Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 300-620 Dumps Questions Answers

Page: 1 / 19
Total 247 questions

Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Questions and Answers

Question 1

A network engineer must integrate VMware vCenter cluster with Cisco ACI. The requirement is for the management traffic of the hypervisors and VM controllers to use the virtual switch associated with the Cisco Application Policy. The EPG called "Vmware-MGMT" with VLAN 300 has been created for this purpose. Which set of steps must be taken to complete the configuration?

Options:

A.

Add VLAN 300 with static allocation to the VLAN POOL that is used for VMM integration.

Attach the VMM domain to the target EPG with resolution preprovision, mode static, untagged access VLAN, and Port-Encap 300.

B.

Associate the target EPG with the VMM domain with default settings.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

C.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

Associate the target EPG with the VMM domain with default settings.

D.

Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.

Create a static binding in the target EPG toward VMware hypervisors with VLAN 300, untagged access VLAN, and Untagged 802.1P mode.

Buy Now
Question 2

An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco

ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

Options:

A.

Raised

B.

Retaining

C.

Soaking, Clearing

D.

Raised, Clearing

E.

Soaking

Question 3

An engineer must configure a service graph for the policy-based redirect to redirect traffic to a transparent firewall. The policy must be vendor-agnostic to support any firewall appliance, Which two actions accomplish these goals? (Choose two.)

Options:

A.

Set the Service Type to Other.

B.

Set Promiscuous Mode to True.

C.

Set Function Type to L2.

D.

Set Managed to True.

E.

Set Context Aware to Single.

Question 4

Refer to the exhibit.

An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of “Tenant | Application | EPG”. Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG”?

Options:

A.

enable tag collection

B.

security domains

C.

delimiter

D.

virtual switch name

Question 5

Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?

Options:

A.

Acknowledge the QoS-related error.

B.

Associate a custom QoS class.

C.

Create a custom QoS policy.

D.

Set the QoS policy to Level 3.

Question 6

Refer to the exhibit.

An engineer is implementing a BPDU filter on external switch interfaces That face the Cisco ACI fabric to prevent excessive TCNs from impacting the fabric. Which Configuration must be applied on Cisco ACI to avoid a Layer 2 loop?

Options:

A.

Apply an MSTP instance on Cisco ACI.

B.

Configure MCP globally

C.

implement BPDU Guard.

D.

Enable STP on downlinks.

Question 7

Refer to the exhibit. What must be configured in the service graph to redirect HTTP traffic between the EPG client and EPG server to go through the Cisco ASA firewall?

Options:

A.

precise filter to allow only HTTP traffic

B.

permit-all contract filter

C.

contract with no filter

D.

contract filter to allow ARP and HTTP.

Question 8

Engineer must configure SNMP inside a Cisco ACI fabric. The engineer has created an SNMP Policy, called SNMP-policy and an SNMP Monitoring Group called SNMP-group1 that Contains five trap receivers. Which configuration set completes the configuration?

Options:

A.

Edit oobbrc to permit traffic using UDP port 16. Associate the client group policy to SNMP-group1.

B.

Permit OOB management traffic using UDP port 161. Associate client group policy with the OOB management EPG.

C.

Allow all OOB management traffic. Configure three trap receivers on SNMP-group1.

D.

Create an OOB management contract. Include the SNMP server in the OOB management EPG.

Question 9

Refer to the exhibit.

An engineer is implementing Cisco ACI – VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in “route based on originating virtual port” on the VMware VDS?

Options:

A.

Static Channel – Mode On

B.

MAC Pinning-Physical-NIC-load

C.

LACP Passive

D.

MAC Pinning+

E.

LACP Active

Question 10

An engineer deploys a two-pod Cisco ACI Multi-Pod environment. Why should no more than two Cisco APIC controllers be deployed in the same pod?

Options:

A.

to enable equal capacity to scale in each pod

B.

to avoid losing all replicas of a shard if a pod fails

C.

to avoid hair-pinning traffic that is destined for the primary APIC controller between pods

D.

to ensure that all nodes in all pods have local access to a controller

Question 11

Refer to the exhibit. A tenant is configured with a single L30ut and a single-homed link to the core router called Core-1. An engineer must add a second link to the L30ut that connects to Core-2 router. Which action allows the traffic from Core-2 to BL-1002 to have the same connectivity as the traffic from Core-1 to BL-1001?

Options:

A.

Add a second path to the logical interface profile of the existing L30ut

B.

Add a second subnet to the external EPG to the existing L30ut.

C.

Add a second OSPF interface profile to the logical interface profile.

D.

Add a second interface to the external domain to the existing L30ut.

Question 12

Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

Options:

A.

The source MAC address of the traffic is learned as a local endpoint.

B.

The source MAC address of the traffic is learned as a remote endpoint.

C.

The source IP address of the traffic is learned as a remote endpoint.

D.

The source IP address of the traffic is learned as a local endpoint.

Question 13

An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?

Options:

A.

BPDU Guard

B.

per-VLANMCP

C.

Storm Control

D.

BPDU Filter

Question 14

An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?

Options:

A.

Enable the Export Route Control Subnet for the External Endpoint Group flag.

B.

Enable an L30ut with Shared Route Control Subnet.

C.

Configure subnets with the External Subnets for External EPG flag enabled.

D.

Configure subnets with the Import Route Control Subnet flag enabled.

Question 15

The engineer notices frequent MAC and IP address moves between different leaf switch ports. Which action prevents this problem from occurring?

Options:

A.

Disable enforce subnet check.

B.

Enable endpoint loop protection.

C.

Enable rogue endpoint control.

D.

Disable IP bridge domain enforcement.

Question 16

A Cisco ACI fabric is integrated with a Cisco ASA firewall using a service graph under the tenant called Operations. The fabric must permit the firewall used on tenant Operations to be referenced by the tenant called Management. Which export action must be used to accomplish this goal?

Options:

A.

Layer4-Layer7 device

B.

router configurations

C.

service graph template

D.

device selection policies

Question 17

An engineer must add a group of 70 bare-metal ESXi servers to the Cisco ACI fabric, which is integrated with vCenter. These configuration steps are complete:

The configured pool of ESXi hosts is configured with an Attachable Access Entity Profile (AAEP) called AEP_VMM.

The new group uses the AAEP called AEP_BAREMETAL.

Which action extends functional VMM integration to the new nodes?

Options:

A.

Update AAEP to AEP_VMM on all policy groups that are used toward bare-metal servers.

B.

Create a new AAEP container object for policy groups for AEP_VMM.

C.

Implement a separate VMM domain for the bare-metal servers by using AEP_VMM.

D.

Add the VMM domain under the AEP_BAREMETAL AAEP object.

Question 18

What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

Options:

A.

over Layer 3 directly connected back-to-back spines

B.

over Layer 3 Out connectivity via border leafs

C.

over Layer 3 IPN connectivity via spines

D.

over Layer 3 IPN connectivity via border leafs

Question 19

What is a characteristic of a Cisco ACI Multi-Pod?

Options:

A.

It eliminates the need to deploy multicast in the Layer 3 network that interconnects the pods.

B.

Spines use BGP peering with IPN to send out the TEP pool prefix for the local pod.

C.

It manages the configuration of different Cisco ACI pods using a single common Cisco APIC cluster.

D.

A VPNv4 address family is used to exchange endpoint information between spines.

Question 20

A Cisco ACI bridge domain and VRF are configured with a default data-plane learning configuration. Which two endpoint attributes are programmed in the leaf switch when receiving traffic? (Choose two.)

Options:

A.

Remote MAC. IP

B.

Remote Subnet

C.

Local IP, not MAC

D.

Local MAC, IP

E.

Local Subnet

F.

Remote IP

Question 21

In a Cisco ACI Multi-Site fabric, the Inter-Site BUM Traffic Allow option is enabled in a specific stretched bridge domain. What is used to forward BUM traffic to all endpoints in the same broadcast domain?

Options:

A.

ingress replication on the spines in the source site

B.

egress replication on the destination leaf switches

C.

egress replication on the source leaf switches

D.

ingress replication on the spines in the destination site

Question 22

A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 23

What is MP-BGP used for in Cisco ACl fabric?

Options:

A.

MP-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric.

B.

MP-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint

C.

MP-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router

D.

MP-BGP Layer 2 VPN EVPN AF is used to propagate L30ut routes that are received from a border leaf.

Question 24

Cisco ACI fabric must detect all silent endpoints for the Layer 3 bridge domain. Which actions accomplish this goal?

Options:

A.

Disable Unicast Routing.

Enable L2 Unknown Unicast Hardware Proxy.

B.

Disable Unicast Routing.

Enable L2 Unknown Unicast Flood.

C.

Enable Unicast Routing. Disable ARP Flooding.

D.

Enable Unicast Routing. Enable ARP Flooding.

Question 25

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

Question 26

A customer migrates a legacy environment to Cisco ACI. A Layer 2 trunk is configured to interconnect the two

environments. The customer also builds ACI fabric in an application-centric mode. Which feature should be

enabled in the bridge domain to reduce instability during the migration?

Options:

A.

Set Multi-Destination Flooding to Flood in BD.

B.

Enable Flood in Encapsulation.

C.

Set Multi-Destination Flooding to Flood in Encapsulation.

D.

Disable Endpoint Dataplane Learning

Question 27

Which class of ACI object is presented in this output?

Options:

A.

Contract

B.

Bridge Domain

C.

Tenant

D.

Endpoint

Question 28

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

Options:

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

Question 29

Refer to the exhibit.

Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

Options:

A.

Spine1

B.

apic1

C.

Spine2

D.

Leaf1

E.

Leaf2

F.

apic2

Question 30

Which two statements regarding ACI Multi-Site are true? (Choose two.)

Options:

A.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

B.

Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.

C.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.

E.

The Inter-Site network routers should run OSPF to establish peering with the spines.

Question 31

Cisco ACI fabric is integrated with a VMware environment. The engineer must back up the current configuration of the fabric and restore the vCenter password when the configuration is ... Which action accomplishes this goal?

Options:

A.

Select SCP protocol for the remote location.

B.

Create a Configuration Import Policy.

C.

Enable the Global AES Encryption setting.

D.

Set the Authentication type to Use Password.

Question 32

Which tenant is used when configuring in-band management IP addresses for Cisco APICs, leaf nodes, and spine nodes?

Options:

A.

default

B.

infra

C.

common

D.

mgmt

Question 33

A customer creates Layer 3 connectivity to the outside network. However, only border leaf switches start receiving destination updates to other networks from the newly created L3Out. The updates must also be propagated to other Cisco ACI leaf switches. The L3Out is linked with the EPGs via a contract. Which action must be taken in the pod policy group to accomplish this goal?

Options:

A.

Apply a BGP route reflector policy.

B.

Enable a COOP policy.

C.

Configure an IS-IS policy.

D.

Implement an access management policy.

Question 34

Which type of port is used for in-band management within ACI fabric?

Options:

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Question 35

Which components must be configured for the BGP Route Reflector policy to take effect?

Options:

A.

spine fabric interface overrides and profiles

B.

access policies and profiles

C.

pod policy groups and profiles

D.

leaf fabric interface overrides and profiles

Question 36

An engineer must advertise a bridge domain subnet out of the ACI fabric to an OSPF neighbor. Which two configuration steps are required? (Choose two.)

Options:

A.

Configure Subnet scope to Advertised Externally

B.

Add External Subnet for External EPG flag under External EPG.

C.

Create Route Control Profile with the export direction under External EPG.

D.

Add L30ut profile to the bridge domain using Associated L30uts section

E.

Configure the Subnet under the EPG level.

Question 37

Refer to the exhibit.

The Cisco ACI fabric is built with L20ut to the N9K1 and N9K2 switches. The switches run the RSTP protocol. The requirement is for the Cisco ACI fabric to detect 5 from the N9K and for the fabric to be protected against loops. Which set of actions must be taken to meet the requirements?

Options:

A.

Configure the N9K STP link type as point-to-point link. Enable MCP on ACI globally.

B.

Configure the N9K STP link type as a point-to-point Enable MCP on the ACI leaf interfaces.

C.

Configure the N9K STP link type as a shared link. Enable MCP on the ACI leaf interfaces.

D.

Configure the N9K STP link type as a shared link. Enable MCP on ACI globally.

Question 38

What are two descriptions of ACI multi-site? (Choose two.)

Options:

A.

The Inter-Site network routers should run OSPF to establish peering with the spines.

B.

The Multi-Site orchestrator must be directly attached to one ACI leaf.

C.

Routers in the inter-Site network must run OSPF. DHCP relay, and MP-BGP

D.

ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites

E.

ACI Multi-Site is a solution that supports a dedicated APIC cluster per site

Question 39

Cisco ACI fabric contains a tenant called Prod. User_1 must have write access to tenant Prod and full access to the fabric access policy. Which set of actions must be taken to meet these requirements?

Options:

A.

Associate User_1 to the fabric access policy.

Associate the security domain to the fabric access policy.

Create RBAC for the distinguished name of tenant Prod.

B.

Associate User_1 to tenant Prod.

Associate the security domain to the distinguished name of the fabric access policy.

Create RBAC for the distinguished name of security domain.

C.

Associate User_1 to the distinguished name of the fabric access policy.

Associate the security domain to RBAC.

Create RBAC for the distinguished name of User__1.

D.

Associate User_1 to the security domain.

Associate the security domain to tenant Prod.

Create RBAC for the distinguished name of fabric access policy.

Question 40

Refer to the exhibit. An engineer created a local user named User on Cisco ACI. The engineer must configure the fabric so that the User can access only common and PROD tenants, ch set of actions accomplishes the goal?

Options:

A.

Add security domain "all" to User.

Associate security domain "all" under PROD tenant.

B.

Add security domain 'Tenant" to User.

Associate security domain "Tenant" under PROD tenant.

C.

Add security domain "common" to User.

Associate security domain "common" under PROD tenant.

D.

Add security domain "mgmt" to User

Associate security domain "mgmt" under PROD tenant.

Question 41

Refer to the exhibit. How are the STP BPDUs forwarded over Cisco ACI fabric?

Options:

A.

Cisco ACI acts as the STP root for all three external switches.

B.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3

C.

STP BPDUs that are generated by Switch1 are received only by Switch3.

D.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

Question 42

An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a Cisco ACI fabric. Which action must be taken to receive the required messages?

Options:

A.

Add Faults and Events to the monitor policy.

B.

Add Session Logs and Audit Logs to the monitor policy.

C.

Include Audit Logs and Events in the Syslog source policy.

D.

Include Events and Session Logs in the Syslog source policy.

Question 43

An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?

Options:

A.

GOLF

B.

Multi-Site

C.

Multi-Pod

D.

Stretched Fabric

Question 44

Cisco ACI fabric must send a packet between two pods in a Cisco AC1 Multi-Pod topology where ARP flooding is disabled within the bridge domain. How does a Cisco ACI spine switch .. ARP messages from a leaf switch in POD1 to POD2?

Options:

A.

The ARP message is dropped and connectivity is lost between the endpoints.

B.

ARP optimization is applied and sends ARP to remote anycast.

C.

A proxy ARP message is sent to destination group 225.224.0.0.

D.

An ARP Glean message is sent to multicast address 239.255.255.240.

Question 45

A company is implementing a new security policy to track system access, configuration, and changes. The network engineer must enable the log collection to track user login and logout attempts. In addition, any configuration changes such as a fabric node failure must be collected in the logs. The syslog policy is configured to send logs to the company SEIM appliance.

Which two log types must be enabled to meet the security requirements? (Choose two.)

Options:

A.

error

B.

audit

C.

event

D.

health

E.

fault

Question 46

Refer to the exhibit.

The engineer is planning to configure in-band management for the Cisco ACI fabric. The goal is to allow the network operators to reach the Cisco APIC servers and fabric switches from the in-band network. Which configuration must be applied on the bridge domain to accomplish these goals?

Options:

A.

Enable Unicast Routing. Configure a virtual IP address.

B.

Enable Unicast Routing. Set scope to Advertised Externally.

C.

Scope: Shared between VRF. Set the IP address as primary.

D.

Make this IP address primary. Configure an L30ut for Route Profile.

Question 47

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

Options:

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Question 48

Refer to the exhibit.

A customer is deploying a WAN with these requirements: •Routers 1 and 2 must receive only routes 192.168.11.0/24 and 192.168.21.0724 from the Cisco ACI fabric •Reachability to the WAN users must be permitted only for the servers that are located in vrf_prod.

Which settings must be configured to meet these objectives?

Options:

A.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

B.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF. Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

C.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

D.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

Question 49

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

Options:

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Question 50

Refer to the exhibit. The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?

Options:

A.

Export Route Control Subnet

Import Route Control Subnet

Aggregate Shared Routes

B.

External Subnets for External EPG

Shared Route Control Subnet

Shared Security Import Subnet

C.

External Subnets for External EPG

Import Route Control Subnet

Shared Route Control Subnet

D.

Export Route Control Subnet

Shared Security Import Subnet

Aggregate Shared Routes

Question 51

An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.

Options:

Question 52

An engineer created a monitoring policy called Test in a Cisco ACI fabric and had to change the severity level of the monitored object Call home source. Which set of actions prevent the event from appearing in event reports?

Options:

A.

Select Event Severity Assignment Policies. Set severity level to cleared.

B.

Select Faults Severity Assignment Policies. Set severity level to cleared.

C.

Select Event Severity Assignment Policies. Set severity level to squelched.

D.

Select Faults Severity Assignment Policies. Set severity level to squelched.

Question 53

A network administrator configures AAA inside the Cisco ACI fabric. The authentication goes through the local users if the TACACS+ server is not reachable. If the Cisco APIC is out of the cluster, the access must be granted through the fallback domain. Which configuration set meets these requirements?

Options:

A.

Ping Check: True

Default Authentication Realm: Local

Fallback Check: True

B.

Ping Check: True

Default Authentication Realm: TACACS+

Fallback Check: False

C.

Ping Check: False

Default Authentication Realm: Local

Fallback Check: False

D.

Ping Check: False

Default Authentication Realm: TACACS+

Fallback Check: True

Question 54

Network engineer configured a Cisco ACI fabric as follows:

• An EPG called EPG-A is created and associated with a VMM domain called North. •The EPG-A is associated with BD-A and is in an application profile called Apps-A.

• The BD-A is associated with VRF-1 in the Prod tenant.

Which port group must be selected to place VMs in EPG-A?

Options:

A.

Prod|VRF-1 |Apps-A|EPG-A

B.

Prod|Business_Apps|BD-A|EPG-A

C.

Prod|Apps-A|North|EPG-A

D.

Prod|Apps-A|EPG-A

Question 55

Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?

Options:

A.

Enable MCP on the ACI fabric.

B.

Disable STP in the external network.

C.

Disable STP on the ACI fabric.

D.

Enable STP on the ACI fabric.

Question 56

When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?

Options:

A.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range.

B.

When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range.

C.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range.

D.

When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range.

Question 57

Refer to the exhibit. An engineer configures a Layer 4 to Layer 7 device object. The device is a virtual firewall with a single network adapter and it must be deployed in routed mode. Which .. completes the configuration of the device object?

Options:

A.

Change Function Type to GoTo.

B.

Add an outside interface to the cluster interfaces.

C.

Change context awareness to Multiple.

D.

Enable Promiscuous Mode.

Question 58

A network engineer demonstrates Cisco ACI to a customer. One of the test cases is to validate a disaster

recovery event by resetting the ACI fabric to factory and then restoring the fabric to the state it was in before

the event. Which setting must be enabled on ACI to export all configuration parameters that are necessary to

meet these requirements?

Options:

A.

enabled AES encryption

B.

generated a tech-support file

C.

encrypted export destination

D.

enabled JSON format export

Question 59

When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

Options:

A.

datacenter

B.

VMware vSphere Standard vSwitch

C.

VMware vSphere Distributed Switch

D.

cluster

Question 60

Refer to the exhibit.

A systems engineer is implementing the Cisco ACI fabric. However, the Server2 information is missing from the Leaf 101 endpoint table and the COOP database of the spine. The requirement is for the bridge domain configuration to enforce the ACI fabric to forward the unicast packets generated by Server1 destined to Server2. Which action must be taken to meet these requirements?

Options:

A.

Enable ARP Flooding

B.

Set L2 Unknown Unicast to Flood

C.

Set IP Data-Plane Learning to No

D.

Enable Unicast Routing

Question 61

What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

Options:

A.

L2 unknown unicast: flood

B.

GARP based detection

C.

unicast routing

D.

subnet scope

Question 62

What two actions should be taken to deploy a new Cisco ACI Multi-Pod setup? (Choose two.)

Options:

A.

Configure MP-BGP on IPN routers that face the Cisco ACI spines.

B.

Connect all spines to the IPN.

C.

Configure anycast RP for the underlying multicast protocol

D.

Configure the TEP pool of the new pod to be routable across the IPN.

E.

Increase interface MTU for all IPN routers to support VXLAN traffic.

Question 63

Refer to the exhibit. An engineer configures communication between the EPGs in different tenants. Which action should be taken to create the subnet?

Options:

A.

Change Scope to Shared between VRFs.

B.

Leave Scope set to Private to VRF.

C.

Add the L3Out for Route Profile value.

D.

Change Scope to Advertised Externally.

Question 64

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

Options:

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Question 65

Refer to the exhibit. Server A is connected to the Cisco ACI fabric using two teamed interfaces. One interface in a team is configured as active and the other remains in standby mode. When a failover occurs and the standby interface becomes active, it uses its built-in MAC address to send traffic. Which bridge domain configuration must be applied to resolve the issue?

Options:

A.

Configure Hardware proxy.

B.

Set L2 Unknown Unicast to Flood.

C.

Enable ARP flooding.

D.

Activate Limit IP Learning to Subnet.

Question 66

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

Options:

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Question 67

Which new construct must a user create when configuring in-band management?

Options:

A.

VLAN pool

B.

management contract

C.

management tenant

D.

bridge domain

Question 68

Refer to the exhibit.

An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?

Options:

A.

Set L2 Unknown Unicast to Flood.

B.

Set L2 Unknown Unicast to Hardware Proxy.

C.

Disable Unicast Routing.

D.

Enable ARP Flooding.

Question 69

Refer to the exhibit A customer must back up the current Cisco ACl configuration securely to the remote location using encryption and authentication. The backup job must run once per day The customer s security policy mandates that any sensitive information including passwords, must not be exported from the device Which set of steps meets these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 70

What must be configured to redistribute externally learned OSPF routes within the ACI fabric?

Options:

A.

Route Control Profile

B.

BGP Route Reflector

C.

BGP Inter-leak Route Map

D.

PIM Sparse Mode

Question 71

A customer is deploying a new application across two ACI pods that is sensitive to latency and jitter. The application sets the DSCP values of packets to AF31 and CS6, respectively. Which configuration changes must be made on the APIC to support the new application and prevent packets from being delayed or dropped between pods?

Options:

A.

disable DSCP mapping on the IPN devices

B.

disable DSCP translation policy

C.

align the ACI QoS levels and IPN QoS policies

D.

align the custom QoS policy on the EPG site in the customer tenant

Question 72

What is the effect of enabling the disable Remote EP learn feature?

Options:

A.

It disables remote IP endpoint learning on all leaf nodes in the fabric.

B.

It disables remote IP endpoint learning on leaf switches that do not have L3Outs.

C.

It limits learning of compute leaf endpoints on border leaves.

D.

It prevents border leaf switches from receiving routes through peering with external routers.

Question 73

What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

Options:

A.

EIGRP routing

B.

PIM ASM multicast routing

C.

BGP routing

D.

VLAN ID 4

E.

OSPF routing

Question 74

Refer to the exhibit.

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

Options:

A.

300

B.

410

C.

350

D.

510

Page: 1 / 19
Total 247 questions