Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-620 Cisco Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 247 questions

An engineer needs to avoid loops in the ACI network and needs an ACI leaf switch to error-disable an interface if the interface receives an ACI-generated packet. Which action meets these requirements?

A.

Enable the Loop Indication by MCP event in the Error Disabled Recovery Policy.

B.

Set Rogue EP Control in the Endpoint Controls Policy.

C.

Uncheck the Loop Protection Action check box in MCP Instance Policy.

D.

Change the default administrative state of the global MCP Instance Policy.

Refer to the exhibit, An engineer is deploying a Cisco ACI environment but experiences a STP loop between switch1 and switch2. Which configuration step is needed to break the STP loop?

A.

Configure the STP instance to VLAN mapping under the switch STP policy.

B.

Configure a Layer 2 external bridged network on the interfaces facing the MST switches.

C.

Enable the native VLAN on the interfaces facing the MST switches using static pons in a dedicated EPG.

D.

Enable BPDU filter under the STP interface policy on the Interfaces lacing the MST switches.

Refer to the exhibit. An engineer must allow IP mobility between Site1 and Site2 in a Cisco ACI Multi-Site orchestrator. The design must meet these requirements:

A disaster recovery (DR) solution must exist between the sites that do not require vMotion support.

The application must be started at a DR site without having to re-IP the application servers.

The solution must avoid any broadcast storms between the sites.

Which two actions meet these criteria? (Choose two.)

A.

Define a unique bridge domain subnet per site.

B.

Configure STP between Cisco ACI fabrics.

C.

Deploy a local EPG for Site1 and Site2.

D.

Disable Inter-site BUM Traffic.

E.

Apply the L2 Stretch feature.

Refer to the exhibit.

A systems engineer is implementing the Cisco ACI fabric. However, the Server2 information is missing from the Leaf 101 endpoint table and the COOP database of the spine. The requirement is for the bridge domain configuration to enforce the ACI fabric to forward the unicast packets generated by Server1 destined to Server2. Which action must be taken to meet these requirements?

A.

Enable ARP Flooding

B.

Set L2 Unknown Unicast to Flood

C.

Set IP Data-Plane Learning to No

D.

Enable Unicast Routing

Refer to the exhibit.

Which Adjacency Type value should be set when the client endpoint and the service node

interface are in a different subnet?

A.

Routed

B.

Unicast

C.

L3Out

D.

L3

An engineer must attach an ESXi host to the Cisco ACI fabric. The host is connected to Leaf 1 and has its gateway IP address 10.10.10.254/24 configured inside the ACI fabric. A new wall is attached to Leaf 2 and mapped to the same EPG and BD as the ESXi host. The engineer must migrate the gateway of the ESXi host to the firewall. Which configuration set complishes this goal?

A.

Disable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI BD.

B.

Enable unicast routing.

Configure IP address 10.10.10.254/24 on the ACI EPG.

C.

Disable unicast routing.

Define IP address 10.10.10.254/24 on the firewall.

D.

Enable unicast routing.

Set IP address 10.10.10.254/24 on the firewall.

An engineer must configure a Layer 3 connection to the WAN router. The hosts in production VRF must access WAN subnets. The engineer associates EPGs in the production VRF with the external routed domain. Which action completes the task?

A.

Configure the Export Route Control Subnet scope for the external EPG.

B.

Configure the External Subnets for the External EPG scope for the external EPG.

C.

Configure the Import Route Control Subnet scope for the external EPG.

D.

Configure the Shared Route Control Subnet scope for the external EPG.

Refer to the exhibit.

An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)

A.

Layer 3 routed port

B.

VPC with SVI

C.

port channel with SVI

D.

Layer 3 routed subinterface

E.

Layer 3 floating SVI

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

A.

Endpoints must connect directly to the ACI leaf port.

B.

External endpoints are in a different bridge domain than the endpoints in the fabric.

C.

Endpoint learning encompasses the MAC address only.

D.

External endpoints are in the same EPG as the directly attached endpoints.

Refer to the exhibit.

A customer is deploying a WAN with these requirements: •Routers 1 and 2 must receive only routes 192.168.11.0/24 and 192.168.21.0724 from the Cisco ACI fabric •Reachability to the WAN users must be permitted only for the servers that are located in vrf_prod.

Which settings must be configured to meet these objectives?

A.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

B.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF. Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

C.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

D.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

An engineer implements a configuration backup on the Cisco APIC. The backup job must meet these requirements:

• The backup must transfer the encrypted data to the remote server.

• The transfer must be resumed if the connection is interrupted.

Which configuration set meets these requirements?

A.

Select protocol HTTP in Create Remote Location. Choose JSON format in Configuration Export Policy.

B.

Select protocol TFTP in Create Remote Location. Choose JSON format in Configuration Export Policy

C.

Select protocol FTP in Create Remote Location. Choose XML format in Configuration Export Policy.

D.

Select protocol SFTP in Create Remote Location. Choose XML format in Configuration Export Policy.

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

Which new construct must a user create when configuring in-band management?

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

A.

Create an additional login domain that references local accounts

B.

Enable the fallback check with the default authentication domain

C.

Associate console authentication with the "RADIUS" realm.

D.

Reference the local realm in the fallback domain

Which protocol does ACI use to securely sane the configuration in a remote location?

A.

SCP

B.

HTTPS

C.

TFTP

D.

FTP

What is MP-BGP used for in Cisco ACl fabric?

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer must configure a service graph for the policy-based redirect to redirect traffic to a transparent firewall. The policy must be vendor-agnostic to support any firewall appliance, Which two actions accomplish these goals? (Choose two.)

A.

Set the Service Type to Other.

B.

Set Promiscuous Mode to True.

C.

Set Function Type to L2.

D.

Set Managed to True.

E.

Set Context Aware to Single.

Which two protocols are used for fabric discovery in ACI? (Choose two.)

A.

LLDP

B.

OSPF

C.

CDP

D.

DHCP

E.

ISIS

Page: 1 / 4
Total 247 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved