Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-620 Sample Questions Answers

Questions 4

Which new construct must a user create when configuring in-band management?

Options:

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

Buy Now
Questions 5

An engineermustsecurely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 6

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Buy Now
Questions 7

Refer to the exhibit. A Cisco ACI environment hosts two e-commerce applications. The default contract from a common tenant between different application tiers is used, and the applications work as expected. The customer wants to move to more specific contracts to prevent unwanted traffic between EPGs. A network administrator creates the app-to-db contract to meet this objective for the application and database tiers. The application EPGs must communicate only with their respective database EPGs. How should this contract be configured to meet this requirement?

Options:

A.

Set the app-to-db scope to Global.

B.

Set the app-to-db scope to Application Profile.

C.

Implement the app-to-db scope as VRF.

D.

Implement the app-to-db as a Taboo contract.

Buy Now
Questions 8

An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?

Options:

A.

Configure the EGP as a provider and L3 out as consumer of the contract.

B.

Configure OSPF to exchange routes between the L3 out and EGP.

C.

Configure a taboo contract and apply it to the EPG.

D.

Configure the EPG as a consumer and L3 out as a provider of the contract.

Buy Now
Questions 9

What are two descriptions of ACI multi-site? (Choose two.)

Options:

A.

The Inter-Site network routers should run OSPF to establish peering with the spines.

B.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

C.

Routers in the inter-Site network must run OSPF. DHCP relay, and MP-BGP

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites

E.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site

Buy Now
Questions 10

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

Options:

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Buy Now
Questions 11

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

Options:

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

Buy Now
Questions 12

Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

Options:

A.

cisco-security domain

B.

cisco-auth-features

C.

cisco-aci-role

D.

cisco-av-pair

Buy Now
Questions 13

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

Options:

A.

Create an additional login domain that references local accounts

B.

Enable the fallback check with the default authentication domain

C.

Associate console authentication with the "RADIUS" realm.

D.

Reference the local realm in the fallback domain

Buy Now
Questions 14

Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

Options:

A.

VMM domain profile

B.

EPG static port binding

C.

Layer 3 outside interface association

D.

IP address pool association

E.

EPG association

Buy Now
Questions 15

Refer to the exhibit.

An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?

Options:

A.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the provider tenant.

B.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

C.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

D.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the consumer tenant.

Buy Now
Questions 16

Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.

Options:

Buy Now
Questions 17

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

Options:

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Buy Now
Questions 18

When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

Options:

A.

limit IP learning to subnet

B.

scope

C.

gateway IP

D.

subnet control

Buy Now
Questions 19

When a pre-provision immediacy is used, when is the policy downloaded to the Cisco ACI leaf switch?

Options:

A.

The policy is downloaded and programmed in the hardware policy CAM when the change is implemented on the Cisco APIC.

B.

The policy is programmed in the hardware policy CAM when the policy is downloaded in the leaf software.

C.

The policy is programmed in the hardware policy CAM when the first packet is received through the data path.

D.

The policy is downloaded to the associated leaf switch software when the ESXi host is attached to a DVS.

Buy Now
Questions 20

Which components must be configured for the BGP Route Reflector policy to take effect?

Options:

A.

spine fabric interface overrides and profiles

B.

access policies and profiles

C.

pod policy groups and profiles

D.

leaf fabric interface overrides and profiles

Buy Now
Questions 21

The engineer notices frequent MAC and IP address moves between different leaf switch ports. Which action prevents this problem from occurring?

Options:

A.

Disable enforce subnet check.

B.

Enable endpoint loop protection.

C.

Enable rogue endpoint control.

D.

Disable IP bridge domain enforcement.

Buy Now
Questions 22

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

Options:

A.

Divide Cisco APIC controllers into two or more maintenance groups.

B.

Grant tenant-ext-admin access to a user who performs an upgrade

C.

Combine all switches into an upgrade group.

D.

Divide switches into two or more maintenance groups.

E.

Grant the fabric administrator role to a user who performs an upgrade.

Buy Now
Questions 23

A network engineer mustconfigurea Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 24

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

Options:

A.

OSPF

B.

ISIS

C.

BGP

D.

EIGRP

Buy Now
Questions 25

Regarding the MTU value of MP-BGP EVPN control plane packets in Cisco ACI, which statement about communication between spine nodes in different sites is true?

Options:

A.

By default, spine nodes generate 9000-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 9000-bytes packets.

B.

By default, spine nodes generate 1500-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 1800-bytes packets.

C.

By default, spine nodes generate 1500-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 1500-bytes packets.

D.

By default, spine nodes generate 9000-bytes packets to exchange endpoints routing information. As a result, the Inter-Site network should be able to carry 9100-bytes packets.

Buy Now
Questions 26

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

Options:

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Buy Now
Questions 27

Refer to the exhibit. A Cisco ACI fabric displays this fault. Which set of actions modifies the event to be displayed as a warning in the future?

Options:

A.

Navigate to the ACI Events tab.

Create a new record.

B.

Navigate to the ACI Fault tab.

Create a new record.

C.

Navigate to the ACI Events tab.

Change the severity level.

D.

Navigate to the ACI Fault tab.

Change the severity level.

Buy Now
Questions 28

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

Options:

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Buy Now
Questions 30

When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

Options:

A.

within the bridge domain

B.

within the APIC

C.

within the access encap VLAN

D.

between all the spine and leaf switches

Buy Now
Questions 31

Refer to the exhibit. The 0.0.0.0/0 is configured as a default static route on L3Out-1. Which action should be taken for the 0.0.0.0/0 prefix to advertise out on L3Out-2 OSPF?

Options:

A.

Enable Export Route Control Subnet.

B.

Enable Shared Security Import Subnet.

C.

Enable Shared Route Control Subnet.

D.

Enable Aggregate Export Subnet.

Buy Now
Questions 32

What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

Options:

A.

L2 unknown unicast: flood

B.

GARP based detection

C.

unicast routing

D.

subnet scope

Buy Now
Questions 33

Which feature should be disabled on a bridge domain when a default gateway for endpoints is on an external device instead of a Cisco ACI bridge domain SVI?

Options:

A.

unknown unicast flooding

B.

ARP flooding

C.

unicast routing

D.

proxy ARP

Buy Now
Questions 34

In a Cisco ACI Multi-Site fabric, the Inter-Site BUM Traffic Allow option is enabled in a specific stretched bridge domain. What is used to forward BUM traffic to all endpoints in the same broadcast domain?

Options:

A.

ingress replication on the spines in the source site

B.

egress replication on the destination leaf switches

C.

egress replication on the source leaf switches

D.

ingress replication on the spines in the destination site

Buy Now
Questions 35

A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with network control policies. The APIC is as follows:

    Tenant = TenantX

    Security Domain = Tenantx-SD

    User = X

The customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these requirement?

Options:

A.

shell:domains = TenantX-SD/fabric-admin/,common//read-all

B.

shell:domains = TenantX-SD/tenant-admin

C.

shell:domains = TenantX-SD/tenant-ext-admin/,common//read-all

D.

shell:domains = TenantX-SD/tenant-admin/,common//read-all

Buy Now
Questions 36

Where is the COOP database located?

Options:

A.

leaf

B.

spine

C.

APIC

D.

endpoint

Buy Now
Questions 37

All workloads in VLAN 1001 have been migrated into EPG-1001. The requirement is to move the gateway address for VLAN 1001 from the core outside the Cisco ACI fabric into the Cisco ACI fabric. The endpoints in EPG-1001 must route traffic to endpoints in other EPGs and minimize flooded traffic in the fabric. Which configuration set is needed on the bridge domain to meet these requirements?

Options:

A.

Disable ARP Flood

Disable Limn Endpoint Learning

B.

Enable Hardware Proxy Enable Unicast Routing

C.

Disable Local IP Learning Limit Disable Unicast Routing

D.

Enable Flood

Enable Unicast Routing

Buy Now
Questions 38

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Buy Now
Questions 39

A customer is deploying a new application across two ACI pods that is sensitive to latency and jitter. The application sets the DSCP values of packets to AF31 and CS6, respectively. Which configuration changes must be made on the APIC to support the new application and prevent packets from being delayed or dropped between pods?

Options:

A.

disable DSCP mapping on the IPN devices

B.

disable DSCP translation policy

C.

align the ACI QoS levels and IPN QoS policies

D.

align the custom QoS policy on the EPG site in the customer tenant

Buy Now
Questions 40

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Buy Now
Questions 41

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Options:

A.

Change the switch APIC Connectivity Preference to in-band management

B.

Remove the in-band management address from the APIC.

C.

Add a Fabric Access Policy to allow management connections.

D.

Modify the Pod Profile to use the default Management Access Policy

Buy Now
Questions 42

Refer to the exhibit.

An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of “Tenant | Application | EPG”. Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG”?

Options:

A.

enable tag collection

B.

security domains

C.

delimiter

D.

virtual switch name

Buy Now
Questions 43

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

Options:

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Buy Now
Questions 44

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Buy Now
Questions 45

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

Options:

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Buy Now
Questions 46

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

Options:

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Buy Now
Questions 47

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

Options:

A.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure.

B.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports.

C.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain.

D.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers.

Buy Now
Questions 48

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 49

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

Options:

A.

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

Buy Now
Questions 50

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

Options:

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Buy Now
Questions 51

An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements:

• Control the amount of application data flowing into the system

• Allow the newly connected device to auto-negotiate link speed with the leaf switch

Which two ACI policies must be configured to achieve these requirements? (Choose two.)

Options:

A.

L2 interface policy

B.

link level policy

C.

slow drain policy

D.

ingress control plane policing policy

E.

ingress data plane policing policy

Buy Now
Questions 52

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

Options:

A.

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.

Enable an L30ut with Shared Route Control Subnet.

C.

Configure subnets with the External Subnets for External EPG flag enabled.

D.

Configure subnets with the Import Route Control Subnet flag enabled.

Buy Now
Questions 53

Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

Options:

A.

endpoint

B.

adjacency

C.

RIB

D.

ARP

Buy Now
Questions 54

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

Options:

A.

Enable the BPDU interface controls under the spanning tree interface policy.

B.

Configure a new STP interface policy.

C.

Bind the spanning tree policy to the switch policy group.

D.

Associate the STP interface policy to the appropriate interface policy group.

E.

Create a new region policy under the spanning tree policy.

F.

Map VLAN range to MAT instance number.

Buy Now
Questions 55

Refer to the exhibit. What must be configured in the service graph to redirect HTTP traffic between the EPG client and EPG server to go through the Cisco ASA firewall?

Options:

A.

precise filter to allow only HTTP traffic

B.

permit-all contract filter

C.

contract with no filter

D.

contract filter to allow ARP and HTTP.

Buy Now
Questions 56

An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco APIC should the policy be configured to meet this requirement?

Options:

A.

uni/tn-common/monepg-default

B.

uni/infra/monifra-default

C.

uni/fabric/monfab-default

D.

uni/fabric/moncommon

Buy Now
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (300-620 DCACI)
Last Update: Nov 21, 2024
Questions: 192
$68  $169.99
$52  $129.99
$44  $109.99
buy now 300-620