Cisco 300-620 Exam Questions
Implementing Cisco Application Centric Infrastructure (DCACI) (Page 8 )

Updated On: 17-May-2026

For which type of endpoint entry does a Cisco ACI leaf switch keep the original TEP source address instead of rewriting the outer source IP address to its TEP address?

  1. local entry
  2. remote entry
  3. bounce entry
  4. COOP entry

Answer(s): C

Explanation:

Option C is correct because bounce entries preserve the original host IP as the source, enabling L3 forwarding without rewriting to the leaf’s TEP address, which is used for other entry types. Incorrect — A (local entry): traffic uses local TEP rewriting for intra-ASIC forwarding, not preserving original source. Incorrect — B (remote entry): typically involves TEP rewriting to the local TEP for reachability of remote endpoints, not preserving original source. Incorrect — D (COOP entry): COOP handling relates to control-plane operations and does not describe preserving the original source in the TEP path.





Refer to the exhibit. An engineer is implementing a BPDU filter on external switch interfaces that face the Cisco ACI fabric to prevent excessive TCNs from impacting the fabric. Which configuration must be applied on Cisco ACI to avoid a Layer 2 loop?

  1. Configure MCP globally.
  2. Implement BPDU Guard.
  3. Apply an MSTP instance on Cisco ACI.
  4. Enable STP on downlinks.

Answer(s): A

Explanation:

Option A is correct because MCP (Maximum Control Plane) globally configured on ACI suppresses legacy BPDU processing and prevents TCN floods from external switches from creating Layer 2 loops with the fabric. Incorrect — B: BPDU Guard on endpoints blocks unexpected BPDUs but does not address fabric-wide TCN propagation into the ACI leaf/spine domain. Incorrect — C: MSTP on ACI is not applicable; ACI uses its own OVN/Spine-Leaf topology and does not require MSTP instances to prevent loops. Incorrect — D: Enabling STP on downlinks is not a recommended approach in ACI, which relies on EVPN/VXLAN and BPDU filtering rather than enabling traditional STP.





Refer to the exhibit. An engineer must migrate workloads from the brownfield network to the Cisco ACI fabric. The VLAN 10 default gateway remains in the router located in the brownfield network. The bridge domain has already been associated with L2Out. Which two actions must be taken to migrate the workloads? (Choose two.)

  1. Enable ARP Flooding.
  2. Configure Multi-Destination Flooding Flood in Encapsulation.
  3. Select limit IP learning to Subnet.
  4. Set L2 Unknown Unicast Flood.
  5. Map the MAC address of the default gateway to the bridge domain.

Answer(s): A,D

Explanation:

Option A is correct because enabling ARP Flooding allows hosts in the L2Out-connected bridge domain to learn the default gateway MAC address via ARP requests flooding, which is necessary when the gateway IP remains in the brownfield router and not learned through the fabric.
Option D is correct because setting L2 Unknown Unicast Flood ensures unknown destination MACs (including the default gateway) are flooded within the bridge domain, enabling reachability during migration.
Option B is incorrect because Multi-Destination Flood in Encapsulation is not a standard DCACI action for this scenario and does not address default gateway learning.
Option C is incorrect because limiting IP learning to a subnet would prevent necessary learning of the gateway MAC across the L2Out path.
Option E is incorrect because mapping the MAC of the default gateway to the bridge domain is not a supported or required action for this migration.



Which protocol is used in the Cisco ACI fabric for automatic discovery?

  1. LLDP
  2. IS-IS
  3. CFS
  4. COOP

Answer(s): A

Explanation:

Option A is correct because LLDP is used in Cisco ACI for automatic discovery of endpoints and neighboring devices, enabling the fabric to learn neighbor information and construct the IGP-like topology without manual configuration. Incorrect — B: IS-IS is an interior gateway protocol used for routing within the fabric, not for automatic discovery of neighbors in ACI. Incorrect — C: CFS (Fabric Discovery Service) is not a standard protocol used for automatic discovery in ACI. Incorrect — D: COOP is a protocol related to fabric operations but not the automatic discovery mechanism used by ACI.



A Cisco ACI fabric is integrated with a Cisco ASA firewall using a service graph under the tenant called Operations. The fabric must permit the firewall used on tenant Operations to be referenced by the tenant called Management. Which export action must be used to accomplish this goal?

  1. device selection policies
  2. service graph template
  3. router configurations
  4. Layer4-Layer7 device

Answer(s): D

Explanation:

Option D is correct because Layer4-Layer7 devices (L4-L7) represent external security services like firewalls in ACI, and exporting a service graph to another tenant (Management) requires exposing an L4-L7 service as a consumer/exported object via an L4-L7 device relationship in the export policy.
A) device selection policies are used to choose devices for service graphs, not to export across tenants.
B) service graph template defines the blueprint, not the cross-tenant export mechanism.
C) router configurations pertain to routing policies, not service graph export between tenants.





Refer to the exhibit. An engineer connects a Cisco ACI fabric to two different Cisco Nexus 9000 Series Switches. The fabric must be configured to ensure a loop-free topology and N9K1 must be configured as the root bridge for VLAN 10. Which action meets these requirements?

  1. Enable STP on ports between the leaf and spine.
  2. Set BPDU Guard on ports between the leaf and Nexus 9000 Series Switches.
  3. Enable Cisco Discovery Protocol on ports between the leaf and spine.
  4. Activate MCP on ports between the leaf and Nexus 9000 Series Switches.

Answer(s): D

Explanation:

Option D is correct because enabling MCP (Multichassis Converged Port) on leaf-to-Nexus 9000 ports provides loop prevention and correct root election behavior in an ACI fabric when connecting to external Nexus switches, ensuring a loop-free topology and proper root bridge placement for VLAN 10 as N9K1. A) Enabling STP on leaf-spine links is not applicable in ACI, where SPAN and SPBM controls differ and Root Bridge is determined by ACI policy. B) BPDU Guard is for protecting against rogue devices, not for fabric loop prevention or root bridge configuration. C) CDP on leaf-spine links does not influence ACI loop prevention or root bridge.



How does Cisco ACI manage the old endpoint information on the original leaf switch after an endpoint moves between two Cisco ACI leaf switches?

  1. A bounce entry is created by COOP communication instead of data plane learning.
  2. A remote endpoint is created to represent the endpoint on another leaf.
  3. Cisco APIC deletes an endpoint after receiving GARP packets from the new leaf.
  4. The spine switch pushes all endpoint database entries to all leaf switches.

Answer(s): A

Explanation:

Option A is correct because COOP (Continuity of Operation) communications propagate a bounce entry to indicate the endpoint’s prior location on the original leaf, preventing stale data from affecting policy decisions after movement; this avoids relying solely on data-plane learning for endpoint mobility. Incorrect — B: Remote endpoint concepts are not used to represent a moved endpoint on another leaf in Cisco ACI; endpoint movement is handled through COOP bounce entries and controller-driven updates, not a separate remote-endpoint object. Incorrect — C: Deleting endpoints via GARP is not how ACI manages moved endpoints; ACI uses COOP bounce mechanisms and fine-grained learning updates rather than relying on GARP-triggered deletions. Incorrect — D: Spines do not push endpoint DB entries to all leaves; endpoint learning and movement are orchestrated by the leafs and APIC via COOP, not distribution from spine to leaves.





Refer to the exhibit. An engineer must migrate the web servers and backup servers from the legacy network to a Cisco ACI environment in the corresponding EPGs. The requirement is to allow communication between the servers in the web EPG and the backup EPG without creating contracts. Which action meets the requirements?

  1. Configure the Enforced Bridge Domain status flag.
  2. Set the direction of Policy Enforcement to Egress.
  3. Set IP Data-plane learning to Enabled.
  4. Set Policy Control Enforcement to Unenforced.

Answer(s): D

Explanation:

Option D is correct because setting Policy Control Enforcement to Unenforced allows traffic between the web EPG and the backup EPG without a contract, satisfying the requirement for transparent communication across EPGs during migration.
A) Enforced Bridge Domain status flag is unrelated to inter-EPG communication without contracts and governs BD behavior, not contract enforcement between EPGs.
B) Direction of Policy Enforcement to Egress affects from-EPG to to-EPG traffic flow semantics but does not enable cross-EPG communication without a contract.
C) IP Data-plane learning is about learning IPs at the data plane; it does not bypass contract requirements between EPGs.



Viewing page 8 of 50
Viewing questions 57 - 64 out of 389 questions


300-620 Exam Discussions & Posts (Share your experience with others)

AI Tutor AI Tutor 👋 I’m here to help!