Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-620 Exam Dumps - Implementing Cisco Application Centric Infrastructure (DCACI)

Question # 4

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Full Access
Question # 5

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Full Access
Question # 6

Refer to the exhibit. New e-commerce software is deployed on Cisco ACI fabric. The environment must meet these requirements:

The overall number of contracts must be reduced by reusing the existing contracts within a VRF when possible.

The e-commerce software must communicate only with software EPGs that are part of the same ANP.

The e-commerce software must be prevented from communicating with applications in different ANPs.

Which scope must be selected to meet these requirements?

A.

Application Profile

B.

Endpoint Group

C.

Tenant

D.

Global

Full Access
Question # 7

Refer to the exhibit. An administrator configures inter-VRF route leaking between Production:vrf-prod and Non-Production:vrf-nonprod. However, the route in the Non-Production:vrf-nonprod VRF to the production tenant is missing. Which action resolves the VRF route leaking issue?

A.

Change the contract scope to Global.

B.

Enable the Shared between VRFs option for the BD subnet in the production VRF.

C.

Enable the Shared between VRFs option for the EPG subnet in the non-production VRF.

D.

Export the contract from provider to consumer tenant.

Full Access
Question # 8

Which statement regarding ACI Multi-Pod and TEP pool is true?

A.

The IP addresses used in the IPN network can overlap TEP pool of the APIC.

B.

A different TEP pool must be assigned to each Pod.

C.

The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.

D.

The same TEP pool is used in all Pods.

Full Access
Question # 9

An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco APIC should the policy be configured to meet this requirement?

A.

uni/tn-common/monepg-default

B.

uni/infra/monifra-default

C.

uni/fabric/monfab-default

D.

uni/fabric/moncommon

Full Access
Question # 10

Refer to the exhibit.

An engineer is implementing Cisco ACI – VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in “route based on originating virtual port” on the VMware VDS?

A.

Static Channel – Mode On

B.

MAC Pinning-Physical-NIC-load

C.

LACP Passive

D.

MAC Pinning+

E.

LACP Active

Full Access
Question # 11

An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

A.

It is forwarded to one of the spines to perform as a spine proxy.

B.

It is flooded within the whole fabric.

C.

It is dropped by the leaf when the destination endpoint is not present in the endpoint table.

D.

It is forwarded to one of the APICs to perform as a proxy.

Full Access
Question # 12

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

A.

Divide Cisco APIC controllers into two or more maintenance groups.

B.

Grant tenant-ext-admin access to a user who performs an upgrade

C.

Combine all switches into an upgrade group.

D.

Divide switches into two or more maintenance groups.

E.

Grant the fabric administrator role to a user who performs an upgrade.

Full Access
Question # 14

Which components must be configured for the BGP Route Reflector policy to take effect?

A.

spine fabric interface overrides and profiles

B.

access policies and profiles

C.

pod policy groups and profiles

D.

leaf fabric interface overrides and profiles

Full Access
Question # 15

Refer to the exhibit.

An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)

A.

Layer 3 routed port

B.

VPC with SVI

C.

port channel with SVI

D.

Layer 3 routed subinterface

E.

Layer 3 floating SVI

Full Access
Question # 16

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

A.

Enable the BPDU interface controls under the spanning tree interface policy.

B.

Configure a new STP interface policy.

C.

Bind the spanning tree policy to the switch policy group.

D.

Associate the STP interface policy to the appropriate interface policy group.

E.

Create a new region policy under the spanning tree policy.

F.

Map VLAN range to MAT instance number.

Full Access
Question # 17

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Full Access
Question # 18

Refer to the exhibit, An engineer is deploying a Cisco ACI environment but experiences a STP loop between switch1 and switch2. Which configuration step is needed to break the STP loop?

A.

Configure the STP instance to VLAN mapping under the switch STP policy.

B.

Configure a Layer 2 external bridged network on the interfaces facing the MST switches.

C.

Enable the native VLAN on the interfaces facing the MST switches using static pons in a dedicated EPG.

D.

Enable BPDU filter under the STP interface policy on the Interfaces lacing the MST switches.

Full Access
Question # 19

An engineer is troubleshooting fabric discovery in a newly deployed Cisco ACI fabric and analyzes this output:

Which ACI fabric address is assigned to interface lo1023?

A.

Dynamic tunnel endpoint

B.

Physical tunnel endpoint

C.

Fabric tunnel endpoint

D.

VXLAN tunnel endpoint

Full Access
Question # 20

Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?

A.

ARP gleaning

B.

dynamic endpoint attach

C.

hardware proxy

D.

network-stitching

Full Access
Question # 21

Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

A.

“Limit IP learning to network” setting within the bridge domain.

B.

“Limit IP learning to subnet” setting within the EPG.

C.

“Limit IP learning to network” setting within the EPG.

D.

“Limit IP learning to subnet” setting within the bridge domain.

Full Access
Question # 22

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

A.

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.

MCP Instance Policy default in the global access policies is enabled.

C.

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Full Access
Question # 23

An engineer must limit management access to me Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

A.

policy In the management tenant

B.

policy on the management VLAN

C.

ACL on the management interface of the APIC

D.

ACL on the console interface

Full Access
Question # 24

An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

A.

merge

B.

atomic

C.

best effort

D.

replace

Full Access
Question # 25

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

A.

extending the routed domain out of the ACI fabric

B.

creating a single homed Layer 3 Out

C.

creating an external physical network

D.

extending the bridge domain out of the ACI fabric

E.

extending the EPG out of the ACI fabric

Full Access
Question # 26

Refer to the exhibit. An engineer is configuring a production Multi-Site solution to provide connectivity from EPGs from a specific site to networks reachable through a remote site L3OUT. All required schema and template objects are already defined. Which additional configuration must be implemented in the Multi-Site Orchestrator to support the cross-site connectivity?

A.

Configure a routable TEP pool for SITE1.

B.

Enable CloudSec for intersite traffic encryption.

C.

Add a new stretched external EPG to the existing L3OUT.

D.

Implement a policy-based redirect using a service graph.

Full Access
Question # 27

Refer to the exhibit.

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

A.

300

B.

410

C.

350

D.

510

Full Access
Question # 28

In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?

A.

Select Out-of-Band as Management EPG in the default DateTimePolicy.

B.

Create an Override Policy with NTP Out-of-Band for leaf and spine switches.

C.

Change the interface used for APIC external connectivity to ooband.

D.

Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol.

Full Access