs there is no IP address assigned to the mgmt0 interface of the switches. Which action resolves the outage?

Options:

A.

Statically bind the mgmt0 interface of Leaf113 and Leaf114 to the oob-default EPG.

B.

Enable Leaf 113 and Leaf 114 mgmt0 under the leaf switch.

C.

Associate the oobbrc-default contract to Leaf113 and Leaf114.

D.

Add Leaf113 and Leaf114 to the node management address policy.

Buy Now
Questions 30

What controls communication between EPGs?

Options:

A.

Inter-EPG communication is controlled by BGP.

B.

Inter-EPG communication is controlled by contracts.

C.

Inter-EPG communication is controlled by IS-IS.

D.

Inter-EPG communication is controlled by VXLAN.

Buy Now
Questions 31

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

Options:

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Buy Now
Questions 32

An engineer is implementing a Cisco ACI environment that consists of more than 20 servers. Two of the servers support only Cisco Discovery Protocol with no order link discovery protocol. The engineer wants the servers to be discovered automatically by the Cisco ACI fabric when connected. Which action must be taken to meet this requirement?

Options:

A.

Create an override policy that enables Cisco Discovery Protocol after LLDP is enabled in the default policy group.

B.

Configure a higher order interface policy that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

C.

Configure a lower order policy group that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

D.

Create an interface profile for the interface that disables LLDP on the desired switch that is referenced by the interface policy group.

Buy Now
Questions 33

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.

Acknowledge the QoS-related error.

B.

Associate a custom QoS class.

C.

Create a custom QoS policy.

D.

Set the QoS policy to Level 3.

Buy Now
Questions 34

A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements?

Options:

A.

Configure ACI Service Graph with Unidirectional PBR.

B.

Implement ACI Service Graph with GIPo.

C.

Implement ACI Service Graph Two Nodes with GIPo.

D.

Configure ACI Service Graph with Symmetric PBR.

Buy Now
Questions 35

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

Options:

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Buy Now
Questions 36

Refer to the exhibit.

A Cisco ACI fabric is newly deployed, and the security team requires more visibility of all inter-EPG traffic flows. All traffic in a VRF must be forwarded to an existing firewall pair. During fallover, the standby firewall must continue to use the same IP and MAC as the primary firewall. Drag and drop the steps from the left Into the Implementation order on the right to configure the service graph that meets the requirements. (Not all steps are used.)

Options:

Buy Now
Questions 37

An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?

Options:

A.

GOLF

B.

Multi-Site

C.

Multi-Pod

D.

Stretched Fabric

Buy Now
Questions 38

Network engineer configured a Cisco ACI fabric as follows:

• An EPG called EPG-A is created and associated with a VMM domain called North. •The EPG-A is associated with BD-A and is in an application profile called Apps-A.

• The BD-A is associated with VRF-1 in the Prod tenant.

Which port group must be selected to place VMs in EPG-A?

Options:

A.

Prod|VRF-1 |Apps-A|EPG-A

B.

Prod|Business_Apps|BD-A|EPG-A

C.

Prod|Apps-A|North|EPG-A

D.

Prod|Apps-A|EPG-A

Buy Now
Questions 39

What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?

Options:

A.

A cluster is capable to be deployed in transparent mode across pods.

B.

A different MAC/IP configuration combination is configurable for the firewall in each pod.

C.

Local traffic in a pod is load-balanced between the clustered firewalls.

D.

The local pod anycast node is preferred by the local spines.

Buy Now
Questions 40

Which type of policy configures the suppression of faults that are generated from a port being down?

Options:

A.

fault lifecycle assignment

B.

event lifecycle assignment

C.

fault severity assignment

D.

event severity assignment

Buy Now
Questions 41

A network engineer is integrating a new Hyperflex storage duster into an existing Cisco ACI fabric The Hyperflex cluster must be managed by vCenter so a new vSphere Distributed switch must be created In addition the hardware discovery must be performed by a vendor-neutral discovery protocol Which set of steps meets these requirements'?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 42

An engineer is implementing an out-of-band (OOB) management access for the Cisco ACI fabric. The secure access must meet these requirements:

• Only GUI and secure shell must be allowed to access the management interfaces of the ACIs.

• The only IP ranges that must be permitted to connect the fabric will be 10.10.10.0724 and 192.168.15.0/24.

Which configuration set meets these requirements?

Options:

A.

Implement HTTPS and SSH protocol filters in the OOB contract. Add the required subnets to the external network instance profile.

B.

Create an out-of-band EPG in the external management entity. Associate the management profile with the OOB contract.

C.

Set up static IPs on the management interfaces from the required IP range. Add the required subnets to the external network instance profile.

D.

Create an out-of-band EPG in the common tenant. Associate the external network instance profile with the OOB contract.

Buy Now
Questions 43

Which feature is used to program policy CAM on a leaf switch without sending traffic from VM to the leaf?

Options:

A.

immediate resolution immediacy

B.

immediate deployment immediacy

C.

on-demand deployment immediacy

D.

on-demand resolution immediacy

Buy Now
Questions 44

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

Options:

A.

Management IP of APICs

B.

Management IP of the MSO Node

C.

Anycast Overlay Multicast TEP

D.

MP-BGP EVPN Router-ID

E.

Common Pervasive Gateway

Buy Now
Questions 45

Refer to the exhibit.

An engineer must migrate workloads from the brownfield network to the Cisco ACI fabric. The VLAN 10 default gateway remains in the router located in the brownfield Network. The bridge domain has already been associated with L20ut. Which two actions must be taken to migrate the workloads? (Choose two.)

Options:

A.

Select Limit IP Learning to Subnet.

B.

Configure Multi-Destination Flooding Flood in Encapsulation.

C.

Set L2 Unknown Unicast Flood.

D.

Map the MAC address of the default gateway to the bridge domain

E.

Enable ARP Flooding

Buy Now
Questions 46

Refer to the exhibit. An engineer must disable the communication between the two backup servers in the backup EPG. Which action accomplishes this goal?

Options:

A.

Set Preferred Group Member to Excluded.

B.

Set the physical domain to None.

C.

Set a different static binding for the encap VLAN.

D.

Set Intra EPG Isolation to Enforced.

Buy Now
Questions 47

What does a bridge domain represent?

Options:

A.

Layer 3 cloud

B.

Layer 2 forwarding construct

C.

tenant

D.

physical domain

Buy Now
Questions 48

Refer to the exhibit. Server A is connected to the Cisco ACI fabric using two teamed interfaces. One interface in a team is configured as active and the other remains in standby mode. When a failover occurs and the standby interface becomes active, it uses its built-in MAC address to send traffic. Which bridge domain configuration must be applied to resolve the issue?

Options:

A.

Configure Hardware proxy.

B.

Set L2 Unknown Unicast to Flood.

C.

Enable ARP flooding.

D.

Activate Limit IP Learning to Subnet.

Buy Now
Questions 49

A network engineer is implementing a Layer 3 Out in the Cisco ACI fabric. The data center core switches must connect to a pair of leaf switches and exchange routes via a routing protocol. In addition, the implementation must meet these criteria;

• The external switch interface must use 802.1Q tagging.

• Access to the internet for the ACI fabric must be the L30ut.

• The L30ut must use a routing protocol that has rapid convergence time and low CPU usage.

Which configuration set meets these requirements?

Options:

A.

Configure the OSPF Protocol policy with an area of 0.

Set up the Routed External Network object and Node Profile and select OSPF. Create the Switch profile and select VPC with the appropriate interfaces. Create the default network and associate it with the Routed Outside object.

B.

Configure the BGP Protocol policy with the appropriate Autonomous System number. Configure an Interface policy and an External Bridged Domain. Create an External Bridged Network and use the configured VLAN pool. Build the Leaf profile and select the Routed sub-interface with the appropriate VLAN.

C.

Implement the IS-IS Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile and select IS-IS. Configure the Interface profile and select the Routed Interface with the appropriate interfaces. Create the External Network object.

D.

Implement the EIGRP Protocol policy with the selected Autonomous System number. Create Routed Outside object and Node Profile and select EIGRP as the routing protocol. Build the Interface profile and select SVI and the appropriate VPC. Configure the External Network object with a network of 0.0.0.070.

Buy Now
Questions 50

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Buy Now
Questions 51

Refer to the exhibit. A company merges three of its departments: CORP, HR, and SERVICES, Currently, the connectivity between departments is achieved by using VRF route leaking. The requirement is to redesign the Cisco ACI networking architecture to communicate between EPGs and BDs from any tenant without configuring contracts or VRF route leaking. Which configuration meets these criteria?

Options:

A.

Configure an unenforced VRF in the user tenant and map all required EPGs to it.

B.

Implement an enforced VRF in the common tenant and map all required BDs to it.

C.

Configure an enforced VRF in the user tenant and map all required EPGs to it.

D.

Implement an unenforced VRF in the common tenant and map all required BDs to it.

Buy Now
Questions 52

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

Options:

A.

OSPF

B.

ISIS

C.

BGP

D.

EIGRP

Buy Now
Questions 53

Which statement regarding ACI Multi-Pod and TEP pool is true?

Options:

A.

The IP addresses used in the IPN network can overlap TEP pool of the APIC.

B.

A different TEP pool must be assigned to each Pod.

C.

The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.

D.

The same TEP pool is used in all Pods.

Buy Now
Questions 54

Which statement about ACI syslog is true or Which statement describes the ACI syslog?

Options:

A.

Notifications for different scopes of syslog objects can be sent only to one destination.

B.

Syslog messages are sent to the destination through the spine.

C.

All syslog messages are sent to the destination through APIC.

D.

Switches send syslog messages directly to the destinations.

Buy Now
Questions 55

An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements:

• Control the amount of application data flowing into the system

• Allow the newly connected device to auto-negotiate link speed with the leaf switch

Which two ACI policies must be configured to achieve these requirements? (Choose two.)

Options:

A.

L2 interface policy

B.

link level policy

C.

slow drain policy

D.

ingress control plane policing policy

E.

ingress data plane policing policy

Buy Now
Questions 56

An engineer must attach an ESXi host to the Cisco ACI fabric. The host is connected to Leaf 1 and has its gateway IP address 10.10.10.254/24 configured inside the ACI fabric. A new wall is attached to Leaf 2 and mapped to the same EPG and BD as the ESXi host. The engineer must migrate the gateway of the ESXi host to the firewall. Which configuration set complishes this goal?

Options:

A.

Disable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI BD.

B.

Enable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI EPG.

C.

Disable unicast routing.

Define IP address 10.10.10.254/24 on the firewall.

D.

Enable unicast routing.

Set IP address 10.10.10.254/24 on the firewall.

Buy Now
Questions 57

Which two external entities are referenced by an AEP? (Choose two.)

Options:

A.

VMware vCenter server

B.

VMM domain

C.

Layer 3 domain

D.

Hypervisor

E.

Fibre Channel switch

Buy Now
Questions 58

The customer is looking for redundant interconnection of the existing network to the new ACI fabric. Unicast and multicast traffic must be routed between the two networks. Which L3Out implementation meets these requirements?

Options:

A.

B.

C.

D.

Buy Now
Questions 59

Which protocol is used in a Multi-Pod topology to synchronize reachability information across pods?

Options:

A.

IS-IS

B.

MP-BGP EVPN

C.

OSPF

D.

COOP

Questions 60

In a Cisco ACI Multi-Site fabric, the Inter-Site BUM Traffic Allow option is enabled in a specific stretched bridge domain. What is used to forward BUM traffic to all endpoints in the same broadcast domain?

Options:

A.

ingress replication on the spines in the source site

B.

egress replication on the destination leaf switches

C.

egress replication on the source leaf switches

D.

ingress replication on the spines in the destination site

Buy Now
Questions 61

An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 62

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

Options:

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Buy Now
Questions 63

In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

Options:

A.

VXLAN

B.

LLDP

C.

ISIS

D.

STP

Buy Now
Questions 64

A customer must upgrade the Cisco ACI fabric to use a feature from the new code release. However, there is no direct path from the current release to the desired one. Based on the Cisco APIC Upgrade/Downgrade Support Matrix, the administrator must go through one intermediate release.

Which set of steps must be taken to upgrade the fabric to the new release?

Options:

A.

Upgrade the APICs to an interim release.

Upgrade the switches to an interim release.

Upgrade the APICs to the targeted release.

Upgrade the leaf and spine switches to the targeted release.

B.

Upgrade the APICs to an interim release and then switches to an interim release.

When all switches are operational, upgrade leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Upgrade the APICs to the targeted release.

C.

Upgrade the APICs to an interim release.

Upgrade the leaf switches directly to the targeted release.

Upgrade the spine switches directly to the targeted release.

Upgrade the APICs to the targeted release.

D.

Upgrade the APICs directly to the targeted release.

Upgrade the switches to an interim release.

When all switches are operational, upgrade the leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Buy Now
Questions 65

Which two types of interfaces are supported on border leaf switches to connect to an external router? (Choose two.)

Options:

A.

subinterface with VXLAN tagging

B.

subinterface with 802.1Q tagging

C.

FEX host interface

D.

out of band interface

E.

Switch Virtual Interface

Buy Now
Questions 66

Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from

being learned by the fabric?

Options:

A.

enable Limit IP Learning to Subnet

B.

enable Unicast Routing

C.

enable IP Data-plane Learning

D.

enable ARP Flooding to BD

Buy Now
Questions 67

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

Options:

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Buy Now
Questions 68

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

Options:

A.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure.

B.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports.

C.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain.

D.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers.

Buy Now
Questions 69

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

Options:

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Buy Now
Questions 70

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Buy Now
Questions 71

Refer to the exhibit, An engineer is deploying a Cisco ACI environment but experiences a STP loop between switch1 and switch2. Which configuration step is needed to break the STP loop?

Options:

A.

Configure the STP instance to VLAN mapping under the switch STP policy.

B.

Configure a Layer 2 external bridged network on the interfaces facing the MST switches.

C.

Enable the native VLAN on the interfaces facing the MST switches using static pons in a dedicated EPG.

D.

Enable BPDU filter under the STP interface policy on the Interfaces lacing the MST switches.

Buy Now
Questions 72

Which protocol does ACI use to securely sane the configuration in a remote location?

Options:

A.

SCP

B.

HTTPS

C.

TFTP

D.

FTP

Buy Now
Questions 73

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

Options:

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Buy Now
Questions 74

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

Options:

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Buy Now
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (300-620 DCACI)
Last Update: Mar 30, 2025
Questions: 247

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99