Cisco 300-620 Exam Questions
Implementing Cisco Application Centric Infrastructure (DCACI) (Page 8 )

Updated On: 17-Feb-2026

What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

  1. L2 unknown unicast: flood
  2. GARP based detection
  3. unicast routing
  4. subnet scope

Answer(s): C


Reference:

https://hsvglobalschool.in/dhkycw/cisco-aci-bridge-domain.html



An engineer is extending EPG connectivity to an external network. The external network houses the Layer 3 gateway and other end hosts. Which ACI bridge domain configuration should be used?

  1. Forwarding: Custom L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled
  2. Forwarding: Custom L2 Unknown Unicast: Flood L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled
  3. Forwarding: Custom L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled
  4. Forwarding: Custom L2 Unknown Unicast: Flood L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled

Answer(s): B



An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

  1. The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.
  2. The Layer 2 unknown hardware proxy lacks support of the topology change notification.
  3. The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.
  4. The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Answer(s): D



An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

  1. It is forwarded to one of the spines to perform as a spine proxy.
  2. It is flooded within the whole fabric.
  3. It is dropped by the leaf when the destination endpoint is not present in the endpoint table.
  4. It is forwarded to one of the APICs to perform as a proxy.

Answer(s): A


Reference:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2-x/L2_config/b_Cisco_APIC_Layer_2_Configuration_Guide/ b_Cisco_APIC_Layer_2_Configuration_Guide_chapter_010.html



When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

  1. all leaf switches and all spine nodes
  2. only spine switches where the bridge domain of the tenant is present
  3. only leaf switches where the bridge domain of the tenant is present
  4. all border leaf nodes where the bridge domain of the tenant is present

Answer(s): C


Reference:

http://www.netdesignarena.com/index.php/2016/06/16/aci-tenant-building-blocks-forwarding-logic/






Post your Comments and Discuss Cisco 300-620 exam dumps with other Community members:

Join the 300-620 Discussion