Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Exam Practice Test

Demo: 57 questions
Total 192 questions

Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Question 1

Which type of profile needs to be created to deploy an access port policy group?

Options:

A.

attachable entity

B.

Pod

C.

module

D.

leaf interface

Question 2

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Question 3

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

Options:

A.

Management IP of APICs

B.

Management IP of the MSO Node

C.

Anycast Overlay Multicast TEP

D.

MP-BGP EVPN Router-ID

E.

Common Pervasive Gateway

Question 4

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

Options:

Question 5

An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

Options:

A.

It is forwarded to one of the spines to perform as a spine proxy.

B.

It is flooded within the whole fabric.

C.

It is dropped by the leaf when the destination endpoint is not present in the endpoint table.

D.

It is forwarded to one of the APICs to perform as a proxy.

Question 6

Which statement regarding ACI Multi-Pod and TEP pool is true?

Options:

A.

The IP addresses used in the IPN network can overlap TEP pool of the APIC.

B.

A different TEP pool must be assigned to each Pod.

C.

The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.

D.

The same TEP pool is used in all Pods.

Question 7

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.

Acknowledge the QoS-related error.

B.

Associate a custom QoS class.

C.

Create a custom QoS policy.

D.

Set the QoS policy to Level 3.

Question 8

Refer to the exhibit. Server A is connected to the Cisco ACI fabric using two teamed interfaces. One interface in a team is configured as active and the other remains in standby mode. When a failover occurs and the standby interface becomes active, it uses its built-in MAC address to send traffic. Which bridge domain configuration must be applied to resolve the issue?

Options:

A.

Configure Hardware proxy.

B.

Set L2 Unknown Unicast to Flood.

C.

Enable ARP flooding.

D.

Activate Limit IP Learning to Subnet.

Question 9

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

Options:

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Question 10

An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.

Options:

Question 11

An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used?

Options:

A.

interface policy group

B.

switch policy group

C.

switch profile

D.

interface profile

Question 12

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 13

Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?

Options:

A.

Enable MCP on the ACI fabric.

B.

Disable STP in the external network.

C.

Disable STP on the ACI fabric.

D.

Enable STP on the ACI fabric.

Question 14

Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

Options:

A.

cisco-security domain

B.

cisco-auth-features

C.

cisco-aci-role

D.

cisco-av-pair

Question 15

A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with network control policies. The APIC is as follows:

    Tenant = TenantX

    Security Domain = Tenantx-SD

    User = X

The customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these requirement?

Options:

A.

shell:domains = TenantX-SD/fabric-admin/,common//read-all

B.

shell:domains = TenantX-SD/tenant-admin

C.

shell:domains = TenantX-SD/tenant-ext-admin/,common//read-all

D.

shell:domains = TenantX-SD/tenant-admin/,common//read-all

Question 16

An engineer must connect Cisco ACI fabric using Layer 2 with external third-party switches. The third-party

switches are configured using 802.1s protocol. Which two constructs are required to complete the task?

(Choose two.)

Options:

A.

spanning tree policy for mapping MST Instances to VLANs

B.

MCP policy with PDU per VLAN enabled

C.

MCP instance policy with administrative slate disabled

D.

dedicated EPG for native VLAN

E.

static binding of native VLAN in all existing EPGs

Question 17

Refer to the exhibit. A company decided to decrease its routing footprint and remove RT-2 and RT-3 devices from its data center. Because of that, the exit point must be created from all the tenants by using the common tenant. Which two configuration tasks must be completed to meet these requirements? (Choose two.)

Options:

A.

Move subnets from all the bridge domains to the EPG level and mark them with flag Shared between VRFs.

B.

Update the L3Out ExtEPG subnet in the common tenant with flag Shared Route Control Subnet and Aggregate Shared Routes.

C.

Mark all subnets with flag Shared between VRFs and attach contract Ctr-3 as a provider to all the EPGs.

D.

Change contract Ctr-3 scope to Global, consume it by all EPGs, and flag all subnets with flag Shared between VRFs.

E.

Export contract Ctr-2 into the tenant TN-1 and attach it as a consumer to all the EPGs in the tenant TN-1.

Question 18

Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

Options:

A.

vzAny contracts

B.

standard contracts

C.

application EPGs

D.

uSeg EPGs

Question 19

Refer to the exhibit.

Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

Options:

A.

Spine1

B.

apic1

C.

Spine2

D.

Leaf1

E.

Leaf2

F.

apic2

Question 20

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

Options:

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Question 21

Refer to the exhibit.

Which Adjacency Type value should be set when the client endpoint and the service node

interface are in a different subnet?

Options:

A.

Routed

B.

Unicast

C.

L3Out

D.

L3

Question 22

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.

over Layer 3 directly connected back-to-back spines

B.

over Layer 3 Out connectivity via border leafs

C.

over Layer 3 IPN connectivity via spines

D.

over Layer 3 IPN connectivity via border leafs

Question 23

The customer is looking for redundant interconnection of the existing network to the new ACI fabric. Unicast and multicast traffic must be routed between the two networks. Which L3Out implementation meets these requirements?

Options:

A.

B.

C.

D.

Question 24

Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?

Options:

A.

ARP gleaning

B.

dynamic endpoint attach

C.

hardware proxy

D.

network-stitching

Question 25

What represents the unique identifier of an ACI object?

Options:

A.

universal resource identifier (URI)

B.

application programming interface

C.

management information tree

D.

distinguished name

Question 26

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

    Only traffic to known Mac addresses must be allowed to reduce noice.

    The multicast traffic must be limited to the ports that are participating in multicast routing.

    The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?

Options:

A.

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

B.

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

C.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

D.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Question 27

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

Options:

A.

Create an additional login domain that references local accounts

B.

Enable the fallback check with the default authentication domain

C.

Associate console authentication with the "RADIUS" realm.

D.

Reference the local realm in the fallback domain

Question 28

Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

Options:

A.

“Limit IP learning to network” setting within the bridge domain.

B.

“Limit IP learning to subnet” setting within the EPG.

C.

“Limit IP learning to network” setting within the EPG.

D.

“Limit IP learning to subnet” setting within the bridge domain.

Question 29

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

Options:

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

Question 30

What is a requirement for Cisco ACI IPN to manage multidestination traffic?

Options:

A.

pervasive gateway

B.

unicast routing

C.

anycast gateway

D.

multicast routing

Question 31

An engineer must advertise a selection of external networks learned from a BGP neighbor into the ACI fabric. Which L3Out subnet configuration option creates an inbound route map for route filtering?

Options:

A.

External Subnets for the External EPG

B.

Shared Route Control Subnet

C.

Import Route Control Subnet

D.

Shared Security Import Subnet

Question 32

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

Options:

A.

FD

B.

EPG

C.

VRF

D.

BD

Question 33

A network engineer is integrating a new Hyperflex storage duster into an existing Cisco ACI fabric The Hyperflex cluster must be managed by vCenter so a new vSphere Distributed switch must be created In addition the hardware discovery must be performed by a vendor-neutral discovery protocol Which set of steps meets these requirements'?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 34

A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/ L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

Options:

A.

ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.

B.

A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.

C.

ACI Multi-Pod requires an IP Network supporting PIM-Bidir.

D.

ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.

E.

Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.

Question 35

An engineer must add a group of 70 bare-metal ESXi servers to the Cisco ACI fabric, which is integrated with vCenter. These configuration steps are complete:

The configured pool of ESXi hosts is configured with an Attachable Access Entity Profile (AAEP) called AEP_VMM.

The new group uses the AAEP called AEP_BAREMETAL.

Which action extends functional VMM integration to the new nodes?

Options:

A.

Update AAEP to AEP_VMM on all policy groups that are used toward bare-metal servers.

B.

Create a new AAEP container object for policy groups for AEP_VMM.

C.

Implement a separate VMM domain for the bare-metal servers by using AEP_VMM.

D.

Add the VMM domain under the AEP_BAREMETAL AAEP object.

Question 36

An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements:

• Control the amount of application data flowing into the system

• Allow the newly connected device to auto-negotiate link speed with the leaf switch

Which two ACI policies must be configured to achieve these requirements? (Choose two.)

Options:

A.

L2 interface policy

B.

link level policy

C.

slow drain policy

D.

ingress control plane policing policy

E.

ingress data plane policing policy

Question 37

An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?

Options:

A.

Configure the EGP as a provider and L3 out as consumer of the contract.

B.

Configure OSPF to exchange routes between the L3 out and EGP.

C.

Configure a taboo contract and apply it to the EPG.

D.

Configure the EPG as a consumer and L3 out as a provider of the contract.

Question 38

Refer to the exhibit. What must be configured in the service graph to redirect HTTP traffic between the EPG client and EPG server to go through the Cisco ASA firewall?

Options:

A.

precise filter to allow only HTTP traffic

B.

permit-all contract filter

C.

contract with no filter

D.

contract filter to allow ARP and HTTP.

Question 39

Refer to the exhibit.

An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)

Options:

A.

Layer 3 routed port

B.

VPC with SVI

C.

port channel with SVI

D.

Layer 3 routed subinterface

E.

Layer 3 floating SVI

Question 40

A bridge domain for a new endpoint group in the Cisco ACI fabric must meet these requirements:

The bridge domain must function as the default gateway for the subnet so that routing remains within the Cisco ACI fabric.

ARP requests must be managed via Layer 3 unicast packets or be dropped to reduce excessive broadcast traffic.

The impact of misconfigured virtual machines must be kept to a minimum by preventing IP addresses outside of the configured subnet from being routed.

Which set of actions must be taken?

Options:

A.

Disable ARP Flooding.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

B.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set Multi-Destination Flooding to Flood in BD.

C.

Set Endpoint Retention Policy to default.

Enable ARP Flooding.

Enable Unicast Routing on the bridge domain and configure a subnet.

D.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set L2 Unknown Unicast to Flood.

Disable Endpoint Retention Policy.

Question 41

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

Options:

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Question 42

An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy?

Options:

A.

LACP Active

B.

MAC Pinning

C.

LACP Passive

D.

MAC Pinning-Physical-NIC-load

Question 43

An engineer must configure RADIUS authentication with Cisco ACI for remote authentication with out-of-band management access. Drag and drop the RADIUS configuration steps from the left into the required implementation order on the right. Not all steps are used.

Options:

Question 44

In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?

Options:

A.

Select Out-of-Band as Management EPG in the default DateTimePolicy.

B.

Create an Override Policy with NTP Out-of-Band for leaf and spine switches.

C.

Change the interface used for APIC external connectivity to ooband.

D.

Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol.

Question 45

The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal?

Options:

A.

Static Channel

B.

MAC Pinning

C.

LACP

D.

LLDP

Question 46

Refer to the exhibit. The Cisco ACI fabric has an egress L3Out from Leaf-101 and Leaf-102 to CORE-1. VLAN 102 is used to form the OSPF adjacency. The workloads must be migrated into EPG-101, and the static port binding is configured to Leaf-103 e1/1 with encap VLAN 101. An engineer completes the port binding and receives an MCP fault. Which action clears the fault?

Options:

A.

Use VLAN 101 for OSPF adjacency on the egress L3Out.

B.

Use VLAN 102 as the encap VLAN on the EPG-101 static port binding.

C.

Add VLAN 102 to the VLAN pool that is used by the static port binding.

D.

Prune VLAN 101 from the VLAN pool that is used by the egress L3Out.

Question 47

Refer to the exhibit. A Cisco ACI fabric displays this fault. Which set of actions modifies the event to be displayed as a warning in the future?

Options:

A.

Navigate to the ACI Events tab.

Create a new record.

B.

Navigate to the ACI Fault tab.

Create a new record.

C.

Navigate to the ACI Events tab.

Change the severity level.

D.

Navigate to the ACI Fault tab.

Change the severity level.

Question 48

Which two statements regarding ACI Multi-Site are true? (Choose two.)

Options:

A.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

B.

Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.

C.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.

E.

The Inter-Site network routers should run OSPF to establish peering with the spines.

Question 49

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

Options:

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Question 50

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

Options:

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Question 51

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

Options:

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Question 52

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

Options:

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Question 53

Refer to the exhibit. The 0.0.0.0/0 is configured as a default static route on L3Out-1. Which action should be taken for the 0.0.0.0/0 prefix to advertise out on L3Out-2 OSPF?

Options:

A.

Enable Export Route Control Subnet.

B.

Enable Shared Security Import Subnet.

C.

Enable Shared Route Control Subnet.

D.

Enable Aggregate Export Subnet.

Question 54

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

Options:

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Question 55

Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

Options:

A.

VMM domain profile

B.

EPG static port binding

C.

Layer 3 outside interface association

D.

IP address pool association

E.

EPG association

Question 56

A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?

Options:

A.

Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.

B.

Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.

C.

Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault.

D.

Create a new global health score policy that ignores specific faults as identified by their unique fault code.

Question 57

An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a

bridge domain. Which setting should be configured to support this requirement?

Options:

A.

disable Limit IP Learning to Subnet

B.

disable IP Data-plane Learning

C.

disable Unicast Routing

D.

disable Advertise Host Routes

Demo: 57 questions
Total 192 questions