Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-620 Questions and Answers

Question # 6

An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?

A.

GOLF

B.

Multi-Site

C.

Multi-Pod

D.

Stretched Fabric

Full Access
Question # 7

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

A.

extending the routed domain out of the ACI fabric

B.

creating a single homed Layer 3 Out

C.

creating an external physical network

D.

extending the bridge domain out of the ACI fabric

E.

extending the EPG out of the ACI fabric

Full Access
Question # 8

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

Full Access
Question # 9

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Full Access
Question # 10

An engineer configures a Cisco ACI Multi-Pod for disaster recovery. Which action should be taken for the new nodes to be discoverable by the existing Cisco APICs?

A.

Configure IGMPv3 on the interfaces of IPN routers that face the Cisco ACI spine.

B.

Enable subinterfaces with dot1q tagging on all links between the IPN routers.

C.

Enable DHCP relay on all links that are connected to Cisco ACI spines on IPN devices.

D.

Configure BGP as the underlay protocol in IPN.

Full Access
Question # 11

A network engineer configures the Cisco ACI fabric to connect to vCenter with these requirements:

Port groups must be automatically created on the distributed virtual switch.

Port groups must use the VLAN allocation in the range between 20-30.

The deployment must optimize the CAM space on the leaf switches.

Which set of actions meets these criteria?

A.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

B.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

C.

Create a static VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

D.

Create a static VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

Full Access
Question # 12

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Full Access
Question # 13

A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

A.

tenant

B.

security domain

C.

primary Cisco APIC

D.

managed object class

Full Access
Question # 14

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Full Access
Question # 15

A network engineer must integrate VMware vCenter cluster with Cisco ACI. The requirement is for the management traffic of the hypervisors and VM controllers to use the virtual switch associated with the Cisco Application Policy. The EPG called "Vmware-MGMT" with VLAN 300 has been created for this purpose. Which set of steps must be taken to complete the configuration?

A.

Add VLAN 300 with static allocation to the VLAN POOL that is used for VMM integration.

Attach the VMM domain to the target EPG with resolution preprovision, mode static, untagged access VLAN, and Port-Encap 300.

B.

Associate the target EPG with the VMM domain with default settings.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

C.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

Associate the target EPG with the VMM domain with default settings.

D.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

Create a static binding in the target EPG toward VMware hypervisors with VLAN 300, untagged access VLAN, and Untagged 802.1P mode.

Full Access
Question # 16

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Full Access
Question # 17

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Full Access
Question # 18

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Full Access
Question # 19

Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

A.

The source MAC and IP address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

No source MAC or IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a remote endpoint.

Full Access
Question # 20

An engineer deploys a two-pod Cisco ACI Multi-Pod environment. Why should no more than two Cisco APIC controllers be deployed in the same pod?

A.

to enable equal capacity to scale in each pod

B.

to avoid losing all replicas of a shard if a pod fails

C.

to avoid hair-pinning traffic that is destined for the primary APIC controller between pods

D.

to ensure that all nodes in all pods have local access to a controller

Full Access
Question # 21

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

A.

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.

Enable an L30ut with Shared Route Control Subnet.

C.

Configure subnets with the External Subnets for External EPG flag enabled.

D.

Configure subnets with the Import Route Control Subnet flag enabled.

Full Access
Question # 22

An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain. Which action must be completed in this scenario?

A.

The Management VMkernel EPG resolution must be set to Pre-Provosion.

B.

The administrator must create an in-band VMM Management EPG before performing the migration.

C.

The administrator must set the Management VMkernel BD resolution immediacy to On-Demand.

D.

The VMkernel Management BD must be located under the Management Tenant.

Full Access
Question # 23

A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/ L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

A.

ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.

B.

A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.

C.

ACI Multi-Pod requires an IP Network supporting PIM-Bidir.

D.

ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.

E.

Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.

Full Access
Question # 24

An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?

A.

BPDU Guard

B.

per-VLANMCP

C.

Storm Control

D.

BPDU Filter

Full Access
Question # 25

An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

A.

It is forwarded to one of the spines to perform as a spine proxy.

B.

It is flooded within the whole fabric.

C.

It is dropped by the leaf when the destination endpoint is not present in the endpoint table.

D.

It is forwarded to one of the APICs to perform as a proxy.

Full Access
Question # 26

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Full Access
Question # 27

An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics?

A.

All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected.

B.

Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts can be monitored.

C.

EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not collected.

D.

The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic.

Full Access
Question # 28

Refer to the exhibit.

An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)

A.

LACP Mode: LACP Standby

B.

LB Mode: Destination IP Address and TCP/UDP Port

C.

LB Mode: Source and Destination MAC Address

D.

LB Mode: Source IP Address and TCP/UDP Port

E.

LACP Mode: LACP Active

Full Access
Question # 29

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

A.

Create an additional login domain that references local accounts

B.

Enable the fallback check with the default authentication domain

C.

Associate console authentication with the "RADIUS" realm.

D.

Reference the local realm in the fallback domain

Full Access
Question # 30

Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)

A.

iBGP

B.

VXLAN

C.

IS-IS

D.

RIPv2

E.

eBGP

Full Access
Question # 31

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Full Access
Question # 32

Drag and drop the Cisco ACI Layer 4 to Layer 7 service insertion terms on the left to the correct descriptions on the right.

Full Access
Question # 33

In a Cisco ACI Multi-Site fabric, the Inter-Site BUM Traffic Allow option is enabled in a specific stretched bridge domain. What is used to forward BUM traffic to all endpoints in the same broadcast domain?

A.

ingress replication on the spines in the source site

B.

egress replication on the destination leaf switches

C.

egress replication on the source leaf switches

D.

ingress replication on the spines in the destination site

Full Access
Question # 34

Refer to the exhibit. The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?

A.

Export Route Control Subnet

Import Route Control Subnet

Aggregate Shared Routes

B.

External Subnets for External EPG

Shared Route Control Subnet

Shared Security Import Subnet

C.

External Subnets for External EPG

Import Route Control Subnet

Shared Route Control Subnet

D.

Export Route Control Subnet

Shared Security Import Subnet

Aggregate Shared Routes

Full Access
Question # 35

Refer to the exhibit.

Which two objects are created as a result of the configuration? (Choose two.)

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Full Access
Question # 36

An engineer must advertise a selection of external networks learned from a BGP neighbor into the ACI fabric. Which L3Out subnet configuration option creates an inbound route map for route filtering?

A.

External Subnets for the External EPG

B.

Shared Route Control Subnet

C.

Import Route Control Subnet

D.

Shared Security Import Subnet

Full Access
Question # 37

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

Full Access
Question # 38

Refer to the exhibit.

An engineer is implementing Cisco ACI – VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in “route based on originating virtual port” on the VMware VDS?

A.

Static Channel – Mode On

B.

MAC Pinning-Physical-NIC-load

C.

LACP Passive

D.

MAC Pinning+

E.

LACP Active

Full Access
Question # 39

An engineer is implementing a Cisco ACI environment that consists of more than 20 servers. Two of the servers support only Cisco Discovery Protocol with no order link discovery protocol. The engineer wants the servers to be discovered automatically by the Cisco ACI fabric when connected. Which action must be taken to meet this requirement?

A.

Create an override policy that enables Cisco Discovery Protocol after LLDP is enabled in the default policy group.

B.

Configure a higher order interface policy that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

C.

Configure a lower order policy group that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

D.

Create an interface profile for the interface that disables LLDP on the desired switch that is referenced by the interface policy group.

Full Access
Question # 40

Which two statements regarding ACI Multi-Site are true? (Choose two.)

A.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

B.

Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.

C.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.

E.

The Inter-Site network routers should run OSPF to establish peering with the spines.

Full Access
Question # 41

Which tenant is used when configuring in-band management IP addresses for Cisco APICs, leaf nodes, and spine nodes?

A.

default

B.

infra

C.

common

D.

mgmt

Full Access
Question # 42

What is the minimum number of APICs does Cisco recommend to deploy in a production cluster?

A.

1

B.

3

C.

4

D.

5

Full Access
Question # 43

A Cisco ACI bridge domain and VRF are configured with a default data-plane learning configuration. Which two endpoint attributes are programmed in the leaf switch when receiving traffic? (Choose two.)

A.

Remote MAC. IP

B.

Remote Subnet

C.

Local IP, not MAC

D.

Local MAC, IP

E.

Local Subnet

F.

Remote IP

Full Access
Question # 44

New ESXi hosts are procured in a data center compute expansion project. An engineer must update the

configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM

domain. Which action should be taken to support this change?

A.

Create a range of internal VLANs in the associated VLAN pool.

B.

Set the encapsulation mode as VXLAN.

C.

Enable infrastructure VLAN in the associated AEP.

D.

Map the leaf interface selector to the AEP that is associated with the VMM domain.

Full Access
Question # 45

What are two descriptions of ACI multi-site? (Choose two.)

A.

The Inter-Site network routers should run OSPF to establish peering with the spines.

B.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

C.

Routers in the inter-Site network must run OSPF. DHCP relay, and MP-BGP

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites

E.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site

Full Access
Question # 46

Refer to the exhibit. Which two configurations enable inter-VRF communication? (Choose two.)

A.

Set the subnet scope to Shared Between VRFs.

B.

Enable Advertise Externally under the subnet scope.

C.

Export the contract and import as a contract interface.

D.

Change the contract scope to Tenant.

E.

Change the subject scope to VRF.

Full Access
Question # 47

Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?

A.

ARP gleaning

B.

dynamic endpoint attach

C.

hardware proxy

D.

network-stitching

Full Access
Question # 48

Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from

being learned by the fabric?

A.

enable Limit IP Learning to Subnet

B.

enable Unicast Routing

C.

enable IP Data-plane Learning

D.

enable ARP Flooding to BD

Full Access
Question # 49

A network engineer must backup the PRODUCTION tenant. The configuration backup should be stored on the APIC using a markup language and contain all secure information. Which export policy must be used to meet these requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option D

D.

Option D

Full Access
Question # 50

Which class of ACI object is presented in this output?

A.

Contract

B.

Bridge Domain

C.

Tenant

D.

Endpoint

Full Access
Question # 51

An organization deploys active-active data centers and active-standby firewalls in each data center. Which action should be taken in a Cisco ACI Multi-Pod to maintain traffic symmetry through the firewalls?

A.

Disable Resilient Hashing.

B.

Disable service node Health Tracking.

C.

Enable Pod ID Aware Redirection.

D.

Enable Endpoint Dataplane Learning.

Full Access
Question # 52

Which statement regarding ACI Multi-Pod and TEP pool is true?

A.

The IP addresses used in the IPN network can overlap TEP pool of the APIC.

B.

A different TEP pool must be assigned to each Pod.

C.

The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.

D.

The same TEP pool is used in all Pods.

Full Access
Question # 53

A network administrator configures AAA inside the Cisco ACI fabric. The authentication goes through the local users if the TACACS+ server is not reachable. If the Cisco APIC is out of the cluster, the access must be granted through the fallback domain. Which configuration set meets these requirements?

A.

Ping Check: True

Default Authentication Realm: Local

Fallback Check: True

B.

Ping Check: True

Default Authentication Realm: TACACS+

Fallback Check: False

C.

Ping Check: False

Default Authentication Realm: Local

Fallback Check: False

D.

Ping Check: False

Default Authentication Realm: TACACS+

Fallback Check: True

Full Access
Question # 54

Refer to the exhibit. A Cisco ACI fabric displays this fault. Which set of actions modifies the event to be displayed as a warning in the future?

A.

Navigate to the ACI Events tab.

Create a new record.

B.

Navigate to the ACI Fault tab.

Create a new record.

C.

Navigate to the ACI Events tab.

Change the severity level.

D.

Navigate to the ACI Fault tab.

Change the severity level.

Full Access
Question # 55

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

A.

FD

B.

EPG

C.

VRF

D.

BD

Full Access
Question # 56

When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

A.

limit IP learning to subnet

B.

scope

C.

gateway IP

D.

subnet control

Full Access
Question # 57

Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

A.

The source MAC address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

The source IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a local endpoint.

Full Access