Vcehome > Cisco > Cisco Certified Specialist > 300-620 > 300-620 Online Practice Questions and Answers

300-620 Online Practice Questions and Answers

Questions 4

What does a bridge domain represent?

A. Layer 3 cloud

B. Layer 2 forwarding construct

C. tenant

D. physical domain

Browse 677 Q&As
Questions 5

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

A. Enable the Export Route Control Subnet for the External Endpoint Group flag.

B. Enable an L3Out with Shared Route Control Subnet.

C. Configure subnets with the External Subnets for External EPG flag enabled.

D. Configure subnets with the Import Route Control Subnet flag enabled.

Browse 677 Q&As
Questions 6

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic. The loop must be detected and stopped by disabling an interface within 4 seconds. Which configuration must be used?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 677 Q&As
Questions 7

Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)

A. iBGP

B. VXLAN

C. IS-IS

D. RIPv2

E. eBGP

Browse 677 Q&As
Questions 8

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

A. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select

-Format: XML

-Modify Global AES Encryption Settings: Enabled

B. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select

-Format: XML

-Modify Global AES Encryption Settings: Disabled

C. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select

-Format: JSON

-Modify Global AES Encryption Settings: Disabled

D. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select

-Format: JSON

-Modify Global AES Encryption Settings: Enabled

Browse 677 Q&As
Questions 9

A customer must deploy three Cisco ACI based data centers. Each site must be separated from the others. Which characteristic of Cisco ACI Multi-Pod makes it unsuitable for this deployment?

A. creates a virtual pod in the remote location

B. requires all pods to share the same Cisco APIC cluster

C. has distance and scale limitations

D. places leaf switches in the remote site that belong to the same fabric as at the headquarters site

Browse 677 Q&As
Questions 10

Refer to the exhibit.

The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?

A. Export Route Control Subnet Import Route Control Subnet Aggregate Shared Routes

B. External Subnets for External EPG Shared Route Control Subnet Shared Security Import Subnet

C. External Subnets for External EPG Import Route Control Subnet Shared Route Control Subnet

D. Export Route Control Subnet Shared Security Import Subnet Aggregate Shared Routes

Browse 677 Q&As
Questions 11

An engineer configures a Cisco ACI Multi-Pod for disaster recovery. Which action should be taken for the new nodes to be discoverable by the existing Cisco APICs?

A. Configure IGMPv3 on the interfaces of IPN routers that face the Cisco ACI spine.

B. Enable subinterfaces with dot1q tagging on all links between the IPN routers.

C. Enable DHCP relay on all links that are connected to Cisco ACI spines on IPN devices.

D. Configure BGP as the underlay protocol in IPN.

Browse 677 Q&As
Questions 12

Refer to the exhibit.

An engineer is migrating legacy servers into the Cisco ACI environment. The requirement is to ensure that all endpoints and MAC addresses are learned properly in legacy and Cisco ACI switches. Which configuration set must be configured under the bridge domain called bd_360 to accomplish this goal?

A. L2 Unknown Unicast: Hardware Proxy ARP Flooding: Disabled

B. L2 Unknown Unicast: Flood ARP Flooding: Enabled

C. L2 Unknown Unicast: Hardware Proxy ARP Flooding: Enabled

D. L2 Unknown Unicast: Flood ARP Flooding: Disabled

Browse 677 Q&As
Questions 13

For which type of endpoint entry does a Cisco ACI leaf switch keep the original TEP source address instead of rewriting the outer source IP address to its TEP address?

A. local entry

B. remote entry

C. bounce entry

D. COOP entry

Browse 677 Q&As
Exam Code: 300-620
Exam Name: Implementing Cisco Application Centric Infrastructure (DCACI)
Last Update: May 04, 2024
Questions: 677 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99