ExamGecko
Home / Cisco / 300-620 / List of questions
Ask Question

Cisco 300-620 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?


Cisco 300-620 image Question 111 113458 10072024010039000000

Become a Premium Member for full access
  Unlock Premium Member

Question 112

Report Export Collapse

Cisco 300-620 image Question 112 113459 10072024010039000000

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

Cisco 300-620 image Question 112 113459 10072024010039000000

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

What is MP-BGP used for in Cisco ACl fabric?

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

Cisco 300-620 image Question 114 113461 10072024010039000000

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Cisco 300-620 image Question 116 113463 10072024010039000000

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

Cisco 300-620 image Question 117 113464 10072024010039000000

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

Only traffic to known Mac addresses must be allowed to reduce noice.

The multicast traffic must be limited to the ports that are participating in multicast routing.

The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?


Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment.

Which action accomplishes this goal?

Become a Premium Member for full access
  Unlock Premium Member
Total 247 questions
Go to page: of 25
Search

Related questions