ExamGecko
Home Home / Cisco / 300-620

Cisco 300-620 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?


A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
Suggested answer: B

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

What is MP-BGP used for in Cisco ACl fabric?

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

Answers
B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

Answers
C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

Answers
D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

Answers
Suggested answer: A

An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

A.

Create an additional login domain that references local accounts

A.

Create an additional login domain that references local accounts

Answers
B.

Enable the fallback check with the default authentication domain

B.

Enable the fallback check with the default authentication domain

Answers
C.

Associate console authentication with the "RADIUS" realm.

C.

Associate console authentication with the "RADIUS" realm.

Answers
D.

Reference the local realm in the fallback domain

D.

Reference the local realm in the fallback domain

Answers
Suggested answer: D

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

A.

Change the switch APIC Connectivity Preference to in-band management

A.

Change the switch APIC Connectivity Preference to in-band management

Answers
B.

Remove the in-band management address from the APIC.

B.

Remove the in-band management address from the APIC.

Answers
C.

Add a Fabric Access Policy to allow management connections.

C.

Add a Fabric Access Policy to allow management connections.

Answers
D.

Modify the Pod Profile to use the default Management Access Policy

D.

Modify the Pod Profile to use the default Management Access Policy

Answers
Suggested answer: B

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

Only traffic to known Mac addresses must be allowed to reduce noice.

The multicast traffic must be limited to the ports that are participating in multicast routing.

The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?


A.

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

A.

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

Answers
B.

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

B.

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

Answers
C.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

C.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

Answers
D.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

D.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Answers
Suggested answer: B

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

A.

access policy

A.

access policy

Answers
B.

infra tenant

B.

infra tenant

Answers
C.

switch profile

C.

switch profile

Answers
D.

fabric policy

D.

fabric policy

Answers
Suggested answer: D

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment.

Which action accomplishes this goal?

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

Answers
B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

Answers
C.

Configure contracts for the EPGs that are required on the ESXi hosts.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

Answers
D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Answers
Suggested answer: A
Total 192 questions
Go to page: of 20