Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

Cisco 300-620 Dumps

Page: 1 / 7
Total 192 questions

Implementing Cisco Application Centric Infrastructure (DCACI) Questions and Answers

Question 1

When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

Options:

A.

all leaf switches and all spine nodes

B.

only spine switches where the bridge domain of the tenant is present

C.

only leaf switches where the bridge domain of the tenant is present

D.

all border leaf nodes where the bridge domain of the tenant is present

Question 2

Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from

being learned by the fabric?

Options:

A.

enable Limit IP Learning to Subnet

B.

enable Unicast Routing

C.

enable IP Data-plane Learning

D.

enable ARP Flooding to BD

Question 3

An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

Options:

A.

Layer 2 remote fabric

B.

Layer 2 outside

C.

Layers 2 internal

D.

Static path binding

E.

VXLAN outside

Question 4

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

Question 5

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Question 6

What does a bridge domain represent?

Options:

A.

Layer 3 cloud

B.

Layer 2 forwarding construct

C.

tenant

D.

physical domain

Question 7

An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy?

Options:

A.

LACP Active

B.

MAC Pinning

C.

LACP Passive

D.

MAC Pinning-Physical-NIC-load

Question 8

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

Options:

A.

OSPF

B.

ISIS

C.

BGP

D.

EIGRP

Question 9

Refer to the exhibit. A network engineer must complete the Cisco ACI implementation based on the logical system design created by the systems architect. Which Cisco ACI object is required where the dotted line indicates to complete the task?

Options:

A.

contract

B.

application profile

C.

context

D.

attachable Access Entity Profile

Question 10

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

Options:

A.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure.

B.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports.

C.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain.

D.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers.

Question 11

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

Options:

A.

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

Question 12

When a pre-provision immediacy is used, when is the policy downloaded to the Cisco ACI leaf switch?

Options:

A.

The policy is downloaded and programmed in the hardware policy CAM when the change is implemented on the Cisco APIC.

B.

The policy is programmed in the hardware policy CAM when the policy is downloaded in the leaf software.

C.

The policy is programmed in the hardware policy CAM when the first packet is received through the data path.

D.

The policy is downloaded to the associated leaf switch software when the ESXi host is attached to a DVS.

Question 13

In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

Options:

A.

VXLAN

B.

LLDP

C.

ISIS

D.

STP

Question 14

An engineer is extending EPG connectivity to an external network. The external network houses the Layer 3 gateway and other end hosts. Which ACI bridge domain configuration should be used?

Options:

A.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

B.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

C.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

D.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

Question 15

Refer to the exhibit. An engineer must divert the traffic between VM-1 and VM-2 by using a Multi-Node service graph. The solution should prevent an insufficient number of available Layer 4 to Layer 7 devices in the first cluster. Which configuration set accomplishes this goal?

Options:

A.

PBR node tracking

tracking threshold with action bypass

symmetric PBR

resilient hashing

B.

PBR node tracking

tracking threshold with action permit

unidirectional PBR

resilient hashing

C.

PBR node tracking

tracking threshold with action permit

symmetric PBR

resilient hashing

D.

PBR node tracking

tracking threshold with action deny

symmetric PBR

unidirectional PBR

Question 16

An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

Options:

A.

from leaf ports tagged as VLAN 0

B.

from leaf ports untagged

C.

from leaf ports tagged as VLAN 4094

D.

from leaf ports tagged as VLAN 1

Question 17

A customer must upgrade the Cisco ACI fabric to use a feature from the new code release. However, there is no direct path from the current release to the desired one. Based on the Cisco APIC Upgrade/Downgrade Support Matrix, the administrator must go through one intermediate release.

Which set of steps must be taken to upgrade the fabric to the new release?

Options:

A.

Upgrade the APICs to an interim release.

Upgrade the switches to an interim release.

Upgrade the APICs to the targeted release.

Upgrade the leaf and spine switches to the targeted release.

B.

Upgrade the APICs to an interim release and then switches to an interim release.

When all switches are operational, upgrade leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Upgrade the APICs to the targeted release.

C.

Upgrade the APICs to an interim release.

Upgrade the leaf switches directly to the targeted release.

Upgrade the spine switches directly to the targeted release.

Upgrade the APICs to the targeted release.

D.

Upgrade the APICs directly to the targeted release.

Upgrade the switches to an interim release.

When all switches are operational, upgrade the leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Question 18

Refer to the exhibit.

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

Options:

A.

300

B.

410

C.

350

D.

510

Question 19

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

Options:

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Question 20

The customer is looking for redundant interconnection of the existing network to the new ACI fabric. Unicast and multicast traffic must be routed between the two networks. Which L3Out implementation meets these requirements?

Options:

A.

B.

C.

D.

Question 21

Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

Options:

A.

endpoint

B.

adjacency

C.

RIB

D.

ARP

Question 22

Where are STP BPDUSs flooded in Cisco ACI fabric?

Options:

A.

in the access encapsulation VLAN part of different VLAN pools

B.

in the bridge domain VLAN

C.

in the native VLAN ID

D.

in the VNID that is assigned to the FD VLAN

Question 23

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

Options:

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Question 24

A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements?

Options:

A.

Configure ACI Service Graph with Unidirectional PBR.

B.

Implement ACI Service Graph with GIPo.

C.

Implement ACI Service Graph Two Nodes with GIPo.

D.

Configure ACI Service Graph with Symmetric PBR.

Question 25

Refer to the exhibit.

Which two objects are created as a result of the configuration? (Choose two.)

Options:

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Question 26

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 27

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

Options:

A.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Question 28

Refer to the exhibit.

An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)

Options:

A.

Layer 3 routed port

B.

VPC with SVI

C.

port channel with SVI

D.

Layer 3 routed subinterface

E.

Layer 3 floating SVI

Page: 1 / 7
Total 192 questions