DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Boost Your Certification Prep with 300-620 Mock Tests, Cisco Data Center 300-620 DCACI | SPOTO

Enhance your certification preparation for the CCNP Data Center 300-620 DCACI exam with our comprehensive mock tests. These tests cover essential topics such as the configuration, implementation, and management of Cisco switches in ACI mode. Access our free test to evaluate your proficiency and readiness. Utilize our exam dumps and exam answers to reinforce your understanding and preparation strategy. The Implementing Cisco Application Centric Infrastructure (DCACI) course offered by SPOTO is designed to equip candidates with the necessary skills and knowledge for success in the exam. With our mock exams and online exam questions, simulate real exam scenarios to boost your confidence. Trust SPOTO to provide top-quality resources to ensure you're fully prepared to excel in your certification journey.
Take other online exams

Question #1
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?
A. “Limit IP learning to network” setting within the bridge domain
B. “Limit IP learning to subnet” setting within the EPG
C. “Limit IP learning to network” setting within the EPG
D. “Limit IP learning to subnet” setting within the bridge domain
View answer
Correct Answer: C
Question #2
An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?
A. merge
B. atomic
C. best effort
D. replace
View answer
Correct Answer: B
Question #3
Which type of policy configures the suppression of faults that are generated from a port being down?
A. fault lifecycle assignment
B. event lifecycle assignment
C. fault severity assignment
D. event severity assignment
View answer
Correct Answer: C
Question #4
An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?
A. It is forwarded to one of the spines to perform as a spine proxy
B. It is flooded within the whole fabric
C. It is dropped by the leaf when the destination endpoint is not present in the endpoint table
D. It is forwarded to one of the APICs to perform as a proxy
View answer
Correct Answer: BE
Question #5
Which two objects are created as a result of the configuration? (Choose two.)
A. application profile
B. attachable AEP
C. bridge domain
D. endpoint group
E. VRF
View answer
Correct Answer: C
Question #6
Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)
A. Spine1
B. apic1
C. Spine2
D. Leaf1
E. Leaf2
F. apic2
View answer
Correct Answer: A
Question #7
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?
A. The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables
B. The Layer 2 unknown hardware proxy lacks support of the topology change notification
C. The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables
D. The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database
View answer
Correct Answer: A
Question #8
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?
A. Endpoints must connect directly to the ACI leaf port
B. External endpoints are in a different bridge domain than the endpoints in the fabric
C. Endpoint learning encompasses the MAC address only
D. External endpoints are in the same EPG as the directly attached endpoints
View answer
Correct Answer: B
Question #9
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?
A. The source MAC and IP address of the traffic is learned as a local endpoint
B. The source MAC address of the traffic is learned as a remote endpoint
C. No source MAC or IP address of the traffic is learned as a remote endpoint
D. The source IP address of the traffic is learned as a remote endpoint
View answer
Correct Answer: AC
Question #10
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?
A. Inspect event records in the APIC UI to see all actions performed by users
B. Inspect /var/log/audit_messages on the APIC to see a record of all user actions
C. Inspect audit logs in the APIC UI to see all user events
D. Inspect the output of show command history in the APIC CLI
View answer
Correct Answer: A
Question #11
Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?
A. ARP gleaning
B. dynamic endpoint attach
C. hardware proxy
D. network-stitching
View answer
Correct Answer: D
Question #12
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?
A. Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear
B. Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold
C. Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault
D. Create a new global health score policy that ignores specific faults as identified by their unique fault code
View answer
Correct Answer: A
Question #13
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?
A. L2 unknown unicast: flood
B. GARP based detection
C. unicast routing
D. subnet scope
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: