300-620サンプル問題集 & 300-620資格関連題全てのIT専門人員はCiscoの300-620の認定試験をよく知っていて、その難しい試験に受かることを望んでいます。Ciscoの300-620の認定試験の認可を取ったら、あなたは望むキャリアを得ることができるようになります。JapancertのCiscoの300-620試験トレーニング資料を利用したら、望むことを取得できます。 Cisco Implementing Cisco Application Centric Infrastructure 認定 300-620 試験問題 (Q135-Q140):質問 # 135
What is the purpose of the Overlay Multicast TEP in a Cisco ACI Multi-Site deployment?
A. to establish MP-BGP EVPN adjacencies with the spine nodes in remote sites
B. to encapsulate multicast traffic in a common multicast group
C. to source and receive unicast VXLAN data plane traffic
D. to perform head-end replication for BUM traffic
正解:D
質問 # 136
An engineer implements a configuration backup on the Cisco APIC. The backup job must meet these requirements:
- The backup must transfer the encrypted data to the remote server.
- The transfer must be resumed if the connection is interrupted
Which configuration set meets these requirements?
A. Select protocol HTTP in Create Remote Location.
Choose JSON format in Configuration Export Policy.
B. Select protocol SFTP in Create Remote Location.
Choose XML format in Configuration Export Policy.
C. Select protocol FTP in Create Remote Location.
Choose XML format in Configuration Export Policy.
D. Select protocol TFTP in Create Remote Location.
Choose JSON format in Configuration Export Policy.
正解:B
質問 # 137
On which two interface types should a user configure storm control to protect against broadcast traffic? (Choose two.)
A. APIC facing interfaces
B. all interfaces on the leaf switches in the fabric
C. fabric uplink interfaces on the leaf switches
D. endpoint-facing trunk interface
E. port channel on a single leaf switch
正解:D、E
質問 # 138
An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
正解:A
質問 # 139
What is the result of the pcEnPref flag configured on the epg-App_EPG?
A. Access control rules for the L3Out network are applied.
B. Access control rules for the private network are applied.
C. Any changes to the underlying EPG objects are forbidden.
D. Any configuration changes to the private network are validated.