Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-620 Cisco Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 247 questions

A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/ L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

A.

ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.

B.

A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.

C.

ACI Multi-Pod requires an IP Network supporting PIM-Bidir.

D.

ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.

E.

Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.

Engineer resolves an underlying condition of a fault but notices that the fault was not deleted from the Faults view. Which two actions must be taken to remove the fault? (Choose two.)

A.

The fault is deleted after the retention interval.

B.

Acknowledge the fault as an administrator.

C.

The raised condition ceases.

D.

The soaking timer expires.

Refer to the exhibit.

The Cisco ACI fabric is built with L20ut to the N9K1 and N9K2 switches. The switches run the RSTP protocol. The requirement is for the Cisco ACI fabric to detect 5 from the N9K and for the fabric to be protected against loops. Which set of actions must be taken to meet the requirements?

A.

Configure the N9K STP link type as point-to-point link. Enable MCP on ACI globally.

B.

Configure the N9K STP link type as a point-to-point Enable MCP on the ACI leaf interfaces.

C.

Configure the N9K STP link type as a shared link. Enable MCP on the ACI leaf interfaces.

D.

Configure the N9K STP link type as a shared link. Enable MCP on ACI globally.

Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?

A.

ARP gleaning

B.

dynamic endpoint attach

C.

hardware proxy

D.

network-stitching

Which Cisco ACI setting corresponds to the VMware MAC pinning?

A.

route based on IP hash

B.

route based on originating virtual port

C.

route based on physical NIC load

D.

route based on MAC hash

An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?

A.

BPDU Guard

B.

per-VLANMCP

C.

Storm Control

D.

BPDU Filter

Refer to the exhibit. Which two configurations enable inter-VRF communication? (Choose two.)

A.

Set the subnet scope to Shared Between VRFs.

B.

Enable Advertise Externally under the subnet scope.

C.

Export the contract and import as a contract interface.

D.

Change the contract scope to Tenant.

E.

Change the subject scope to VRF.

An engineer configures port-12 on Leaf-101 and Leaf-102 to connect to a new server, SVR-12. The new server will belong to EPG-12 and use encap VLAN-1212. The engineer configured SVR-12 as a VPC member port and statically bound the VPC member port to EPG-12. Which additional step must the engineer take to configure connectivity?

A.

Create a VPC Explicit Protection Group for EPG-12 and VLAN-1212.

B.

Associate a domain with EPG-12 that is associated with VLAN-1212.

C.

Select VLAN-1212 on the EPG-12 Interface Policy Group.

D.

Configure an LACP Interface Policy and apply it to EPG-12.

In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

A.

Endpoint information is not exchanged across sites unless COOP protocol is used.

B.

Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.

C.

Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.

D.

Endpoint information is exchanged across sites when the endpoints are discovered in both sites.

Refer to the exhibit. An engineer configured subnets on the external EPG called L3OUT_CORE. The external endpoints in the 10.1.0.0/24 subnet can reach internal endpoints, but the external endpoints in the 172.16.1.0/24 subnet are unreachable. Which set of actions enables the connectivity?

A.

Delete both external EPG subnets.

Create the 0.0.0.0/1 subnet.

B.

Delete the external EPG subnet 0.0.0.128/1.

Create the 128.0.0.0/1 subnet.

C.

Delete both external EPG subnets.

Create the 0.0.0.0/0 subnet.

D.

Delete the external EPG subnet 0.0.0.0/0.

Create the 0.0.0.0/128 subnet.

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which statement about ACI syslog is true or Which statement describes the ACI syslog?

A.

Notifications for different scopes of syslog objects can be sent only to one destination.

B.

Syslog messages are sent to the destination through the spine.

C.

All syslog messages are sent to the destination through APIC.

D.

Switches send syslog messages directly to the destinations.

Network engineer configured a Cisco ACI fabric as follows:

• An EPG called EPG-A is created and associated with a VMM domain called North. •The EPG-A is associated with BD-A and is in an application profile called Apps-A.

• The BD-A is associated with VRF-1 in the Prod tenant.

Which port group must be selected to place VMs in EPG-A?

A.

Prod|VRF-1 |Apps-A|EPG-A

B.

Prod|Business_Apps|BD-A|EPG-A

C.

Prod|Apps-A|North|EPG-A

D.

Prod|Apps-A|EPG-A

An engineer must add a group of 70 bare-metal ESXi servers to the Cisco ACI fabric, which is integrated with vCenter. These configuration steps are complete:

The configured pool of ESXi hosts is configured with an Attachable Access Entity Profile (AAEP) called AEP_VMM.

The new group uses the AAEP called AEP_BAREMETAL.

Which action extends functional VMM integration to the new nodes?

A.

Update AAEP to AEP_VMM on all policy groups that are used toward bare-metal servers.

B.

Create a new AAEP container object for policy groups for AEP_VMM.

C.

Implement a separate VMM domain for the bare-metal servers by using AEP_VMM.

D.

Add the VMM domain under the AEP_BAREMETAL AAEP object.

An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

A.

from leaf ports tagged as VLAN 0

B.

from leaf ports untagged

C.

from leaf ports tagged as VLAN 4094

D.

from leaf ports tagged as VLAN 1

Refer to the exhibit.

An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?

A.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the provider tenant.

B.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

C.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

D.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the consumer tenant.

A customer creates Layer 3 connectivity to the outside network. However, only border leaf switches start receiving destination updates to other networks from the newly created L3Out. The updates must also be propagated to other Cisco ACI leaf switches. The L3Out is linked with the EPGs via a contract. Which action must be taken in the pod policy group to accomplish this goal?

A.

Apply a BGP route reflector policy.

B.

Enable a COOP policy.

C.

Configure an IS-IS policy.

D.

Implement an access management policy.

Refer to the exhibit. A tenant is configured with a single L30ut and a single-homed link to the core router called Core-1. An engineer must add a second link to the L30ut that connects to Core-2 router. Which action allows the traffic from Core-2 to BL-1002 to have the same connectivity as the traffic from Core-1 to BL-1001?

A.

Add a second path to the logical interface profile of the existing L30ut

B.

Add a second subnet to the external EPG to the existing L30ut.

C.

Add a second OSPF interface profile to the logical interface profile.

D.

Add a second interface to the external domain to the existing L30ut.

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Refer to the exhibit.

An engineer must migrate workloads from the brownfield network to the Cisco ACI fabric. The VLAN 10 default gateway remains in the router located in the brownfield Network. The bridge domain has already been associated with L20ut. Which two actions must be taken to migrate the workloads? (Choose two.)

A.

Select Limit IP Learning to Subnet.

B.

Configure Multi-Destination Flooding Flood in Encapsulation.

C.

Set L2 Unknown Unicast Flood.

D.

Map the MAC address of the default gateway to the bridge domain

E.

Enable ARP Flooding

Page: 2 / 4
Total 247 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved