300-620 Dumps 300-620 Braindumps 300-620 Real Questions 300-620 Practice Test 300-620 Actual Questions Cisco 300-620 Implementing Cisco Application Centric Infrastructure (DCACI) https://killexams.com/pass4sure/exam-detail/300-620 Question: 112 An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result? A. merge B. atomic C. best effort D. replace Answer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/aci-fundamentals/Cisco-ACI-Fundamentals-401/Cisco-ACI-Fundamentals- 401_chapter_01011.html Question: 113 Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG? A. ARP gleaning B. dynamic endpoint attach C. hardware proxy D. network-stitching Answer: B Question: 114 Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes? A. vzAny contracts B. standard contracts C. application EPGs D. uSeg EPGs Answer: D Question: 115 Where is the COOP database located? A. leaf B. spine C. APIC D. endpoint Answer: B Explanation: Reference: https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centricinfrastructure/white-paper-c11-739989.html Question: 116 Which type of policy configures the suppression of faults that are generated from a port being down? A. fault lifecycle assignment B. event lifecycle assignment C. fault severity assignment D. event severity assignment Answer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/all/faults/guide/b_APIC_Faults_Errors/b_IFC_Faults_Errors_chapter_01.html Question: 117 Which type of profile needs to be created to deploy an access port policy group? A. attachable entity B. Pod C. module D. leaf interface Answer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1- x/Operating_ACI/guide/b_Cisco_Operating_ACI/b_Cisco_Operating_ACI_chapter_0110.html Question: 118 A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing? A. Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear. B. Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold. C. Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault. D. Create a new global health score policy that ignores specific faults as identified by their unique fault code. Answer: C Question: 119 DRAG DROP An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration. Answer: Question: 120 DRAG DROP Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters. Answer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1- x/Operating_ACI/guide/b_Cisco_Operating_ACI/b_Cisco_Operating_ACI_chapter_01000.html Question: 121 What is a key objective of the Egmont Group? A. To find ways to promote the development of Financial Intelligence Units and the sharing of expertise. B. To safeguard the financial system from illicit use and combat money laundering and promote national security. C. To issue binding standards that establish consistently operated Financial Intelligence Units in member jurisdictions. D. To provide best practices for financial institutions on how to report suspicious activity to best share the information with law enforcement. Answer: B Explanation: Reference: https://egmontgroup.org/en Question: 122 Which components must be configured for the BGP Route Reflector policy to take effect? A. spine fabric interface overrides and profiles B. access policies and profiles C. pod policy groups and profiles D. leaf fabric interface overrides and profiles Answer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/L3-configuration/Cisco-APIC-Layer-3-Networking-Configuration-Guide- 401/Cisco-APIC-Layer-3-Networking-ConfigurationGuide-401_chapter_01.html Question: 123 A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to? A. tenant B. security domain C. primary Cisco APIC D. managed object class Answer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2- x/Security_config/b_Cisco_APIC_Security_Configuration_Guide/b_Cisco_APIC_Security_Guide_chapter_01011.html Question: 124 An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change? A. Inspect event records in the APIC UI to see all actions performed by users. B. Inspect /var/log/audit_messages on the APIC to see a record of all user actions. C. Inspect audit logs in the APIC UI to see all user events. D. Inspect the output of show command history in the APIC CL Answer: A Question: 125 How is an EPG extended outside of the ACI fabric? A. Create an external bridged network that is assigned to a leaf port. B. Create an external routed network that is assigned to an EP D. Enable unicast routing within an EP F. Statically assign a VLAN ID to a leaf port in an EP Answer: D Explanation: Reference: https://www.dclessons.com/l2-external-network-with-aci Question: 126 Which two telecom data settings can be enabled and collected by an administrator? (Choose two.) A. Websites visited while using cellular data B. The cellular data use in terms of total bytes sent and received C. The total voice minutes used for all cellular calls D. The telephone numbers dialed and received E. The SMS message content sent and received Answer: BC Question: 127 An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration? A. from leaf ports tagged as VLAN 0 B. from leaf ports untagged C. from leaf ports tagged as VLAN 4094 D. from leaf ports tagged as VLAN 1 Answer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