Cisco 300-620 Exam Questions
Implementing Cisco Application Centric Infrastructure (DCACI) (Page 21 )

Updated On: 17-May-2026

A network engineer configured a Cisco ACI fabric as follows:
· An EPG called EPG-A is created and associated with a VMM domain called North. · The EPG-A is associated with BD-A and is in an application profile called Apps-A.
· The BD-A is associated with VRF-1 in the Prod tenant.

Which port group must be selected to place VMs in EPG-A?

  1. Prod|Apps-A|EPG-A
  2. Prod|Apps-A|North|EPG-A
  3. Prod|Business_Apps|BD-A|EPG-A
  4. Prod|VRF-1|Apps-A|EPG-A

Answer(s): A

Explanation:

Option A is correct because in Cisco ACI, VM placement into an EPG is determined by the combination of Tenant|Application Profile|EPG. Since EPG-A is in Apps-A and associated to the Prod tenant, selecting Prod|Apps-A|EPG-A places VMs into that EPG.
B) Incorrect — North is a VMM domain not part of the EPG selection path for VM placement; VMM domains are used for integration with external hypervisors, not as port groups for EPG binding.
C) Incorrect — BD-A is an internal construct; the port group must reference the application profile and EPG, not the BD name.
D) Incorrect — VRF-1 belongs to the BD’s contract scope but is not used in the port group path to assign VMs to an EPG.



Which switch type is discovered first in the Cisco ACI fabric discovery process?

  1. spine
  2. distribution
  3. leaf
  4. access

Answer(s): C

Explanation:

Option C is correct because leaf switches are discovered first in the ACI fabric discovery process as the initial tenant-facing devices before spine and distribution roles are established. A) spine is discovered later as the fabric core interconnects after leafs, not first. B) distribution switches are not the initial discovery target; they are part of the aggregation layer discovered after leaves. D) access is not a switch type in ACI fabric discovery; access terms apply to user interfaces, not the fabric’s discovery sequence.



Refer to the exhibit.



An engineer configures a Layer 4 to Layer 7 device object. The device is a virtual firewall with a single network adapter and it must be deployed in routed mode. Which action completes the configuration of the device object?

  1. Enable Promiscuous Mode.
  2. Change Function Type to GoTo.
  3. Change context awareness to Multiple.
  4. Add an outside interface to the cluster interfaces.

Answer(s): B

Explanation:

Option B is correct because in Cisco ACI L4-L7 device objects, selecting Function Type as GoTo completes the routed-mode configuration by directing traffic to the next hop rather than performing inline filtering, aligning with a virtual firewall in routed mode. Incorrect — A: Promiscuous Mode is not required to deploy a single-NIC L4-L7 device in routed mode. Incorrect — C: Context awareness to Multiple is not applicable to basic routed-mode device object setup. Incorrect — D: Adding an outside interface to cluster interfaces is not part of configuring a single-NIC L4-L7 device in routed mode; cluster interfaces relate to multi-homed or external connectivity not needed here.


Reference:

https://www.cisco.com/c/en/us/td/docs/dcn/aci/apic/6x/l4-l7-configuration/cisco-apic-layer-4-to-layer- 7-services-deployment-guide-60x/defining-a-logical-device-60x.html



Which role do interfaces Ethernet
-50 have in this output?

  1. leaf fabric ports
  2. server fabric ports
  3. leaf access ports
  4. server uplink ports

Answer(s): A

Explanation:

Option A is correct because Ethernet -50 in this DCACI output denotes leaf fabric ports connected to the spine leaf pair, functioning as the primary leaf fabric ports. Incorrect — B: server fabric ports would indicate connections to servers, not leaf-to-spine fabric links. Incorrect — C: leaf access ports imply edge ports that connect to endpoints inside a leaf, not inter-fabric links. Incorrect — D: server uplink ports would be toward servers or upstream devices, not the leaf-to-spine fabric interconnect role.





Refer to the exhibit. An engineer must configure a bridge domain inside the Cisco ACI fabric called BD. The configuration must permit EP2 and EP3 to reach EP1. Which configuration must be applied on the bridge domain to accomplish this goal?

  1. Define the Pervasive gateway on BD.
  2. Enable L2 Unknown unicast flooding.
  3. Optimize L2 Unknown unicast traffic.
  4. Configure unicast routing within B

Answer(s): B

Explanation:

In a Cisco ACI fabric, when silent hosts are present (e.g., EP2 in this case), they do not send any initial traffic to announce their presence to the fabric. As a result, their MAC address is not learned on the leaf switch. To ensure that traffic can be delivered to silent hosts, enabling Layer 2 (L2) Unknown Unicast Flooding on the bridge domain is required. This allows unicast traffic destined for unknown MAC addresses (such as EP2 initially) to be flooded within the bridge domain, ensuring that EP1 can communicate with EP2 and EP3.





Refer to the exhibit. An engineer configures connectivity for a bare metal server called SVR-15. EPG-15 is associated with a physical domain named phys_dom-15. The VPC member port is statically bound to EPG-15 with Encapsulation VLAN-1500. Which step must the engineer take to ensure that SVR-15 is connected to the Cisco ACI fabric?

  1. Associate an LACP interface policy to phys_dom-15 for VLAN-1500.
  2. Enable dynamic VLAN assignment for the VLAN pool that is associated with phys_dom-15.
  3. Configure a VPC explicit protection group for VLAN-1500 on the VPC member ports.
  4. Confirm that the VLAN pool that is associated with phys_dom-15 includes VLAN-1500.

Answer(s): D

Explanation:

To ensure proper connectivity for SVR-15 to the Cisco ACI fabric:
1. The VLAN used for the static port binding (VLAN-1500) must be part of the VLAN pool associated with the physical domain (phys_dom-15).
2. If VLAN-1500 is not included in the associated VLAN pool, the ACI fabric will not allow traffic for that VLAN, resulting in a lack of connectivity for SVR-15.



What is the function of an HTTP GET request during Cisco ACI fabric discovery?

  1. It allows neighbor discovery of leaf switches.
  2. It downloads firmware image on leaf switches.
  3. It pushes policy elements from Cisco APIC to leaf switches.
  4. It assigns VTEP IPs to leaf switches.

Answer(s): A

Explanation:

During the Cisco ACI fabric discovery process, an HTTP GET request is used by the APIC to communicate with connected leaf switches. This request facilitates the discovery of neighbors by retrieving information about connected devices. The discovery process identifies the topology and relationships between fabric components (spines, leaves, and APICs), which is essential for building the ACI fabric infrastructure.



Which device is the pervasive gateway shown installed on?

  1. proxy spine switch
  2. VMM switch
  3. leaf switch
  4. spine switch

Answer(s): C

Explanation:

In Cisco ACI, the pervasive gateway is a distributed gateway architecture that enables all leaf switches to act as Layer 3 gateways for endpoints. This means that the default gateway IP address for a bridge domain (BD) is available on all leaf switches where the BD is deployed. The configuration in the exhibit, showing VLAN information with associated interfaces, indicates that the pervasive gateway is installed on the leaf switch as part of this distributed gateway architecture. This allows endpoints connected to the leaf to communicate with the gateway locally, reducing latency and improving scalability.



Viewing page 21 of 50
Viewing questions 161 - 168 out of 389 questions


300-620 Exam Discussions & Posts (Share your experience with others)

AI Tutor AI Tutor 👋 I’m here to help!