2020/Sep Latest Braindump2go 300-620 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 300-620 Real Exam Questions!
What must be configured to allow SNMP traffic on the APIC controller?
A. out-of-band management interface
B. contract under tenant mgmt
C. SNMP relay policy
D. out-of-band bridge domain
Which type of port is used for in-band management within ACI fabric?
A. spine switch port
B. APIC console port
C. leaf access port
D. management port
Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?
Which statement about ACI syslog is true?
A. Notifications for different scopes of syslog objects can be sent only to one destination.
B. Syslog messages are sent to the destination through the spine.
C. All syslog messages are sent to the destination through APIC.
D. Switches send syslog messages directly to the destinations.
A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?
A. 1. Create two maintenance groups for the APIC controllers: VPC left and VPC right.
2. Upgrade the first group of controllers.
3. Upgrade the second group of controllers.
4. Upgrade the leaf switches.
B. 1. Create two maintenance groups for APIC controllers: VPC left and VPC right.
2. Upgrade the leaf switches.
3. Upgrade the first group of controllers.
4. Upgrade the second group of controllers.
C. 1. Create two maintenance groups for the leaf switches: VPC left and VPC right.
2. Upgrade the APIC controllers.
3. Upgrade the first group of leaf switches.
4. Upgrade the second group of leaf switches.
D. 1. Create two maintenance groups for the leaf switches: VPC left and VPC right.
2. Upgrade the first group of switches.
3. Upgrade the second group of switches.
4. Upgrade the APIC controllers.
Which protocol does ACI use to securely sane the configuration in a remote location?
Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)
Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?
A. cisco-security domain
In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?
A. Endpoint information is not exchanged across sites unless COOP protocol is used.
B. Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.
C. Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.
D. Endpoint information is exchanged across sites when the endpoints are discovered in both sites.
Which statement regarding ACI Multi-Pod and TEP pool is true?
A. The IP addresses used in the IPN network can overlap TEP pool of the APIC.
B. A different TEP pool must be assigned to each Pod.
C. The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.
D. The same TEP pool is used in all Pods.
What are two benefits of the Clos architecture? (Choose two.)
A. improved fabric scalability
B. complicated network design and implementation
C. multiple nonblocking ECMP paths from all leafs
D. limited fabric scalability
As the Cisco ACI fabric administrator for a service provider, you have deployed a multitenant environment for your customers. Can a customer see the configuration of other customers’ environments and fabric configurations?
A. Yes, by default, all tenants of the fabric have administrative permissions.
B. No, read/write restrictions prevent tenants from seeing other tenants including fabric configurations.
C. No, intrusion detection devices hinder intertenant communication.
D. Yes, by extrapolating data contained in multicast encapsulated frames, a tenant can intercept data of other tenants.
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?
A. Endpoints must connect directly to the ACI leaf port.
B. External endpoints are in a different bridge domain than the endpoints in the fabric.
C. Endpoint learning encompasses the MAC address only.
D. External endpoints are in the same EPG as the directly attached endpoints.
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?
A. “Limit IP learning to network” setting within the bridge domain.
B. “Limit IP learning to subnet” setting within the EPG.
C. “Limit IP learning to network” setting within the EPG.
D. “Limit IP learning to subnet” setting within the bridge domain.
An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)
A. Layer 2 remote fabric
B. Layer 2 outside
C. Layers 2 internal
D. Static path binding
E. VXLAN outside
Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)
A. extending the routed domain out of the ACI fabric
B. creating a single homed Layer 3 Out
C. creating an external physical network
D. extending the bridge domain out of the ACI fabric
E. extending the EPG out of the ACI fabric
1.2020 Latest Braindump2go 300-620 Exam Dumps (PDF & VCE) Free Share:
2.2020 Latest Braindump2go 300-620 PDF and 300-620 VCE Dumps Free Share:
3.2020 Free Braindump2go 300-620 PDF Download:
Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!