Weekend Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Questions 4

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Buy Now
Questions 5

300-620 Question 5

Refer to the exhibit. The Cisco ACI fabric has an egress L3Out from Leaf-101 and Leaf-102 to CORE-1. VLAN 102 is used to form the OSPF adjacency. The workloads must be migrated into EPG-101, and the static port binding is configured to Leaf-103 e1/1 with encap VLAN 101. An engineer completes the port binding and receives an MCP fault. Which action clears the fault?

Options:

A.

Use VLAN 101 for OSPF adjacency on the egress L3Out.

B.

Use VLAN 102 as the encap VLAN on the EPG-101 static port binding.

C.

Add VLAN 102 to the VLAN pool that is used by the static port binding.

D.

Prune VLAN 101 from the VLAN pool that is used by the egress L3Out.

Buy Now
Questions 6

What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?

Options:

A.

A cluster is capable to be deployed in transparent mode across pods.

B.

A different MAC/IP configuration combination is configurable for the firewall in each pod.

C.

Local traffic in a pod is load-balanced between the clustered firewalls.

D.

The local pod anycast node is preferred by the local spines.

Buy Now
Questions 7

Refer to the exhibit.

300-620 Question 7

An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?

Options:

A.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the provider tenant.

B.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

C.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

D.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the consumer tenant.

Buy Now
Questions 8

300-620 Question 8

Refer to the exhibit. New e-commerce software is deployed on Cisco ACI fabric. The environment must meet these requirements:

The overall number of contracts must be reduced by reusing the existing contracts within a VRF when possible.

The e-commerce software must communicate only with software EPGs that are part of the same ANP.

The e-commerce software must be prevented from communicating with applications in different ANPs.

Which scope must be selected to meet these requirements?

Options:

A.

Application Profile

B.

Endpoint Group

C.

Tenant

D.

Global

Buy Now
Questions 9

Which two protocols are used for fabric discovery in ACI? (Choose two.)

Options:

A.

LLDP

B.

OSPF

C.

CDP

D.

DHCP

E.

ISIS

Buy Now
Questions 10

Refer to the exhibit.

300-620 Question 10

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

Options:

A.

300

B.

410

C.

350

D.

510

Buy Now
Questions 11

A bridge domain for a new endpoint group in the Cisco ACI fabric must meet these requirements:

The bridge domain must function as the default gateway for the subnet so that routing remains within the Cisco ACI fabric.

ARP requests must be managed via Layer 3 unicast packets or be dropped to reduce excessive broadcast traffic.

The impact of misconfigured virtual machines must be kept to a minimum by preventing IP addresses outside of the configured subnet from being routed.

Which set of actions must be taken?

Options:

A.

Disable ARP Flooding.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

B.

Enable Limit IP Learning to Subnet.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set Multi-Destination Flooding to Flood in BD.

C.

Set Endpoint Retention Policy to default.

Enable ARP Flooding.

Enable Unicast Routing on the bridge domain and configure a subnet.

D.

Enable Unicast Routing on the bridge domain and configure a subnet.

Set L2 Unknown Unicast to Flood.

Disable Endpoint Retention Policy.

Buy Now
Questions 12

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

Options:

A.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure.

B.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports.

C.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain.

D.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers.

Buy Now
Questions 13

An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used?

Options:

A.

interface policy group

B.

switch policy group

C.

switch profile

D.

interface profile

Buy Now
Questions 14

How is an EPG extended outside of the ACI fabric?

Options:

A.

Create an external bridged network that is assigned to a leaf port.

B.

Create an external routed network that is assigned to an EPG.

C.

Enable unicast routing within an EPG.

D.

Statically assign a VLAN ID to a leaf port in an EPG.

Buy Now
Questions 15

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

Options:

A.

extending the routed domain out of the ACI fabric

B.

creating a single homed Layer 3 Out

C.

creating an external physical network

D.

extending the bridge domain out of the ACI fabric

E.

extending the EPG out of the ACI fabric

Buy Now
Questions 16

Which new construct must a user create when configuring in-band management?

Options:

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

Buy Now
Questions 17

Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

Options:

A.

cisco-security domain

B.

cisco-auth-features

C.

cisco-aci-role

D.

cisco-av-pair

Buy Now
Questions 18

When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

Options:

A.

datacenter

B.

VMware vSphere Standard vSwitch

C.

VMware vSphere Distributed Switch

D.

cluster

Buy Now
Questions 19

An engineer configures a Cisco ACI Multi-Pod for disaster recovery. Which action should be taken for the new nodes to be discoverable by the existing Cisco APICs?

Options:

A.

Configure IGMPv3 on the interfaces of IPN routers that face the Cisco ACI spine.

B.

Enable subinterfaces with dot1q tagging on all links between the IPN routers.

C.

Enable DHCP relay on all links that are connected to Cisco ACI spines on IPN devices.

D.

Configure BGP as the underlay protocol in IPN.

Buy Now
Questions 20

Which description regarding the initial APIC cluster discovery process is true?

Options:

A.

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.

Every switch is assigned a unique AV by the APIC.

C.

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.

The ACI fabric is discovered starting with the spine switches.

Buy Now
Questions 21

300-620 Question 21

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

Options:

A.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Buy Now
Questions 22

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

300-620 Question 22

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Buy Now
Questions 24

An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

Options:

A.

Layer 2 remote fabric

B.

Layer 2 outside

C.

Layers 2 internal

D.

Static path binding

E.

VXLAN outside

Buy Now
Questions 25

A customer creates Layer 3 connectivity to the outside network. However, only border leaf switches start receiving destination updates to other networks from the newly created L3Out. The updates must also be propagated to other Cisco ACI leaf switches. The L3Out is linked with the EPGs via a contract. Which action must be taken in the pod policy group to accomplish this goal?

Options:

A.

Apply a BGP route reflector policy.

B.

Enable a COOP policy.

C.

Configure an IS-IS policy.

D.

Implement an access management policy.

Buy Now
Questions 26

Refer to the exhibit.

300-620 Question 26

An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)

Options:

A.

LACP Mode: LACP Standby

B.

LB Mode: Destination IP Address and TCP/UDP Port

C.

LB Mode: Source and Destination MAC Address

D.

LB Mode: Source IP Address and TCP/UDP Port

E.

LACP Mode: LACP Active

Buy Now
Questions 27

Which type of policy configures the suppression of faults that are generated from a port being down?

Options:

A.

fault lifecycle assignment

B.

event lifecycle assignment

C.

fault severity assignment

D.

event severity assignment

Buy Now
Questions 28

Refer to the exhibit.

300-620 Question 28

Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

Options:

A.

Spine1

B.

apic1

C.

Spine2

D.

Leaf1

E.

Leaf2

F.

apic2

Buy Now
Questions 29

A customer must deploy three Cisco ACI based data centers. Each site must be separated from the others. Which characteristic of Cisco ACI Multi-Pod makes it unsuitable for this deployment?

Options:

A.

creates a virtual pod in the remote location

B.

requires all pods to share the same Cisco APIC cluster

C.

has distance and scale limitations

D.

places leaf switches in the remote site that belong to the same fabric as at the headquarters site

Buy Now
Questions 30

300-620 Question 30

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Buy Now
Questions 31

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

Options:

A.

Management IP of APICs

B.

Management IP of the MSO Node

C.

Anycast Overlay Multicast TEP

D.

MP-BGP EVPN Router-ID

E.

Common Pervasive Gateway

Buy Now
Questions 32

Refer to the exhibit.

300-620 Question 32

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

Options:

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Buy Now
Questions 33

A network engineer configures the Cisco ACI fabric to connect to vCenter with these requirements:

Port groups must be automatically created on the distributed virtual switch.

Port groups must use the VLAN allocation in the range between 20-30.

The deployment must optimize the CAM space on the leaf switches.

Which set of actions meets these criteria?

Options:

A.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

B.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

C.

Create a static VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

D.

Create a static VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

Buy Now
Questions 34

A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

Options:

A.

tenant

B.

security domain

C.

primary Cisco APIC

D.

managed object class

Buy Now
Questions 35

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

Options:

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Buy Now
Questions 36

Refer to the exhibit.

300-620 Question 36

Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

Options:

A.

Adjust the priority of server 10.1.1.1 to 1.

B.

Set the fallback login to local.

C.

Assign the user to the default role.

D.

Set the default login realm to LDAP

Buy Now
Questions 37

What is a requirement for Cisco ACI IPN to manage multidestination traffic?

Options:

A.

pervasive gateway

B.

unicast routing

C.

anycast gateway

D.

multicast routing

Buy Now
Questions 38

Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

Options:

A.

endpoint

B.

adjacency

C.

RIB

D.

ARP

Buy Now
Questions 39

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

Options:

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Buy Now
Questions 40

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.

over Layer 3 directly connected back-to-back spines

B.

over Layer 3 Out connectivity via border leafs

C.

over Layer 3 IPN connectivity via spines

D.

over Layer 3 IPN connectivity via border leafs

Buy Now
Questions 41

An engineermustsecurely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

300-620 Question 41

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 42

An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.

300-620 Question 42

Options:

Buy Now
Questions 43

An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain. Which action must be completed in this scenario?

Options:

A.

The Management VMkernel EPG resolution must be set to Pre-Provosion.

B.

The administrator must create an in-band VMM Management EPG before performing the migration.

C.

The administrator must set the Management VMkernel BD resolution immediacy to On-Demand.

D.

The VMkernel Management BD must be located under the Management Tenant.

Buy Now
Questions 44

Refer to the exhibit.

300-620 Question 44

Which Adjacency Type value should be set when the client endpoint and the service node

interface are in a different subnet?

Options:

A.

Routed

B.

Unicast

C.

L3Out

D.

L3

Buy Now
Questions 45

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

Options:

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Buy Now
Questions 46

Which two statements regarding ACI Multi-Site are true? (Choose two.)

Options:

A.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

B.

Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.

C.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.

E.

The Inter-Site network routers should run OSPF to establish peering with the spines.

Buy Now
Questions 47

An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?

Options:

A.

Configure the EGP as a provider and L3 out as consumer of the contract.

B.

Configure OSPF to exchange routes between the L3 out and EGP.

C.

Configure a taboo contract and apply it to the EPG.

D.

Configure the EPG as a consumer and L3 out as a provider of the contract.

Buy Now
Questions 48

An engineer must advertise a bridge domain subnet out of the ACI fabric to an OSPF neighbor. Which two configuration steps are required? (Choose two.)

Options:

A.

Configure Subnet scope to Advertised Externally

B.

Add External Subnet for External EPG flag under External EPG.

C.

Create Route Control Profile with the export direction under External EPG.

D.

Add L30ut profile to the bridge domain using Associated L30uts section

E.

Configure the Subnet under the EPG level.

Buy Now
Questions 49

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Buy Now
Questions 50

Refer to the exhibit.

300-620 Question 50

Which two objects are created as a result of the configuration? (Choose two.)

Options:

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Buy Now
Questions 51

An engineer is in the process of discovering a new Cisco ACI fabric consisting of two spines and four leaf switches. The discovery of leaf 1 has just been completed. Which two nodes are expected to be discovered next? (Choose two.)

Options:

A.

spine 1

B.

leaf 4

C.

spine 2

D.

leaf 3

E.

leaf 2

Buy Now
Questions 52

Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.

300-620 Question 52

Options:

Buy Now
Questions 53

300-620 Question 53

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Buy Now
Questions 54

What is MP-BGP used for in Cisco ACl fabric?

Options:

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

Buy Now
Questions 55

An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal?

Options:

A.

Application profile

B.

Tenant

C.

Contract

D.

Bridge domain

Buy Now
Questions 56

A network engineer must backup the PRODUCTION tenant. The configuration backup should be stored on the APIC using a markup language and contain all secure information. Which export policy must be used to meet these requirement?

A)

300-620 Question 56

B)

300-620 Question 56

C)

300-620 Question 56

D)

300-620 Question 56

Options:

A.

Option A

B.

Option B

C.

Option D

D.

Option D

Buy Now
Questions 57

An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a Cisco ACI fabric. Which action must be taken to receive the required messages?

Options:

A.

Add Faults and Events to the monitor policy.

B.

Add Session Logs and Audit Logs to the monitor policy.

C.

Include Audit Logs and Events in the Syslog source policy.

D.

Include Events and Session Logs in the Syslog source policy.

Buy Now
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (300-620 DCACI)
Last Update: Mar 5, 2025
Questions: 192

PDF + Testing Engine

$52.5  $174.99

Testing Engine

$40.5  $134.99
buy now 300-620 testing engine

PDF (Q&A)

$34.5  $114.99
buy now 300-620 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 09 Mar 2025