Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Exam Practice Test

Page: 1 / 19
Total 192 questions

Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Question 1

What controls communication between EPGs?

Options:

A.

Inter-EPG communication is controlled by BGP.

B.

Inter-EPG communication is controlled by contracts.

C.

Inter-EPG communication is controlled by IS-IS.

D.

Inter-EPG communication is controlled by VXLAN.

Question 2

What is MP-BGP used for in Cisco ACl fabric?

Options:

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

Question 3

Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

Options:

A.

The source MAC and IP address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

No source MAC or IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a remote endpoint.

Question 4

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

Options:

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Question 5

What two actions should be taken to deploy a new Cisco ACI Multi-Pod setup? (Choose two.)

Options:

A.

Configure MP-BGP on IPN routers that face the Cisco ACI spines.

B.

Connect all spines to the IPN.

C.

Configure anycast RP for the underlying multicast protocol

D.

Configure the TEP pool of the new pod to be routable across the IPN.

E.

Increase interface MTU for all IPN routers to support VXLAN traffic.

Question 6

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

Options:

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Question 7

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

Options:

A.

Divide Cisco APIC controllers into two or more maintenance groups.

B.

Grant tenant-ext-admin access to a user who performs an upgrade

C.

Combine all switches into an upgrade group.

D.

Divide switches into two or more maintenance groups.

E.

Grant the fabric administrator role to a user who performs an upgrade.

Question 8

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.

over Layer 3 directly connected back-to-back spines

B.

over Layer 3 Out connectivity via border leafs

C.

over Layer 3 IPN connectivity via spines

D.

over Layer 3 IPN connectivity via border leafs

Question 9

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

Options:

A.

extending the routed domain out of the ACI fabric

B.

creating a single homed Layer 3 Out

C.

creating an external physical network

D.

extending the bridge domain out of the ACI fabric

E.

extending the EPG out of the ACI fabric

Question 10

Refer to the exhibit.

Question # 10

Which Adjacency Type value should be set when the client endpoint and the service node

interface are in a different subnet?

Options:

A.

Routed

B.

Unicast

C.

L3Out

D.

L3

Question 11

Question # 11

Refer to the exhibit. An engineer is configuring a production Multi-Site solution to provide connectivity from EPGs from a specific site to networks reachable through a remote site L3OUT. All required schema and template objects are already defined. Which additional configuration must be implemented in the Multi-Site Orchestrator to support the cross-site connectivity?

Options:

A.

Configure a routable TEP pool for SITE1.

B.

Enable CloudSec for intersite traffic encryption.

C.

Add a new stretched external EPG to the existing L3OUT.

D.

Implement a policy-based redirect using a service graph.

Question 12

Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

Options:

A.

The source MAC address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

The source IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a local endpoint.

Question 13

A network engineer is integrating a new Hyperflex storage duster into an existing Cisco ACI fabric The Hyperflex cluster must be managed by vCenter so a new vSphere Distributed switch must be created In addition the hardware discovery must be performed by a vendor-neutral discovery protocol Which set of steps meets these requirements'?

Question # 13

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal?

Options:

A.

Static Channel

B.

MAC Pinning

C.

LACP

D.

LLDP

Question 15

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Question # 15

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 16

Refer to the exhibit.

Question # 16

Which two objects are created as a result of the configuration? (Choose two.)

Options:

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Question 17

A customer is deploying a new application across two ACI pods that is sensitive to latency and jitter. The application sets the DSCP values of packets to AF31 and CS6, respectively. Which configuration changes must be made on the APIC to support the new application and prevent packets from being delayed or dropped between pods?

Options:

A.

disable DSCP mapping on the IPN devices

B.

disable DSCP translation policy

C.

align the ACI QoS levels and IPN QoS policies

D.

align the custom QoS policy on the EPG site in the customer tenant

Question 18

How is an EPG extended outside of the ACI fabric?

Options:

A.

Create an external bridged network that is assigned to a leaf port.

B.

Create an external routed network that is assigned to an EPG.

C.

Enable unicast routing within an EPG.

D.

Statically assign a VLAN ID to a leaf port in an EPG.

Question 19

Refer to the exhibit.

Question # 19

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

Options:

A.

300

B.

410

C.

350

D.

510

Question 20

What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

Options:

A.

L2 unknown unicast: flood

B.

GARP based detection

C.

unicast routing

D.

subnet scope

Question 21

A Cisco ACI endpoint group must have its gateway address migrated out of the ACI fabric. An engineer configures EPG-TEST with a static port binding and configures the encap VLAN with the required VLAN. Which configuration set must be used on the bridge domain to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

Unicast Routing: Disabled

ARP Flooding: Enabled

B.

L2 Unknown Unicast: Hardware Proxy

Unicast Routing: Disabled

ARP Flooding: Disabled

C.

L2 Unknown Unicast: Flood

Unicast Routing: Disabled

ARP Flooding: Enabled

D.

L2 Unknown Unicast: Flood

Unicast Routing: Enabled

ARP Flooding: Enabled

Question 22

Which class of ACI object is presented in this output?

Question # 22

Options:

A.

Contract

B.

Bridge Domain

C.

Tenant

D.

Endpoint

Question 23

A network administrator configures AAA inside the Cisco ACI fabric. The authentication goes through the local users if the TACACS+ server is not reachable. If the Cisco APIC is out of the cluster, the access must be granted through the fallback domain. Which configuration set meets these requirements?

Options:

A.

Ping Check: True

Default Authentication Realm: Local

Fallback Check: True

B.

Ping Check: True

Default Authentication Realm: TACACS+

Fallback Check: False

C.

Ping Check: False

Default Authentication Realm: Local

Fallback Check: False

D.

Ping Check: False

Default Authentication Realm: TACACS+

Fallback Check: True

Question 24

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

Options:

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Question 25

Question # 25

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Question 26

Question # 26

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Question 27

Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

Options:

A.

endpoint

B.

adjacency

C.

RIB

D.

ARP

Question 28

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

Options:

A.

access policy

B.

infra tenant

C.

switch profile

D.

fabric policy

Question 29

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

Question # 29

Options:

Question 30

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

Options:

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Question 31

Where are STP BPDUSs flooded in Cisco ACI fabric?

Options:

A.

in the access encapsulation VLAN part of different VLAN pools

B.

in the bridge domain VLAN

C.

in the native VLAN ID

D.

in the VNID that is assigned to the FD VLAN

Question 32

In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

Options:

A.

Endpoint information is not exchanged across sites unless COOP protocol is used.

B.

Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.

C.

Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.

D.

Endpoint information is exchanged across sites when the endpoints are discovered in both sites.

Question 33

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

Options:

A.

FD

B.

EPG

C.

VRF

D.

BD

Question 34

Question # 34

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

Question # 34

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 35

Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

Options:

A.

VMM domain profile

B.

EPG static port binding

C.

Layer 3 outside interface association

D.

IP address pool association

E.

EPG association

Question 36

Question # 36

Refer to the exhibit. A network engineer must complete the Cisco ACI implementation based on the logical system design created by the systems architect. Which Cisco ACI object is required where the dotted line indicates to complete the task?

Options:

A.

contract

B.

application profile

C.

context

D.

attachable Access Entity Profile

Question 37

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Question 38

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

Options:

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Question 39

Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

Options:

A.

cisco-security domain

B.

cisco-auth-features

C.

cisco-aci-role

D.

cisco-av-pair

Question 40

Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

Options:

A.

vzAny contracts

B.

standard contracts

C.

application EPGs

D.

uSeg EPGs

Question 41

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

Options:

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Question 42

Refer to the exhibit.

Question # 42

An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?

Options:

A.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the provider tenant.

B.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

C.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

D.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the consumer tenant.

Question 43

Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.

Question # 43

Options:

Question 44

An engineer is troubleshooting fabric discovery in a newly deployed Cisco ACI fabric and analyzes this output:

Question # 44

Which ACI fabric address is assigned to interface lo1023?

Options:

A.

Dynamic tunnel endpoint

B.

Physical tunnel endpoint

C.

Fabric tunnel endpoint

D.

VXLAN tunnel endpoint

Question 45

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

Options:

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Question 46

What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination

endpoint?

Options:

A.

The leaf switch does not learn the source endpoint through data plane learning.

B.

The leaf switch drops the traffic that is destined to the endpoint.

C.

The leaf switch floods the traffic to the endpoint throughout the fabric.

D.

The leaf switch sends the traffic to the wrong destination leaf.

Question 47

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

Options:

A.

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.

Enable an L30ut with Shared Route Control Subnet.

C.

Configure subnets with the External Subnets for External EPG flag enabled.

D.

Configure subnets with the Import Route Control Subnet flag enabled.

Question 48

Refer to the exhibit.

Question # 48

An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of “Tenant | Application | EPG”. Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG”?

Options:

A.

enable tag collection

B.

security domains

C.

delimiter

D.

virtual switch name

Question 49

Which description regarding the initial APIC cluster discovery process is true?

Options:

A.

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.

Every switch is assigned a unique AV by the APIC.

C.

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.

The ACI fabric is discovered starting with the spine switches.

Question 50

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Question 51

Question # 51

Refer to the exhibit. The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?

Options:

A.

Export Route Control Subnet

Import Route Control Subnet

Aggregate Shared Routes

B.

External Subnets for External EPG

Shared Route Control Subnet

Shared Security Import Subnet

C.

External Subnets for External EPG

Import Route Control Subnet

Shared Route Control Subnet

D.

Export Route Control Subnet

Shared Security Import Subnet

Aggregate Shared Routes

Question 52

What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?

Options:

A.

A cluster is capable to be deployed in transparent mode across pods.

B.

A different MAC/IP configuration combination is configurable for the firewall in each pod.

C.

Local traffic in a pod is load-balanced between the clustered firewalls.

D.

The local pod anycast node is preferred by the local spines.

Question 53

An ACI engineer is implementing a Layer 3 out inside the Cisco ACI fabric that must meet these requirements:

    The data center core switch must be connected to one of the leaf switches with a single 1G link.

    The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.

    The data center core switch interface must be using 802.1Q tagging, and each vlan will be configured with a dedicated IP address.

Which set of steps accomplishes these goals?

Options:

A.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Set up the Routed External Network object ana Node Profile, selecting ElGRP Create the Switch profile, selecting Port-channel and the appropriate interfaces Create the default network and associate it with the Routed Outside object.

B.

Set up the BGP Protocol policy with the Autonomous System number of 0.

Configure an interface policy and an External Bridged Domain.

Create an External Bridged Network using the configured VLAN pool.

Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.

C.

Configure the OSPF Protocol policy with an area of 0.

Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol. Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN. Configure the External Network object with a network of 0.0.0.0/0.

D.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile selecting ElGRP Configure the Interface profile selecting Routed Interface and the appropriate interfaces. Create the External Network object with a network of 0.0.0.0/0.

Question 54

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

Options:

A.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure.

B.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports.

C.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain.

D.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers.

Question 55

An engineer must configure a Layer 3 connection to the WAN router. The hosts in production VRF must access WAN subnets. The engineer associates EPGs in the production VRF with the external routed domain. Which action completes the task?

Options:

A.

Configure the Export Route Control Subnet scope for the external EPG.

B.

Configure the External Subnets for the External EPG scope for the external EPG.

C.

Configure the Import Route Control Subnet scope for the external EPG.

D.

Configure the Shared Route Control Subnet scope for the external EPG.

Question 56

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

Options:

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Question 57

An engineer must configure RADIUS authentication with Cisco ACI for remote authentication with out-of-band management access. Drag and drop the RADIUS configuration steps from the left into the required implementation order on the right. Not all steps are used.

Question # 57

Options:

Page: 1 / 19
Total 192 questions