Special New Year Discounts Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

ExamsBrite Dumps

Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Question and Answers

Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Last Update Sep 18, 2025
Total Questions : 247

We are offering FREE 300-620 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-620 free exam questions and then go for complete pool of Implementing Cisco Application Centric Infrastructure (300-620 DCACI) test questions that will help you more.

300-620 pdf

300-620 PDF

$46  $114.99
300-620 Engine

300-620 Testing Engine

$54  $134.99
300-620 PDF + Engine

300-620 PDF + Testing Engine

$70  $174.99
Questions 1

Cisco ACI fabric contains a tenant called Prod. User_1 must have write access to tenant Prod and full access to the fabric access policy. Which set of actions must be taken to meet these requirements?

Options:

A.  

Associate User_1 to the fabric access policy.

Associate the security domain to the fabric access policy.

Create RBAC for the distinguished name of tenant Prod.

B.  

Associate User_1 to tenant Prod.

Associate the security domain to the distinguished name of the fabric access policy.

Create RBAC for the distinguished name of security domain.

C.  

Associate User_1 to the distinguished name of the fabric access policy.

Associate the security domain to RBA

C.  

Create RBAC for the distinguished name of User__1.

D.  

Associate User_1 to the security domain.

Associate the security domain to tenant Prod.

Create RBAC for the distinguished name of fabric access policy.

Discussion 0
Questions 2

What represents the unique identifier of an ACI object?

Options:

A.  

universal resource identifier (URI)

B.  

application programming interface

C.  

management information tree

D.  

distinguished name

Discussion 0
Questions 3

A customer must upgrade the Cisco ACI fabric to use a feature from the new code release. However, there is no direct path from the current release to the desired one. Based on the Cisco APIC Upgrade/Downgrade Support Matrix, the administrator must go through one intermediate release.

Which set of steps must be taken to upgrade the fabric to the new release?

Options:

A.  

Upgrade the APICs to an interim release.

Upgrade the switches to an interim release.

Upgrade the APICs to the targeted release.

Upgrade the leaf and spine switches to the targeted release.

B.  

Upgrade the APICs to an interim release and then switches to an interim release.

When all switches are operational, upgrade leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Upgrade the APICs to the targeted release.

C.  

Upgrade the APICs to an interim release.

Upgrade the leaf switches directly to the targeted release.

Upgrade the spine switches directly to the targeted release.

Upgrade the APICs to the targeted release.

D.  

Upgrade the APICs directly to the targeted release.

Upgrade the switches to an interim release.

When all switches are operational, upgrade the leaf switches to the targeted release.

Upgrade the spine switches to the targeted release.

Discussion 0
Questions 4

A network engineer must backup the PRODUCTION tenant. The configuration backup should be stored on the APIC using a markup language and contain all secure information. Which export policy must be used to meet these requirement?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option D

D.  

Option D

Discussion 0
Questions 5

Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from

being learned by the fabric?

Options:

A.  

enable Limit IP Learning to Subnet

B.  

enable Unicast Routing

C.  

enable IP Data-plane Learning

D.  

enable ARP Flooding to BD

Discussion 0
Questions 6

An organization deploys active-active data centers and active-standby firewalls in each data center. Which action should be taken in a Cisco ACI Multi-Pod to maintain traffic symmetry through the firewalls?

Options:

A.  

Disable Resilient Hashing.

B.  

Disable service node Health Tracking.

C.  

Enable Pod ID Aware Redirection.

D.  

Enable Endpoint Dataplane Learning.

Discussion 0
Questions 7

An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal?

Options:

A.  

Application profile

B.  

Tenant

C.  

Contract

D.  

Bridge domain

Discussion 0
Questions 8

Refer to the exhibit. An engineer must disable the communication between the two backup servers in the backup EPG. Which action accomplishes this goal?

Options:

A.  

Set Preferred Group Member to Excluded.

B.  

Set the physical domain to None.

C.  

Set a different static binding for the encap VLAN.

D.  

Set Intra EPG Isolation to Enforced.

Discussion 0
Questions 9

Refer to the exhibit. An engineer is migrating legacy servers into the Cisco ACI environment. The requirement is to ensure that all endpoints and MAC addresses are learned properly in legacy and Cisco ACI switches. Which configuration set must be configured under the bridge domain called bd__360 to accomplish this goal?

Options:

A.  

L2 Unknown Unicast: Hardware Proxy ARP Flooding: Disabled

B.  

L2 Unknown Unicast: Hardware Proxy ARP Flooding: Enabled

C.  

L2 Unknown Unicast: Flood ARP Flooding: Disabled

D.  

L2 Unknown Unicast: Flood

ARP Flooding: Enabled

Discussion 0
Questions 10

An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 11

Refer to the exhibit. An engineer created a local user named User on Cisco ACI. The engineer must configure the fabric so that the User can access only common and PROD tenants, ch set of actions accomplishes the goal?

Options:

A.  

Add security domain "all" to User.

Associate security domain "all" under PROD tenant.

B.  

Add security domain 'Tenant" to User.

Associate security domain "Tenant" under PROD tenant.

C.  

Add security domain "common" to User.

Associate security domain "common" under PROD tenant.

D.  

Add security domain "mgmt" to User

Associate security domain "mgmt" under PROD tenant.

Discussion 0
Questions 12

An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco APIC should the policy be configured to meet this requirement?

Options:

A.  

uni/tn-common/monepg-default

B.  

uni/infra/monifra-default

C.  

uni/fabric/monfab-default

D.  

uni/fabric/moncommon

Discussion 0
Questions 13

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

Options:

A.  

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.  

Enable an L30ut with Shared Route Control Subnet.

C.  

Configure subnets with the External Subnets for External EPG flag enabled.

D.  

Configure subnets with the Import Route Control Subnet flag enabled.

Discussion 0
Questions 14

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

Discussion 0
Questions 15

The customer is looking for redundant interconnection of the existing network to the new ACI fabric. Unicast and multicast traffic must be routed between the two networks. Which L3Out implementation meets these requirements?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 16

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

Options:

A.  

Associate the VMM domain with the EPGs that must be available in vCenter.

B.  

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.  

Configure contracts for the EPGs that are required on the ESXi hosts.

D.  

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Discussion 0
Questions 17

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

Options:

A.  

BPDU guard

B.  

aggressive STP timers

C.  

BPDU filtering

D.  

STP type link shared

Discussion 0
Questions 18

What must be configured to allow SNMP traffic on the APIC controller?

Options:

A.  

out-of-band management interface

B.  

contract under tenant mgmt

C.  

SNMP relay policy

D.  

out-of-band bridge domain

Discussion 0
Questions 19

The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal?

Options:

A.  

Static Channel

B.  

MAC Pinning

C.  

LACP

D.  

LLDP

Discussion 0
Questions 20

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

    Only traffic to known Mac addresses must be allowed to reduce noice.

    The multicast traffic must be limited to the ports that are participating in multicast routing.

    The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?

Options:

A.  

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

B.  

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

C.  

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

D.  

Multicast Destination Flooding should be set to Flood in B

D.  

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Discussion 0
Questions 21

Refer to the exhibit.

The engineer is planning to configure in-band management for the Cisco ACI fabric. The goal is to allow the network operators to reach the Cisco APIC servers and fabric switches from the in-band network. Which configuration must be applied on the bridge domain to accomplish these goals?

Options:

A.  

Enable Unicast Routing. Configure a virtual IP address.

B.  

Enable Unicast Routing. Set scope to Advertised Externally.

C.  

Scope: Shared between VRF. Set the IP address as primary.

D.  

Make this IP address primary. Configure an L30ut for Route Profile.

Discussion 0
Questions 22

Refer to the exhibit. An administrator configures inter-VRF route leaking between Production:vrf-prod and Non-Production:vrf-nonprod. However, the route in the Non-Production:vrf-nonprod VRF to the production tenant is missing. Which action resolves the VRF route leaking issue?

Options:

A.  

Change the contract scope to Global.

B.  

Enable the Shared between VRFs option for the BD subnet in the production VRF.

C.  

Enable the Shared between VRFs option for the EPG subnet in the non-production VRF.

D.  

Export the contract from provider to consumer tenant.

Discussion 0
Questions 23

What is the maximum number of sites connected using spine back-to-back with a direct link in a Cisco ACI Multi-Site fabric?

Options:

A.  

2

B.  

3

C.  

4

D.  

5

Discussion 0
Questions 24

In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?

Options:

A.  

Select Out-of-Band as Management EPG in the default DateTimePolicy.

B.  

Create an Override Policy with NTP Out-of-Band for leaf and spine switches.

C.  

Change the interface used for APIC external connectivity to ooband.

D.  

Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol.

Discussion 0
Questions 25

Refer to the exhibit. Which two configurations enable inter-VRF communication? (Choose two.)

Options:

A.  

Set the subnet scope to Shared Between VRFs.

B.  

Enable Advertise Externally under the subnet scope.

C.  

Export the contract and import as a contract interface.

D.  

Change the contract scope to Tenant.

E.  

Change the subject scope to VRF.

Discussion 0
Questions 26

What does a bridge domain represent?

Options:

A.  

Layer 3 cloud

B.  

Layer 2 forwarding construct

C.  

tenant

D.  

physical domain

Discussion 0
Questions 27

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.  

over Layer 3 directly connected back-to-back spines

B.  

over Layer 3 Out connectivity via border leafs

C.  

over Layer 3 IPN connectivity via spines

D.  

over Layer 3 IPN connectivity via border leafs

Discussion 0
Questions 28

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

Options:

A.  

Enable the BPDU interface controls under the spanning tree interface policy.

B.  

Configure a new STP interface policy.

C.  

Bind the spanning tree policy to the switch policy group.

D.  

Associate the STP interface policy to the appropriate interface policy group.

E.  

Create a new region policy under the spanning tree policy.

F.  

Map VLAN range to MAT instance number.

Discussion 0
Questions 29

Refer to the exhibit. A Cisco ACI fabric displays this fault. Which set of actions modifies the event to be displayed as a warning in the future?

Options:

A.  

Navigate to the ACI Events tab.

Create a new record.

B.  

Navigate to the ACI Fault tab.

Create a new record.

C.  

Navigate to the ACI Events tab.

Change the severity level.

D.  

Navigate to the ACI Fault tab.

Change the severity level.

Discussion 0
Questions 30

When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

Options:

A.  

within the bridge domain

B.  

within the APIC

C.  

within the access encap VLAN

D.  

between all the spine and leaf switches

Discussion 0
Questions 31

Which protocol is used in a Multi-Pod topology to synchronize reachability information across pods?

Options:

A.  

IS-IS

B.  

MP-BGP EVPN

C.  

OSPF

D.  

COOP

Discussion 0
Questions 32

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

Options:

A.  

Inspect event records in the APIC UI to see all actions performed by users.

B.  

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.  

Inspect audit logs in the APIC UI to see all user events.

D.  

Inspect the output of show command history in the APIC CLI.

Discussion 0
Questions 33

Which description regarding the initial APIC cluster discovery process is true?

Options:

A.  

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.  

Every switch is assigned a unique AV by the APIC.

C.  

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.  

The ACI fabric is discovered starting with the spine switches.

Discussion 0
Questions 34

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

Options:

A.  

Divide Cisco APIC controllers into two or more maintenance groups.

B.  

Grant tenant-ext-admin access to a user who performs an upgrade

C.  

Combine all switches into an upgrade group.

D.  

Divide switches into two or more maintenance groups.

E.  

Grant the fabric administrator role to a user who performs an upgrade.

Discussion 0
Questions 35

An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

Options:

A.  

Layer 2 remote fabric

B.  

Layer 2 outside

C.  

Layers 2 internal

D.  

Static path binding

E.  

VXLAN outside

Discussion 0
Questions 36

Which type of profile needs to be created to deploy an access port policy group?

Options:

A.  

attachable entity

B.  

Pod

C.  

module

D.  

leaf interface

Discussion 0
Questions 37

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

Options:

A.  

access policy

B.  

infra tenant

C.  

switch profile

D.  

fabric policy

Discussion 0
Questions 38

Cisco ACI fabric is integrated with VMware VDS. The fabric must apply a security policy to check the integrity of traffic out of the network adapter. Which action must be taken to drop the .. when the ESXi host discovers a mismatch between the actual source MAC address transmitted by the guest operating system and the effective MAC address of the virtual machine ….?

Options:

A.  

Reject MAC changes.

B.  

Accept forged transmits.

C.  

Accept MAC changes.

D.  

Reject forged transmits.

Discussion 0
Questions 39

A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

Options:

A.  

tenant

B.  

security domain

C.  

primary Cisco APIC

D.  

managed object class

Discussion 0
Questions 40

An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?

Options:

A.  

Configure the EGP as a provider and L3 out as consumer of the contract.

B.  

Configure OSPF to exchange routes between the L3 out and EGP.

C.  

Configure a taboo contract and apply it to the EPG.

D.  

Configure the EPG as a consumer and L3 out as a provider of the contract.

Discussion 0
Questions 41

A Cisco ACI fabric is integrated with a Cisco ASA firewall using a service graph under the tenant called Operations. The fabric must permit the firewall used on tenant Operations to be referenced by the tenant called Management. Which export action must be used to accomplish this goal?

Options:

A.  

Layer4-Layer7 device

B.  

router configurations

C.  

service graph template

D.  

device selection policies

Discussion 0
Questions 42

The Application team reports that a previously existing port group has disappeared from vCenter. An engineer confirms that the VM domain association for the EPG is no longer present. Which action determines which user is responsible for the change?

Options:

A.  

Check the EPG audit logs for the 'deletion' action and compare the affected object and user.

B.  

Evaluate the potential faults that are raised for that EPG.

C.  

Examine the health score and drill down to an object that affects the EPG combined score.

D.  

Inspect the server logs to see who was logging in to the APIC during the last few hours.

Discussion 0
Questions 43

Refer to the exhibit. An engineer configures communication between the EPGs in different tenants. Which action should be taken to create the subnet?

Options:

A.  

Change Scope to Shared between VRFs.

B.  

Leave Scope set to Private to VRF.

C.  

Add the L3Out for Route Profile value.

D.  

Change Scope to Advertised Externally.

Discussion 0
Questions 44

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.  

Cisco ACI acts as the STP root for all three external switches.

B.  

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.  

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.  

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Discussion 0
Questions 45

An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics?

Options:

A.  

All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected.

B.  

Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts can be monitored.

C.  

EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not collected.

D.  

The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic.

Discussion 0
Questions 46

Refer to the exhibit. Which two configuration steps are completed before this output is generated? (Choose two.)

Options:

A.  

MCP policy for the interface policy group for Port-channel 12 is enabled.

B.  

MCP Instance Policy default in the global access policies is enabled.

C.  

Error Disabled Recovery Policy for Loop Indication by MCP is set to True.

D.  

BPDU Guard is enabled for the interface policy group for Port-channel 12.

E.  

Spanning Tree Policy Region STP_4CAF232E48FF20 is added to the spanning-tree policy of the switch.

Discussion 0
Questions 47

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 48

Refer to the exhibit, An engineer is deploying a Cisco ACI environment but experiences a STP loop between switch1 and switch2. Which configuration step is needed to break the STP loop?

Options:

A.  

Configure the STP instance to VLAN mapping under the switch STP policy.

B.  

Configure a Layer 2 external bridged network on the interfaces facing the MST switches.

C.  

Enable the native VLAN on the interfaces facing the MST switches using static pons in a dedicated EPG.

D.  

Enable BPDU filter under the STP interface policy on the Interfaces lacing the MST switches.

Discussion 0
Questions 49

Which feature is used to program policy CAM on a leaf switch without sending traffic from VM to the leaf?

Options:

A.  

immediate resolution immediacy

B.  

immediate deployment immediacy

C.  

on-demand deployment immediacy

D.  

on-demand resolution immediacy

Discussion 0
Questions 50

Which type of port is used for in-band management within ACI fabric?

Options:

A.  

spine switch port

B.  

APIC console port

C.  

leaf access port

D.  

management port

Discussion 0
Questions 51

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Options:

A.  

Change the switch APIC Connectivity Preference to in-band management

B.  

Remove the in-band management address from the APIC.

C.  

Add a Fabric Access Policy to allow management connections.

D.  

Modify the Pod Profile to use the default Management Access Policy

Discussion 0
Questions 52

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

Options:

A.  

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.  

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.  

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.  

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

Discussion 0
Questions 53

An engineer is troubleshooting fabric discovery in a newly deployed Cisco ACI fabric and analyzes this output:

Which ACI fabric address is assigned to interface lo1023?

Options:

A.  

Dynamic tunnel endpoint

B.  

Physical tunnel endpoint

C.  

Fabric tunnel endpoint

D.  

VXLAN tunnel endpoint

Discussion 0
Questions 54

Cisco ACI fabric contains 10 standalone leaf switches. An engineer must configure only the first two leaf switches in a VPC. Which VPC protection type must be configured to accomplish goal?

Options:

A.  

serial

B.  

explicit

C.  

reciprocal

D.  

consecutive

Discussion 0
Questions 55

Engineer must configure SNMP inside a Cisco ACI fabric. The engineer has created an SNMP Policy, called SNMP-policy and an SNMP Monitoring Group called SNMP-group1 that Contains five trap receivers. Which configuration set completes the configuration?

Options:

A.  

Edit oobbrc to permit traffic using UDP port 16. Associate the client group policy to SNMP-group1.

B.  

Permit OOB management traffic using UDP port 161. Associate client group policy with the OOB management EPG.

C.  

Allow all OOB management traffic. Configure three trap receivers on SNMP-group1.

D.  

Create an OOB management contract. Include the SNMP server in the OOB management EPG.

Discussion 0
Questions 56

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 57

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

Options:

A.  

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.  

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.  

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.  

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Discussion 0
Questions 58

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.  

Acknowledge the QoS-related error.

B.  

Associate a custom QoS class.

C.  

Create a custom QoS policy.

D.  

Set the QoS policy to Level 3.

Discussion 0
Questions 59

An engineer must configure RADIUS authentication with Cisco ACI for remote authentication with out-of-band management access. Drag and drop the RADIUS configuration steps from the left into the required implementation order on the right. Not all steps are used.

Options:

Discussion 0
Questions 60

An engineer deploys a two-pod Cisco ACI Multi-Pod environment. Why should no more than two Cisco APIC controllers be deployed in the same pod?

Options:

A.  

to enable equal capacity to scale in each pod

B.  

to avoid losing all replicas of a shard if a pod fails

C.  

to avoid hair-pinning traffic that is destined for the primary APIC controller between pods

D.  

to ensure that all nodes in all pods have local access to a controller

Discussion 0
Questions 61

A customer is deploying a new application across two ACI pods that is sensitive to latency and jitter. The application sets the DSCP values of packets to AF31 and CS6, respectively. Which configuration changes must be made on the APIC to support the new application and prevent packets from being delayed or dropped between pods?

Options:

A.  

disable DSCP mapping on the IPN devices

B.  

disable DSCP translation policy

C.  

align the ACI QoS levels and IPN QoS policies

D.  

align the custom QoS policy on the EPG site in the customer tenant

Discussion 0
Questions 62

Refer to the exhibit. A company decided to decrease its routing footprint and remove RT-2 and RT-3 devices from its data center. Because of that, the exit point must be created from all the tenants by using the common tenant. Which two configuration tasks must be completed to meet these requirements? (Choose two.)

Options:

A.  

Move subnets from all the bridge domains to the EPG level and mark them with flag Shared between VRFs.

B.  

Update the L3Out ExtEPG subnet in the common tenant with flag Shared Route Control Subnet and Aggregate Shared Routes.

C.  

Mark all subnets with flag Shared between VRFs and attach contract Ctr-3 as a provider to all the EPGs.

D.  

Change contract Ctr-3 scope to Global, consume it by all EPGs, and flag all subnets with flag Shared between VRFs.

E.  

Export contract Ctr-2 into the tenant TN-1 and attach it as a consumer to all the EPGs in the tenant TN-1.

Discussion 0
Questions 63

All workloads in VLAN 1001 have been migrated into EPG-1001. The requirement is to move the gateway address for VLAN 1001 from the core outside the Cisco ACI fabric into the Cisco ACI fabric. The endpoints in EPG-1001 must route traffic to endpoints in other EPGs and minimize flooded traffic in the fabric. Which configuration set is needed on the bridge domain to meet these requirements?

Options:

A.  

Disable ARP Flood

Disable Limn Endpoint Learning

B.  

Enable Hardware Proxy Enable Unicast Routing

C.  

Disable Local IP Learning Limit Disable Unicast Routing

D.  

Enable Flood

Enable Unicast Routing

Discussion 0
Questions 64

A customer must deploy three Cisco ACI based data centers. Each site must be separated from the others. Which characteristic of Cisco ACI Multi-Pod makes it unsuitable for this deployment?

Options:

A.  

creates a virtual pod in the remote location

B.  

requires all pods to share the same Cisco APIC cluster

C.  

has distance and scale limitations

D.  

places leaf switches in the remote site that belong to the same fabric as at the headquarters site

Discussion 0
Questions 65

An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a

bridge domain. Which setting should be configured to support this requirement?

Options:

A.  

disable Limit IP Learning to Subnet

B.  

disable IP Data-plane Learning

C.  

disable Unicast Routing

D.  

disable Advertise Host Routes

Discussion 0
Questions 66

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

Options:

Discussion 0
Questions 67

Which Cisco ACI setting corresponds to the VMware MAC pinning?

Options:

A.  

route based on IP hash

B.  

route based on originating virtual port

C.  

route based on physical NIC load

D.  

route based on MAC hash

Discussion 0
Questions 68

An engineer must configure a Layer 3 connection to the WAN router. The hosts in production VRF must access WAN subnets. The engineer associates EPGs in the production VRF with the external routed domain. Which action completes the task?

Options:

A.  

Configure the Export Route Control Subnet scope for the external EPG.

B.  

Configure the External Subnets for the External EPG scope for the external EPG.

C.  

Configure the Import Route Control Subnet scope for the external EPG.

D.  

Configure the Shared Route Control Subnet scope for the external EPG.

Discussion 0
Questions 69

An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 70

An engineer must add a group of 70 bare-metal ESXi servers to the Cisco ACI fabric, which is integrated with vCenter. These configuration steps are complete:

The configured pool of ESXi hosts is configured with an Attachable Access Entity Profile (AAEP) called AEP_VMM.

The new group uses the AAEP called AEP_BAREMETAL.

Which action extends functional VMM integration to the new nodes?

Options:

A.  

Update AAEP to AEP_VMM on all policy groups that are used toward bare-metal servers.

B.  

Create a new AAEP container object for policy groups for AEP_VMM.

C.  

Implement a separate VMM domain for the bare-metal servers by using AEP_VMM.

D.  

Add the VMM domain under the AEP_BAREMETAL AAEP object.

Discussion 0
Questions 71

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

Options:

A.  

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.  

Configure ISN site extension on Cisco routers in the network.

C.  

Configure OSPF on all ISN routers.

D.  

Configure BIDIR-PIM on all ISN routers.

E.  

Configure encapsulation VLAN-4 between the routers and spine nodes.

Discussion 0
Questions 72

An ACI engineer is implementing a Layer 3 out inside the Cisco ACI fabric that must meet these requirements:

    The data center core switch must be connected to one of the leaf switches with a single 1G link.

    The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.

    The data center core switch interface must be using 802.1Q tagging, and each vlan will be configured with a dedicated IP address.

Which set of steps accomplishes these goals?

Options:

A.  

Set up the ElGRP Protocol policy with the selected Autonomous System number. Set up the Routed External Network object ana Node Profile, selecting ElGRP Create the Switch profile, selecting Port-channel and the appropriate interfaces Create the default network and associate it with the Routed Outside object.

B.  

Set up the BGP Protocol policy with the Autonomous System number of 0.

Configure an interface policy and an External Bridged Domain.

Create an External Bridged Network using the configured VLAN pool.

Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.

C.  

Configure the OSPF Protocol policy with an area of 0.

Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol. Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN. Configure the External Network object with a network of 0.0.0.0/0.

D.  

Set up the ElGRP Protocol policy with the selected Autonomous System number. Create the Routed Outside object and Node Profile selecting ElGRP Configure the Interface profile selecting Routed Interface and the appropriate interfaces. Create the External Network object with a network of 0.0.0.0/0.

Discussion 0
Questions 73

Refer to the exhibit.

A Cisco ACI fabric is newly deployed, and the security team requires more visibility of all inter-EPG traffic flows. All traffic in a VRF must be forwarded to an existing firewall pair. During fallover, the standby firewall must continue to use the same IP and MAC as the primary firewall. Drag and drop the steps from the left Into the Implementation order on the right to configure the service graph that meets the requirements. (Not all steps are used.)

Options:

Discussion 0
Questions 74

An engineer must limit management access to me Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

Options:

A.  

policy In the management tenant

B.  

policy on the management VLAN

C.  

ACL on the management interface of the APIC

D.  

ACL on the console interface

Discussion 0