Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-620 - Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Page: 2 / 8
Total 247 questions

When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

A.

within the bridge domain

B.

within the APIC

C.

within the access encap VLAN

D.

between all the spine and leaf switches

An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements:

• Control the amount of application data flowing into the system

• Allow the newly connected device to auto-negotiate link speed with the leaf switch

Which two ACI policies must be configured to achieve these requirements? (Choose two.)

A.

L2 interface policy

B.

link level policy

C.

slow drain policy

D.

ingress control plane policing policy

E.

ingress data plane policing policy

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

A.

limit IP learning to subnet

B.

scope

C.

gateway IP

D.

subnet control

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used?

A.

interface policy group

B.

switch policy group

C.

switch profile

D.

interface profile

Refer to the exhibit.

An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)

A.

Layer 3 routed port

B.

VPC with SVI

C.

port channel with SVI

D.

Layer 3 routed subinterface

E.

Layer 3 floating SVI

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)

A.

TFTP

B.

FTP

C.

SFTP

D.

SMB

E.

HTTPS