Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

300-620 Practice Questions

Implementing Cisco Application Centric Infrastructure (300-620 DCACI)

Last Update 1 day ago
Total Questions : 247

Dive into our fully updated and stable 300-620 practice test platform, featuring all the latest CCNP Data Center exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our free CCNP Data Center practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 300-620. Use this test to pinpoint which areas you need to focus your study on.

300-620 PDF

300-620 PDF (Printable)
$48.3
$137.99

300-620 Testing Engine

300-620 PDF (Printable)
$52.5
$149.99

300-620 PDF + Testing Engine

300-620 PDF (Printable)
$65.45
$186.99
Question # 51

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

Options:

A.  

OSPF

B.  

ISIS

C.  

BGP

D.  

EIGRP

Discussion 0
Question # 52

An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EP

G.  

Which statement describes the collection statistics?

Options:

A.  

All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected.

B.  

Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts can be monitored.

C.  

EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not collected.

D.  

The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic.

Discussion 0
Question # 53

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

Options:

A.  

Associate the VMM domain with the EPGs that must be available in vCenter.

B.  

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.  

Configure contracts for the EPGs that are required on the ESXi hosts.

D.  

Create the port groups on the vCenter that reflect the EPG names in the API

C.  

Discussion 0
Question # 54

Refer to the exhibit.

Question # 54

A network engineer must improve the configuration backup process and the configuration restore process. The current ACI solution is integrated with VMMs and third-y.. L4-L7 devices. The process requires that no additional information be re-entered when importing the configuration for a fully-functional state. Which configuration configures the port policy?

Options:

A.  

Enable the Global AES Encryption Setting.

B.  

Select the JSON data format to be used when exporting

C.  

Create target DNs for all tenants.

D.  

Configure a local snapshot.

Discussion 0
Question # 55

Question # 55

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

Options:

A.  

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.  

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.  

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.  

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Discussion 0
Question # 56

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

Options:

A.  

access policy

B.  

infra tenant

C.  

switch profile

D.  

fabric policy

Discussion 0
Question # 57

Which Cisco ACI setting corresponds to the VMware MAC pinning?

Options:

A.  

route based on IP hash

B.  

route based on originating virtual port

C.  

route based on physical NIC load

D.  

route based on MAC hash

Discussion 0
Question # 58

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

Options:

A.  

Management IP of APICs

B.  

Management IP of the MSO Node

C.  

Anycast Overlay Multicast TEP

D.  

MP-BGP EVPN Router-ID

E.  

Common Pervasive Gateway

Discussion 0
Question # 59

Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

Options:

A.  

extending the routed domain out of the ACI fabric

B.  

creating a single homed Layer 3 Out

C.  

creating an external physical network

D.  

extending the bridge domain out of the ACI fabric

E.  

extending the EPG out of the ACI fabric

Discussion 0
Question # 60

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

Options:

A.  

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.  

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.  

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.  

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Discussion 0
Get 300-620 dumps and pass your exam in 24 hours!

Free Exams Sample Questions