Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-620 Exam Dumps - Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Go to page:
Question # 4

When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

A.

limit IP learning to subnet

B.

scope

C.

gateway IP

D.

subnet control

Full Access
Question # 5

Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.

Full Access
Question # 6

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Full Access
Question # 7

The engineer notices frequent MAC and IP address moves between different leaf switch ports. Which action prevents this problem from occurring?

A.

Disable enforce subnet check.

B.

Enable endpoint loop protection.

C.

Enable rogue endpoint control.

D.

Disable IP bridge domain enforcement.

Full Access
Question # 8

An engineer deploys a two-pod Cisco ACI Multi-Pod environment. Why should no more than two Cisco APIC controllers be deployed in the same pod?

A.

to enable equal capacity to scale in each pod

B.

to avoid losing all replicas of a shard if a pod fails

C.

to avoid hair-pinning traffic that is destined for the primary APIC controller between pods

D.

to ensure that all nodes in all pods have local access to a controller

Full Access
Go to page: