Cisco 300-620 Exam Questions
Implementing Cisco Application Centric Infrastructure (DCACI) (Page 2 )

Updated On: 17-May-2026

An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?





Answer(s): D

Explanation:

Option D is correct because Cisco ACI with Nexus 2000 Series fabric extenders (FEX) uses a topology where the FEX connects to a single upstream APIC-controlled leaf switch, forming a spine-leaf with FEXs as fabric extenders behind a single parent leaf. The other options are incorrect because:
A) Implies a topology not supported by FEX integration with ACI for 10G fabric extenders.
B) Describes a non-existent or unsupported dispersion of FEXs across multiple distinct spine/leaf boundaries in this context.
C) Suggests a topology incompatible with FEX-to-APIC control and established ACI fabric design.
D) Matches the supported single-leaf-connected FEX deployment model.



An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

  1. Inspect event records in the APIC UI to see all actions performed by users.
  2. Inspect /var/log/audit_messages on the APIC to see a record of all user actions.
  3. Inspect audit logs in the APIC UI to see all user events.
  4. Inspect the output of show command history in the APIC CLI.

Answer(s): C

Explanation:

Option C is correct because APIC UI audit logs capture user events and changes, allowing verification of human interventions and correlating actions with fabric behavior.
A) Incorrect — Event records in the APIC UI may show actions but are not as specifically framed as audit logs for all user events; scope might be limited or filtered.
B) Incorrect — /var/log/audit_messages is not standard APIC UI-accessible; APIC audit is exposed in UI/logs rather than host-level audit_messages.
D) Incorrect — show command history in the APIC CLI is not a typical or reliable source for comprehensive user-audit trails across the fabric; UI audit is preferred.



An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

  1. merge
  2. atomic
  3. best effort
  4. replace

Answer(s): B

Explanation:

Option B is correct because atomic import mode ensures the entire configuration import is treated as an all-or-nothing operation; if any part is incompatible with the existing system, the import is aborted and no changes are applied, preserving system integrity. A) merge allows applying changes incrementally, which can leave partial updates and conflicts. C) best effort attempts to apply as much as possible, tolerating incompatibilities. D) replace substitutes the current configuration wholesale but does not inherently terminate on incompatibility; it can still apply if local checks pass.


Reference:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/aci-fundamentals/Cisco- ACI-Fundamentals-401/Cisco-ACI-Fundamentals-401_chapter_01011.html



Which components must be configured for the BGP Route Reflector policy to take effect?

  1. spine fabric interface overrides and profiles
  2. access policies and profiles
  3. pod policy groups and profiles
  4. leaf fabric interface overrides and profiles

Answer(s): C

Explanation:

Option C is correct because BGP Route Reflector policy in DCACI is applied via pod policy groups and profiles, which define route reflection behavior within a pod and propagate routes accordingly.
A) Incorrect — spine fabric interface overrides and profiles pertain to spine-specific interface configurations, not route reflector policy scope.
B) Incorrect — access policies and profiles relate to user or device access control, not BGP route reflection behavior.
D) Incorrect — leaf fabric interface overrides and profiles govern leaf-side interface overrides, not the Route Reflector policy application.


Reference:

https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric- infrastructure/guide-c07-743150.html#2DistributeexternalrouteswithintheACIfabric



Which type of policy configures the suppression of faults that are generated from a port being down?

  1. fault lifecycle assignment
  2. event lifecycle assignment
  3. fault severity assignment
  4. event severity assignment

Answer(s): C

Explanation:

Option C is correct because fault suppression policies in ACI DCACI control how faults generated by a down port are filtered or suppressed based on fault severity assignments. This directly targets faults, not events, and applies to fault lifecycle/severity handling.
A) Incorrect — fault lifecycle assignment governs the stages a fault goes through (creation, closure, rollback), not suppression rules for down-port faults.
B) Incorrect — event lifecycle assignment handles events, not faults, and does not specify suppression of down-port faults.
D) Incorrect — event severity assignment pertains to events’ severity, not faults arising from a port down.


Reference:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/all/faults/guide/ b_APIC_Faults_Errors/b_IFC_Faults_Errors_chapter_01.html



Which type of profile needs to be created to deploy an access port policy group?

  1. attachable entity
  2. Pod
  3. module
  4. leaf interface

Answer(s): D

Explanation:

Option D is correct because deploying an access port policy group requires a leaf interface profile to map policies to specific leaf ports in the ACI fabric.
A) Incorrect — Attachable entity profile (AEP) defines how an endpoint device attaches to an EPG, not a port policy for access port grouping.
B) Incorrect — Pod involves logical grouping of fabric elements, not the specific port policy application to an access port.
C) Incorrect — Module is a hardware construct in APIC terms, not the profile type used to deploy an access port policy group.



A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?

  1. Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.
  2. Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.
  3. Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault.
  4. Create a new global health score policy that ignores specific faults as identified by their unique fault code.

Answer(s): C

Explanation:

Option C is correct because ignoring a fault via Ignore Fault creates a fault severity assignment policy that hides that fault from the APIC fault views, effectively suppressing it for the administrator’s environment.
A is incorrect because Acknowledge Fault only marks the fault as acknowledged; it does not hide or suppress it from fault views.
B is incorrect because a stats threshold policy controls performance metrics and thresholds, not fault visibility or suppression.
D is incorrect because a global health score policy can influence health scoring but does not provide per-fault hiding by fault code; it’s not the mechanism for suppressing a specific fault.



A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

  1. tenant
  2. security domain
  3. primary Cisco APIC
  4. managed object class

Answer(s): D

Explanation:

Option D is correct because Cisco AV Pair resolves to a managed object class within APIC’s ABAC/Attribute-Policy framework, mapping RADIUS attributes to specific UCS/ACI managed objects for enforcement.
A) Incorrect — tenant is not the direct object resolved by AV Pair; AV Pair targets a managed object class for policy application, not a tenant entity itself.
B) Incorrect — security domain is not the AV Pair resolution target; AV Pair maps to object classes used for policy evaluation, not a domain construct.
C) Incorrect — primary Cisco APIC is not what the AV Pair resolves to; APIC is the controller, while AV Pair maps to a class of managed objects.


Reference:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2-x/Security_config/ b_Cisco_APIC_Security_Configuration_Guide/b_Cisco_APIC_Security_Guide_chapter_01011.html



Viewing page 2 of 50
Viewing questions 9 - 16 out of 389 questions


300-620 Exam Discussions & Posts (Share your experience with others)

AI Tutor AI Tutor 👋 I’m here to help!