Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Data Center > 300-620

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Question and Answers

Question # 4

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented fromtaking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Full Access
Question # 5

A packet is routed between two endpoints on different Cisco ACI leaf switches. Which VXLAN VNID is applied to the packet?

A.

FD

B.

EPG

C.

VRF

D.

BD

Full Access
Question # 6

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Full Access
Question # 7

A customer must deploy three Cisco ACI based data centers. Each site must be separated from the others. Which characteristic of Cisco ACI Multi-Pod makes it unsuitable for this deployment?

A.

creates a virtual pod in the remote location

B.

requires all pods to share the same Cisco APIC cluster

C.

has distance and scale limitations

D.

places leaf switches in the remote site that belong to the same fabric as at the headquarters site

Full Access
Question # 8

Refer to the exhibit.

Which two objects are created as a result of the configuration? (Choose two.)

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Full Access
Question # 9

What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination

endpoint?

A.

The leaf switch does not learn the source endpoint through data plane learning.

B.

The leaf switch drops the traffic that is destined to the endpoint.

C.

The leaf switch floods the traffic to the endpoint throughout the fabric.

D.

The leaf switch sends the traffic to the wrong destination leaf.

Full Access
Question # 10

When a pre-provision immediacy is used, when is the policy downloaded to the Cisco ACI leaf switch?

A.

The policy is downloaded and programmed in the hardware policy CAM when the change is implemented on the Cisco APIC.

B.

The policy is programmed in the hardware policy CAM when the policy is downloaded in the leaf software.

C.

The policy is programmed in the hardware policy CAM when the first packet is received through the data path.

D.

The policy is downloaded to the associated leaf switch software when the ESXi host is attached to a DVS.

Full Access
Question # 11

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Full Access
Question # 12

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Full Access
Question # 13

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

A.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Full Access
Question # 14

Refer to the exhibit.

Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

A.

Spine1

B.

apic1

C.

Spine2

D.

Leaf1

E.

Leaf2

F.

apic2

Full Access
Question # 15

What is the purpose of the Overlay Multicast TEP in a Cisco ACI Multi-Site deployment?

A.

to source and receive unicast VXLAN data plane traffic

B.

to establish MP-BGP EVPN adjacencies with the spine nodes in remote sites

C.

to encapsulate multicast traffic in a common multicast group

D.

to perform head-end replication for BUM traffic

Full Access
Question # 16

An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a

bridge domain. Which setting should be configured to support this requirement?

A.

disable Limit IP Learning to Subnet

B.

disable IP Data-plane Learning

C.

disable Unicast Routing

D.

disable Advertise Host Routes

Full Access
Question # 17

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Full Access
Question # 18

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Full Access
Question # 19

Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

A.

The source MAC address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

The source IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a local endpoint.

Full Access
Question # 20

Which type of policy configures the suppression of faults that are generated from a port being down?

A.

fault lifecycle assignment

B.

event lifecycle assignment

C.

fault severity assignment

D.

event severity assignment

Full Access
Question # 21

In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

A.

Endpoint information is not exchanged across sites unless COOP protocol is used.

B.

Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.

C.

Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.

D.

Endpoint information is exchanged across sites when the endpoints are discovered in both sites.

Full Access
Question # 22

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Full Access
Question # 23

Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?

A.

Enable MCP on the ACI fabric.

B.

Disable STP in the external network.

C.

Disable STP on the ACI fabric.

D.

Enable STP on the ACI fabric.

Full Access
Question # 24

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

A.

Divide Cisco APIC controllers into two or more maintenance groups.

B.

Grant tenant-ext-admin access to a user who performs an upgrade

C.

Combine all switches into an upgrade group.

D.

Divide switches into two or more maintenance groups.

E.

Grant the fabric administrator role to a user who performs an upgrade.

Full Access
Question # 25

An ACI engineer is implementing a Layer 3 out inside the Cisco ACI fabric that must meet these requirements:

    The data center core switch must be connected to one of the leaf switches with a single 1G link.

    The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.

    The data center core switch interface must be using 802.1Q tagging, and each vlan will be configured with a dedicated IP address.

Which set of steps accomplishes these goals?

A.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Set up the Routed External Network object ana Node Profile, selecting ElGRP Create the Switch profile, selecting Port-channel and the appropriate interfaces Create the default network and associate it with the Routed Outside object.

B.

Set up the BGP Protocol policy with the Autonomous System number of 0.

Configure an interface policy and an External Bridged Domain.

Create an External Bridged Network using the configured VLAN pool.

Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.

C.

Configure the OSPF Protocol policy with an area of 0.

Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol. Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN. Configure the External Network object with a network of 0.0.0.0/0.

D.

Set up the ElGRP Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile selecting ElGRP Configure the Interface profile selecting Routed Interface and the appropriate interfaces. Create the External Network object with a network of 0.0.0.0/0.

Full Access
Question # 26

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

A.

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.

Enable an L30ut with Shared Route Control Subnet.

C.

Configure subnets with the External Subnets for External EPG flag enabled.

D.

Configure subnets with the Import Route Control Subnet flag enabled.

Full Access
Question # 27

An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

A.

merge

B.

atomic

C.

best effort

D.

replace

Full Access
Question # 28

Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)

A.

iBGP

B.

VXLAN

C.

IS-IS

D.

RIPv2

E.

eBGP

Full Access
Question # 29

An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal?

A.

Application profile

B.

Tenant

C.

Contract

D.

Bridge domain

Full Access
Question # 30

Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

A.

The source MAC and IP address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

No source MAC or IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a remote endpoint.

Full Access
Question # 31

Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

A.

endpoint

B.

adjacency

C.

RIB

D.

ARP

Full Access
Question # 32

A network engineer must backup the PRODUCTION tenant. The configuration backup should be stored on the APIC using a markup language and contain all secure information. Which export policy must be used to meet these requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option D

D.

Option D

Full Access
Question # 33

A Cisco ACI environment consists of multiple silent hosts that are often relocated between leaf switches. When the host is relocated, the bridge domain takes more than a few seconds to relearn the host’s new location. The requirement is to minimize the relocation impact and make the ACI fabric relearn the new location of the host faster. Which action must be taken to meet these requirements?

A.

Set Unicast Routing to Enabled.

B.

Configure ARP Flooding to Enabled.

C.

Set L2 Unknown Unicast to Hardware Proxy.

D.

Configure IP Data-Plane Learning to No.

Full Access
Question # 34

What must be configured to allow SNMP traffic on the APIC controller?

A.

out-of-band management interface

B.

contract under tenant mgmt

C.

SNMP relay policy

D.

out-of-band bridge domain

Full Access
Question # 35

Refer to the exhibit.

A Cisco ACI fabric is newly deployed, and the security team requires more visibility of all inter-EPG traffic flows. All traffic in a VRF must be forwarded to an existing firewall pair. During fallover, the standby firewall must continue to use the same IP and MAC as the primary firewall. Drag and drop the steps from the left Into the Implementation order on the right to configure the service graph that meets the requirements. (Not all steps are used.)

Full Access
Question # 36

An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

A.

Layer 2 remote fabric

B.

Layer 2 outside

C.

Layers 2 internal

D.

Static path binding

E.

VXLAN outside

Full Access
Question # 37

An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

A.

from leaf ports tagged as VLAN 0

B.

from leaf ports untagged

C.

from leaf ports tagged as VLAN 4094

D.

from leaf ports tagged as VLAN 1

Full Access
Question # 38

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

An engineer is extending EPG connectivity to an external network. The external network houses the Layer 3 gateway and other end hosts. Which ACI bridge domain configuration should be used?

A.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

B.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled

C.

Forwarding: Custom

L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

D.

Forwarding: Custom

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

Full Access
Question # 40

An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain. Which action must be completed in this scenario?

A.

The Management VMkernel EPG resolution must be set to Pre-Provosion.

B.

The administrator must create an in-band VMM Management EPG before performing the migration.

C.

The administrator must set the Management VMkernel BD resolution immediacy to On-Demand.

D.

The VMkernel Management BD must be located under the Management Tenant.

Full Access
Question # 41

The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI leaf to learn a source IP as a local endpoint? (Choose two.)

A.

Through Ethernet traffic received in a bridge domain.

B.

IP traffic routed through an SVI.

C.

Through VXLAN traffic received on the uplink.

D.

IP traffic routed through a Layer 3 Out.

E.

Through ARP received on an SVI.

Full Access
Question # 42

The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal?

A.

Static Channel

B.

MAC Pinning

C.

LACP

D.

LLDP

Full Access
Question # 43

What is a requirement for Cisco ACI IPN to manage multidestination traffic?

A.

pervasive gateway

B.

unicast routing

C.

anycast gateway

D.

multicast routing

Full Access
Question # 44

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Full Access
Question # 45

Refer to the exhibit. An engineer configures communication between the EPGs in different tenants. Which action should be taken to create the subnet?

A.

Change Scope to Shared between VRFs.

B.

Leave Scope set to Private to VRF.

C.

Add the L3Out for Route Profile value.

D.

Change Scope to Advertised Externally.

Full Access
Question # 46

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Full Access
Question # 47

Where is the COOP database located?

A.

leaf

B.

spine

C.

APIC

D.

endpoint

Full Access
Question # 48

When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

A.

all leaf switches and all spine nodes

B.

only spine switches where the bridge domain of the tenant is present

C.

only leaf switches where the bridge domain of the tenant is present

D.

all border leaf nodes where the bridge domain of the tenant is present

Full Access
Question # 49

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

A.

Enable the BPDU interface controls under the spanning tree interface policy.

B.

Configure a new STP interface policy.

C.

Bind the spanning tree policy to the switch policy group.

D.

Associate the STP interface policy to the appropriate interface policy group.

E.

Create a new region policy under the spanning tree policy.

F.

Map VLAN range to MAT instance number.

Full Access
Question # 50

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

A.

Change the switch APIC Connectivity Preference to in-band management

B.

Remove the in-band management address from the APIC.

C.

Add a Fabric Access Policy to allow management connections.

D.

Modify the Pod Profile to use the default Management Access Policy

Full Access
Question # 51

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS

Full Access
Question # 52

What is the effect of enabling the disable Remote EP learn feature?

A.

It disables remote IP endpoint learning on all leaf nodes in the fabric.

B.

It disables remote IP endpoint learning on leaf switches that do not have L3Outs.

C.

It limits learning of compute leaf endpoints on border leaves.

D.

It prevents border leaf switches from receiving routes through peering with external routers.

Full Access
Question # 53

Which type of profile needs to be created to deploy an access port policy group?

A.

attachable entity

B.

Pod

C.

module

D.

leaf interface

Full Access
Question # 54

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

Full Access
Question # 55

A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with network control policies. The APIC is as follows:

    Tenant = TenantX

    Security Domain = Tenantx-SD

    User = X

The customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these requirement?

A.

shell:domains = TenantX-SD/fabric-admin/,common//read-all

B.

shell:domains = TenantX-SD/tenant-admin

C.

shell:domains = TenantX-SD/tenant-ext-admin/,common//read-all

D.

shell:domains = TenantX-SD/tenant-admin/,common//read-all

Full Access
Question # 56

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Full Access
Question # 57

Refer to the exhibit. An administrator configures inter-VRF route leaking between Production:vrf-prod and Non-Production:vrf-nonprod. However, the route in the Non-Production:vrf-nonprod VRF to the production tenant is missing. Which action resolves the VRF route leaking issue?

A.

Change the contract scope to Global.

B.

Enable the Shared between VRFs option for the BD subnet in the production VRF.

C.

Enable the Shared between VRFs option for the EPG subnet in the non-production VRF.

D.

Export the contract from provider to consumer tenant.

Full Access