Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-620 Exam Dumps - Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Go to page:
Question # 25

An engineer is extending EPG connectivity to an external network. The external network houses the Layer 3 gateway and other end hosts. Which ACI bridge domain configuration should be used?

A.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

B.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

C.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

D.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

Full Access
Question # 26

An engineer must attach an ESXi host to the Cisco ACI fabric. The host is connected to Leaf 1 and has its gateway IP address 10.10.10.254/24 configured inside the ACI fabric. A new wall is attached to Leaf 2 and mapped to the same EPG and BD as the ESXi host. The engineer must migrate the gateway of the ESXi host to the firewall. Which configuration set complishes this goal?

A.

Disable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI BD.

B.

Enable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI EPG.

C.

Disable unicast routing.

Define IP address 10.10.10.254/24 on the firewall.

D.

Enable unicast routing.

Set IP address 10.10.10.254/24 on the firewall.

Full Access
Question # 27

An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

A.

from leaf ports tagged as VLAN 0

B.

from leaf ports untagged

C.

from leaf ports tagged as VLAN 4094

D.

from leaf ports tagged as VLAN 1

Full Access
Question # 28

An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal?

A.

Application profile

B.

Tenant

C.

Contract

D.

Bridge domain

Full Access
Question # 29

The Application team reports that a previously existing port group has disappeared from vCenter. An engineer confirms that the VM domain association for the EPG is no longer present. Which action determines which user is responsible for the change?

A.

Check the EPG audit logs for the 'deletion' action and compare the affected object and user.

B.

Evaluate the potential faults that are raised for that EPG.

C.

Examine the health score and drill down to an object that affects the EPG combined score.

D.

Inspect the server logs to see who was logging in to the APIC during the last few hours.

Full Access
Question # 30

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Full Access
Question # 31

All workloads in VLAN 1001 have been migrated into EPG-1001. The requirement is to move the gateway address for VLAN 1001 from the core outside the Cisco ACI fabric into the Cisco ACI fabric. The endpoints in EPG-1001 must route traffic to endpoints in other EPGs and minimize flooded traffic in the fabric. Which configuration set is needed on the bridge domain to meet these requirements?

A.

Disable ARP Flood

Disable Limn Endpoint Learning

B.

Enable Hardware Proxy Enable Unicast Routing

C.

Disable Local IP Learning Limit Disable Unicast Routing

D.

Enable Flood

Enable Unicast Routing

Full Access
Question # 32

Cisco ACI fabric contains a tenant called Prod. User_1 must have write access to tenant Prod and full access to the fabric access policy. Which set of actions must be taken to meet these requirements?

A.

Associate User_1 to the fabric access policy.

Associate the security domain to the fabric access policy.

Create RBAC for the distinguished name of tenant Prod.

B.

Associate User_1 to tenant Prod.

Associate the security domain to the distinguished name of the fabric access policy.

Create RBAC for the distinguished name of security domain.

C.

Associate User_1 to the distinguished name of the fabric access policy.

Associate the security domain to RBAC.

Create RBAC for the distinguished name of User__1.

D.

Associate User_1 to the security domain.

Associate the security domain to tenant Prod.

Create RBAC for the distinguished name of fabric access policy.

Full Access
Go to page: