Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 300-620 Dumps

Page: 1 / 25
Total 247 questions

Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Question 1

as

Refer to the exhibit. The Cisco ACI fabric has an egress L3Out from Leaf-101 and Leaf-102 to CORE-1. VLAN 102 is used to form the OSPF adjacency. The workloads must be migrated into EPG-101, and the static port binding is configured to Leaf-103 e1/1 with encap VLAN 101. An engineer completes the port binding and receives an MCP fault. Which action clears the fault?

Options:

A.

Use VLAN 101 for OSPF adjacency on the egress L3Out.

B.

Use VLAN 102 as the encap VLAN on the EPG-101 static port binding.

C.

Add VLAN 102 to the VLAN pool that is used by the static port binding.

D.

Prune VLAN 101 from the VLAN pool that is used by the egress L3Out.

Question 2

as

Refer to the exhibit. An administrator configures inter-VRF route leaking between Production:vrf-prod and Non-Production:vrf-nonprod. However, the route in the Non-Production:vrf-nonprod VRF to the production tenant is missing. Which action resolves the VRF route leaking issue?

Options:

A.

Change the contract scope to Global.

B.

Enable the Shared between VRFs option for the BD subnet in the production VRF.

C.

Enable the Shared between VRFs option for the EPG subnet in the non-production VRF.

D.

Export the contract from provider to consumer tenant.

Question 3

Which new construct must a user create when configuring in-band management?

Options:

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

Question 4

as

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.

Acknowledge the QoS-related error.

B.

Associate a custom QoS class.

C.

Create a custom QoS policy.

D.

Set the QoS policy to Level 3.

Question 5

Refer to the exhibit.

as

Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

Options:

A.

Spine1

B.

apic1

C.

Spine2

D.

Leaf1

E.

Leaf2

F.

apic2

Question 6

Which components must be configured for the BGP Route Reflector policy to take effect?

Options:

A.

spine fabric interface overrides and profiles

B.

access policies and profiles

C.

pod policy groups and profiles

D.

leaf fabric interface overrides and profiles

Question 7

Refer to the exhibit.

as

An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of “Tenant | Application | EPG”. Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG”?

Options:

A.

enable tag collection

B.

security domains

C.

delimiter

D.

virtual switch name

Question 8

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

as

Options:

Question 9

An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 10

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

Options:

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Question 11

A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?

Options:

A.

Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.

B.

Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.

C.

Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault.

D.

Create a new global health score policy that ignores specific faults as identified by their unique fault code.

Question 12

An engineer must connect Cisco ACI fabric using Layer 2 with external third-party switches. The third-party

switches are configured using 802.1s protocol. Which two constructs are required to complete the task?

(Choose two.)

Options:

A.

spanning tree policy for mapping MST Instances to VLANs

B.

MCP policy with PDU per VLAN enabled

C.

MCP instance policy with administrative slate disabled

D.

dedicated EPG for native VLAN

E.

static binding of native VLAN in all existing EPGs

Question 13

Which class of ACI object is presented in this output?

as

Options:

A.

Contract

B.

Bridge Domain

C.

Tenant

D.

Endpoint

Question 14

A customer migrates a legacy environment to Cisco ACI. A Layer 2 trunk is configured to interconnect the two

environments. The customer also builds ACI fabric in an application-centric mode. Which feature should be

enabled in the bridge domain to reduce instability during the migration?

Options:

A.

Set Multi-Destination Flooding to Flood in BD.

B.

Enable Flood in Encapsulation.

C.

Set Multi-Destination Flooding to Flood in Encapsulation.

D.

Disable Endpoint Dataplane Learning

Question 15

Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

Options:

A.

vzAny contracts

B.

standard contracts

C.

application EPGs

D.

uSeg EPGs

Question 16

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

Options:

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Question 17

A customer creates Layer 3 connectivity to the outside network. However, only border leaf switches start receiving destination updates to other networks from the newly created L3Out. The updates must also be propagated to other Cisco ACI leaf switches. The L3Out is linked with the EPGs via a contract. Which action must be taken in the pod policy group to accomplish this goal?

Options:

A.

Apply a BGP route reflector policy.

B.

Enable a COOP policy.

C.

Configure an IS-IS policy.

D.

Implement an access management policy.

Question 18

as

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Options:

A.

Change the switch APIC Connectivity Preference to in-band management

B.

Remove the in-band management address from the APIC.

C.

Add a Fabric Access Policy to allow management connections.

D.

Modify the Pod Profile to use the default Management Access Policy

Question 19

Refer to the exhibit.

as

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

Options:

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Question 20

as

Refer to the exhibit. What must be configured in the service graph to redirect HTTP traffic between the EPG client and EPG server to go through the Cisco ASA firewall?

Options:

A.

precise filter to allow only HTTP traffic

B.

permit-all contract filter

C.

contract with no filter

D.

contract filter to allow ARP and HTTP.

Question 21

as

Refer to the exhibit. A company merges three of its departments: CORP, HR, and SERVICES, Currently, the connectivity between departments is achieved by using VRF route leaking. The requirement is to redesign the Cisco ACI networking architecture to communicate between EPGs and BDs from any tenant without configuring contracts or VRF route leaking. Which configuration meets these criteria?

Options:

A.

Configure an unenforced VRF in the user tenant and map all required EPGs to it.

B.

Implement an enforced VRF in the common tenant and map all required BDs to it.

C.

Configure an enforced VRF in the user tenant and map all required EPGs to it.

D.

Implement an unenforced VRF in the common tenant and map all required BDs to it.

Question 22

Refer to the exhibit.

as

Which Adjacency Type value should be set when the client endpoint and the service node

interface are in a different subnet?

Options:

A.

Routed

B.

Unicast

C.

L3Out

D.

L3

Question 23

A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/ L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

Options:

A.

ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.

B.

A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.

C.

ACI Multi-Pod requires an IP Network supporting PIM-Bidir.

D.

ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.

E.

Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.

Question 24

as

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Question 25

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

Options:

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

Question 26

What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?

Options:

A.

A cluster is capable to be deployed in transparent mode across pods.

B.

A different MAC/IP configuration combination is configurable for the firewall in each pod.

C.

Local traffic in a pod is load-balanced between the clustered firewalls.

D.

The local pod anycast node is preferred by the local spines.

Question 27

Refer to the exhibit.

as

Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

Options:

A.

Adjust the priority of server 10.1.1.1 to 1.

B.

Set the fallback login to local.

C.

Assign the user to the default role.

D.

Set the default login realm to LDAP

Question 28

What must be configured to allow SNMP traffic on the APIC controller?

Options:

A.

out-of-band management interface

B.

contract under tenant mgmt

C.

SNMP relay policy

D.

out-of-band bridge domain

Question 29

Which type of policy configures the suppression of faults that are generated from a port being down?

Options:

A.

fault lifecycle assignment

B.

event lifecycle assignment

C.

fault severity assignment

D.

event severity assignment

Question 30

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

Options:

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Question 31

A network engineer configures the Cisco ACI fabric to connect to vCenter with these requirements:

Port groups must be automatically created on the distributed virtual switch.

Port groups must use the VLAN allocation in the range between 20-30.

The deployment must optimize the CAM space on the leaf switches.

Which set of actions meets these criteria?

Options:

A.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

B.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

C.

Create a static VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

D.

Create a static VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

Question 32

as

When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

Options:

A.

all leaf switches and all spine nodes

B.

only spine switches where the bridge domain of the tenant is present

C.

only leaf switches where the bridge domain of the tenant is present

D.

all border leaf nodes where the bridge domain of the tenant is present

Question 33

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

Options:

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Question 34

An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?

Options:

A.

BPDU Guard

B.

per-VLANMCP

C.

Storm Control

D.

BPDU Filter

Question 35

When a pre-provision immediacy is used, when is the policy downloaded to the Cisco ACI leaf switch?

Options:

A.

The policy is downloaded and programmed in the hardware policy CAM when the change is implemented on the Cisco APIC.

B.

The policy is programmed in the hardware policy CAM when the policy is downloaded in the leaf software.

C.

The policy is programmed in the hardware policy CAM when the first packet is received through the data path.

D.

The policy is downloaded to the associated leaf switch software when the ESXi host is attached to a DVS.

Question 36

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

Options:

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Question 37

What does a bridge domain represent?

Options:

A.

Layer 3 cloud

B.

Layer 2 forwarding construct

C.

tenant

D.

physical domain

Question 38

Drag and drop the Cisco ACI Layer 4 to Layer 7 service insertion terms on the left to the correct descriptions on the right.

as

Options:

Question 39

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

Options:

A.

FD

B.

EPG

C.

VRF

D.

BD

Question 40

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

Options:

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Question 41

A bridge domain for a new endpoint group in the Cisco ACI fabric must meet these requirements:

The bridge domain must function as the default gateway for the subnet so that routing remains within the Cisco ACI fabric.

ARP requests must be managed via Layer 3 unicast packets or be dropped to reduce excessive broadcast traffic.

The impact of misconfigured virtual machines must be kept to a minimum by preventing IP addresses outside of the configured subnet from being routed.

Which set of actions must be taken?

Options:

A.

Disable ARP Flooding.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

B.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set Multi-Destination Flooding to Flood in BD.

C.

Set Endpoint Retention Policy to default.

Enable ARP Flooding.

Enable Unicast Routing on the bridge domain and configure a subnet.

D.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set L2 Unknown Unicast to Flood.

Disable Endpoint Retention Policy.

Question 42

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

Options:

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Question 43

All workloads in VLAN 1001 have been migrated into EPG-1001. The requirement is to move the gateway address for VLAN 1001 from the core outside the Cisco ACI fabric into the Cisco ACI fabric. The endpoints in EPG-1001 must route traffic to endpoints in other EPGs and minimize flooded traffic in the fabric. Which configuration set is needed on the bridge domain to meet these requirements?

Options:

A.

Disable ARP Flood

Disable Limn Endpoint Learning

B.

Enable Hardware Proxy Enable Unicast Routing

C.

Disable Local IP Learning Limit Disable Unicast Routing

D.

Enable Flood

Enable Unicast Routing

Question 44

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

Options:

A.

OSPF

B.

ISIS

C.

BGP

D.

EIGRP

Question 45

as

Refer to the exhibit, An engineer is deploying a Cisco ACI environment but experiences a STP loop between switch1 and switch2. Which configuration step is needed to break the STP loop?

Options:

A.

Configure the STP instance to VLAN mapping under the switch STP policy.

B.

Configure a Layer 2 external bridged network on the interfaces facing the MST switches.

C.

Enable the native VLAN on the interfaces facing the MST switches using static pons in a dedicated EPG.

D.

Enable BPDU filter under the STP interface policy on the Interfaces lacing the MST switches.

Question 46

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Question 47

as

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

Options:

A.

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

Question 48

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

Options:

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Question 49

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

    Only traffic to known Mac addresses must be allowed to reduce noice.

    The multicast traffic must be limited to the ports that are participating in multicast routing.

    The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?

Options:

A.

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

B.

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

C.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

D.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Question 50

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Question 51

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

Options:

A.

extending the routed domain out of the ACI fabric

B.

creating a single homed Layer 3 Out

C.

creating an external physical network

D.

extending the bridge domain out of the ACI fabric

E.

extending the EPG out of the ACI fabric

Question 52

A network engineer mustconfigurea Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

as

Options:

A.

Option A

B.

Option B

C.

Option C

Question 53

as

Refer to the exhibit. A network engineer must complete the Cisco ACI implementation based on the logical system design created by the systems architect. Which Cisco ACI object is required where the dotted line indicates to complete the task?

Options:

A.

contract

B.

application profile

C.

context

D.

attachable Access Entity Profile

Question 54

When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

Options:

A.

datacenter

B.

VMware vSphere Standard vSwitch

C.

VMware vSphere Distributed Switch

D.

cluster

Question 55

An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

Options:

A.

merge

B.

atomic

C.

best effort

D.

replace

Question 56

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

Options:

A.

Management IP of APICs

B.

Management IP of the MSO Node

C.

Anycast Overlay Multicast TEP

D.

MP-BGP EVPN Router-ID

E.

Common Pervasive Gateway

Question 57

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

Options:

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Page: 1 / 25
Total 247 questions