Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-620 - Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Page: 1 / 8
Total 247 questions

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Which new construct must a user create when configuring in-band management?

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

What is the purpose of the Overlay Multicast TEP in a Cisco ACI Multi-Site deployment?

A.

to source and receive unicast VXLAN data plane traffic

B.

to establish MP-BGP EVPN adjacencies with the spine nodes in remote sites

C.

to encapsulate multicast traffic in a common multicast group

D.

to perform head-end replication for BUM traffic

Refer to the exhibit. Server A is connected to the Cisco ACI fabric using two teamed interfaces. One interface in a team is configured as active and the other remains in standby mode. When a failover occurs and the standby interface becomes active, it uses its built-in MAC address to send traffic. Which bridge domain configuration must be applied to resolve the issue?

A.

Configure Hardware proxy.

B.

Set L2 Unknown Unicast to Flood.

C.

Enable ARP flooding.

D.

Activate Limit IP Learning to Subnet.

In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

A.

VXLAN

B.

LLDP

C.

ISIS

D.

STP

A Cisco ACI bridge domain and VRF are configured with a default data-plane learning configuration. Which two endpoint attributes are programmed in the leaf switch when receiving traffic? (Choose two.)

A.

Remote MAC. IP

B.

Remote Subnet

C.

Local IP, not MAC

D.

Local MAC, IP

E.

Local Subnet

F.

Remote IP

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees