ExamGecko
Home / Cisco / 300-620 / List of questions
Ask Question

Cisco 300-620 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?


Cisco 300-620 image Question 111 113458 10072024010039000000

Option A

Option A

Option B

Option B

Option C

Option C

Suggested answer: B
asked 07/10/2024
law ryan
35 questions

Question 112

Report Export Collapse

Cisco 300-620 image Question 112 113459 10072024010039000000

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

Cisco 300-620 image Question 112 113459 10072024010039000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: B
asked 07/10/2024
Sharon Sandhu
48 questions

Question 113

Report Export Collapse

What is MP-BGP used for in Cisco ACl fabric?

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

Suggested answer: A
asked 07/10/2024
CCF AG Alexander Seidler
37 questions

Question 114

Report Export Collapse

An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support Which configuration set must be used?

Cisco 300-620 image Question 114 113461 10072024010039000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: D
asked 07/10/2024
Paul Devlin
41 questions

Question 115

Report Export Collapse

A Cisco APIC is configured with RADIUS authentication as the default The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?

Create an additional login domain that references local accounts

Create an additional login domain that references local accounts

Enable the fallback check with the default authentication domain

Enable the fallback check with the default authentication domain

Associate console authentication with the "RADIUS" realm.

Associate console authentication with the "RADIUS" realm.

Reference the local realm in the fallback domain

Reference the local realm in the fallback domain

Suggested answer: D
asked 07/10/2024
jitendra makwana
42 questions

Question 116

Report Export Collapse

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

Cisco 300-620 image Question 116 113463 10072024010039000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: C
asked 07/10/2024
Karen Charllotte Aglipay
36 questions

Question 117

Report Export Collapse

Cisco 300-620 image Question 117 113464 10072024010039000000

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

Change the switch APIC Connectivity Preference to in-band management

Change the switch APIC Connectivity Preference to in-band management

Remove the in-band management address from the APIC.

Remove the in-band management address from the APIC.

Add a Fabric Access Policy to allow management connections.

Add a Fabric Access Policy to allow management connections.

Modify the Pod Profile to use the default Management Access Policy

Modify the Pod Profile to use the default Management Access Policy

Suggested answer: B
asked 07/10/2024
Terence Coates
41 questions

Question 118

Report Export Collapse

A bridge domain for an EPC called “Web Servers” must be created in the Cisco APIC. The configuration must meet these requirements:

Only traffic to known Mac addresses must be allowed to reduce noice.

The multicast traffic must be limited to the ports that are participating in multicast routing.

The endpoints within the bridge domain must be kept in the endpoint table for 20 minultes without any updates.

Which set of steps configures the bridge domain that satisfies the requirements?


Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

Select the ARP Flooding checkbox.

Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.

Set L3 Unknown Multicast Flooding to Optimized Flooding

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

Set L2 Unknown Unicast to Hardware Proxy.

Configure L3 Unknown Multicast Flooding to Optimized Flood.

Create an Endpoint Retention Policy with a Local Endpoint Aging interval of 1200 seconds.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

Switch L2 Unknown Unicast to Flood.

Select the default Endpoint Retention Policy and set the Local Endpoint Aging to 20 minutes.

Set Multicast Destination Flooding to Flood in Encapsulation.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Multicast Destination Flooding should be set to Flood in BD.

Set L3 Unknown Multicast Flooding to Flood.

Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.

Suggested answer: B
asked 07/10/2024
H Barral Vila
35 questions

Question 119

Report Export Collapse

The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?

access policy

access policy

infra tenant

infra tenant

switch profile

switch profile

fabric policy

fabric policy

Suggested answer: D
asked 07/10/2024
Stephanie Scheffers
45 questions

Question 120

Report Export Collapse

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment.

Which action accomplishes this goal?

Associate the VMM domain with the EPGs that must be available in vCenter.

Associate the VMM domain with the EPGs that must be available in vCenter.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

Configure contracts for the EPGs that are required on the ESXi hosts.

Configure contracts for the EPGs that are required on the ESXi hosts.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Suggested answer: A
asked 07/10/2024
Naing Thet
46 questions
Total 247 questions
Go to page: of 25
Search

Related questions