Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

300-620 Implementing Cisco Application Centric Infrastructure (DCACI) Questions and Answers

Questions 4

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Buy Now
Questions 5

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.

Acknowledge the QoS-related error.

B.

Associate a custom QoS class.

C.

Create a custom QoS policy.

D.

Set the QoS policy to Level 3.

Buy Now
Questions 6

Where is the COOP database located?

Options:

A.

leaf

B.

spine

C.

APIC

D.

endpoint

Buy Now
Questions 7

A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements?

Options:

A.

Configure ACI Service Graph with Unidirectional PBR.

B.

Implement ACI Service Graph with GIPo.

C.

Implement ACI Service Graph Two Nodes with GIPo.

D.

Configure ACI Service Graph with Symmetric PBR.

Buy Now
Questions 8

Refer to the exhibit. An engineer is configuring a production Multi-Site solution to provide connectivity from EPGs from a specific site to networks reachable through a remote site L3OUT. All required schema and template objects are already defined. Which additional configuration must be implemented in the Multi-Site Orchestrator to support the cross-site connectivity?

Options:

A.

Configure a routable TEP pool for SITE1.

B.

Enable CloudSec for intersite traffic encryption.

C.

Add a new stretched external EPG to the existing L3OUT.

D.

Implement a policy-based redirect using a service graph.

Buy Now
Questions 9

Refer to the exhibit. A Cisco ACI environment hosts two e-commerce applications. The default contract from a common tenant between different application tiers is used, and the applications work as expected. The customer wants to move to more specific contracts to prevent unwanted traffic between EPGs. A network administrator creates the app-to-db contract to meet this objective for the application and database tiers. The application EPGs must communicate only with their respective database EPGs. How should this contract be configured to meet this requirement?

Options:

A.

Set the app-to-db scope to Global.

B.

Set the app-to-db scope to Application Profile.

C.

Implement the app-to-db scope as VRF.

D.

Implement the app-to-db as a Taboo contract.

Buy Now
Questions 10

Refer to the exhibit.

Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

Options:

A.

Adjust the priority of server 10.1.1.1 to 1.

B.

Set the fallback login to local.

C.

Assign the user to the default role.

D.

Set the default login realm to LDAP

Buy Now
Questions 11

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.

over Layer 3 directly connected back-to-back spines

B.

over Layer 3 Out connectivity via border leafs

C.

over Layer 3 IPN connectivity via spines

D.

over Layer 3 IPN connectivity via border leafs

Buy Now
Questions 12

An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy?

Options:

A.

LACP Active

B.

MAC Pinning

C.

LACP Passive

D.

MAC Pinning-Physical-NIC-load

Buy Now
Questions 13

An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?

Options:

A.

GOLF

B.

Multi-Site

C.

Multi-Pod

D.

Stretched Fabric

Buy Now
Questions 14

Which description regarding the initial APIC cluster discovery process is true?

Options:

A.

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.

Every switch is assigned a unique AV by the APIC.

C.

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.

The ACI fabric is discovered starting with the spine switches.

Buy Now
Questions 15

Refer to the exhibit. An engineer configures communication between the EPGs in different tenants. Which action should be taken to create the subnet?

Options:

A.

Change Scope to Shared between VRFs.

B.

Leave Scope set to Private to VRF.

C.

Add the L3Out for Route Profile value.

D.

Change Scope to Advertised Externally.

Buy Now
Questions 16

Which type of profile needs to be created to deploy an access port policy group?

Options:

A.

attachable entity

B.

Pod

C.

module

D.

leaf interface

Buy Now
Questions 17

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

Options:

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Buy Now
Questions 18

Refer to the exhibit. A company decided to decrease its routing footprint and remove RT-2 and RT-3 devices from its data center. Because of that, the exit point must be created from all the tenants by using the common tenant. Which two configuration tasks must be completed to meet these requirements? (Choose two.)

Options:

A.

Move subnets from all the bridge domains to the EPG level and mark them with flag Shared between VRFs.

B.

Update the L3Out ExtEPG subnet in the common tenant with flag Shared Route Control Subnet and Aggregate Shared Routes.

C.

Mark all subnets with flag Shared between VRFs and attach contract Ctr-3 as a provider to all the EPGs.

D.

Change contract Ctr-3 scope to Global, consume it by all EPGs, and flag all subnets with flag Shared between VRFs.

E.

Export contract Ctr-2 into the tenant TN-1 and attach it as a consumer to all the EPGs in the tenant TN-1.

Buy Now
Questions 19

Refer to the exhibit. A Cisco APIC raises an error when the EPG must accept endpoints from a VMM domain created. Which action clears the fault?

Options:

A.

Expand the VLAN pool for the VMM domain.

B.

Create a bridge domain for the VMM domain.

C.

Associate the EPG with the VMM domain.

D.

Associate the VLAN pool with the VMM domain.

Buy Now
Questions 20

The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI leaf to learn a source IP as a local endpoint? (Choose two.)

Options:

A.

Through Ethernet traffic received in a bridge domain.

B.

IP traffic routed through an SVI.

C.

Through VXLAN traffic received on the uplink.

D.

IP traffic routed through a Layer 3 Out.

E.

Through ARP received on an SVI.

Buy Now
Questions 21

A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

Options:

A.

tenant

B.

security domain

C.

primary Cisco APIC

D.

managed object class

Buy Now
Questions 22

In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?

Options:

A.

Select Out-of-Band as Management EPG in the default DateTimePolicy.

B.

Create an Override Policy with NTP Out-of-Band for leaf and spine switches.

C.

Change the interface used for APIC external connectivity to ooband.

D.

Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol.

Questions 23

An engineer is troubleshooting fabric discovery in a newly deployed Cisco ACI fabric and analyzes this output:

Which ACI fabric address is assigned to interface lo1023?

Options:

A.

Dynamic tunnel endpoint

B.

Physical tunnel endpoint

C.

Fabric tunnel endpoint

D.

VXLAN tunnel endpoint

Buy Now
Questions 24

What is the purpose of the Overlay Multicast TEP in a Cisco ACI Multi-Site deployment?

Options:

A.

to source and receive unicast VXLAN data plane traffic

B.

to establish MP-BGP EVPN adjacencies with the spine nodes in remote sites

C.

to encapsulate multicast traffic in a common multicast group

D.

to perform head-end replication for BUM traffic

Buy Now
Questions 25

An engineer is implementing a Cisco ACI environment that consists of more than 20 servers. Two of the servers support only Cisco Discovery Protocol with no order link discovery protocol. The engineer wants the servers to be discovered automatically by the Cisco ACI fabric when connected. Which action must be taken to meet this requirement?

Options:

A.

Create an override policy that enables Cisco Discovery Protocol after LLDP is enabled in the default policy group.

B.

Configure a higher order interface policy that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

C.

Configure a lower order policy group that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

D.

Create an interface profile for the interface that disables LLDP on the desired switch that is referenced by the interface policy group.

Buy Now
Questions 26

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

Options:

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Buy Now
Questions 27

Which protocol does ACI use to securely sane the configuration in a remote location?

Options:

A.

SCP

B.

HTTPS

C.

TFTP

D.

FTP

Buy Now
Questions 28

In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

Options:

A.

VXLAN

B.

LLDP

C.

ISIS

D.

STP

Buy Now
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (DCACI)
Last Update: Apr 25, 2024
Questions: 192

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90