Deck 19: Configuring Cisco MDS 9000 Series Switches (DCSAN)

Full screen (f)
exit full mode
Question
When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

A) limit IP learning to subnet
B) scope
C) gateway IP
D) subnet control
Use Space or
up arrow
down arrow
to flip the card.
Question
Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

A) endpoint
B) adjacency
C) RIB
D) ARP
Question
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

A) Endpoints must connect directly to the ACI leaf port.
B) External endpoints are in a different bridge domain than the endpoints in the fabric.
C) Endpoint learning encompasses the MAC address only.
D) External endpoints are in the same EPG as the directly attached endpoints.
Question
<strong>  Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)</strong> A) application profile B) attachable AEP C) bridge domain D) endpoint group E) VRF <div style=padding-top: 35px> Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)

A) application profile
B) attachable AEP
C) bridge domain
D) endpoint group
E) VRF
Question
Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?

A) Enable MCP on the ACI fabric.
B) Disable STP in the external network.
C) Disable STP on the ACI fabric.
D) Enable STP on the ACI fabric.
Question
<strong>  Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)</strong> A) Spine1 B) apic1 C) Spine2 D) Leaf1 E) Leaf2 F) apic2 <div style=padding-top: 35px> Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

A) Spine1
B) apic1
C) Spine2
D) Leaf1
E) Leaf2
F) apic2
Question
Which description regarding the initial APIC cluster discovery process is true?

A) The APIC uses an internal IP address from a pool to communicate with the nodes.
B) Every switch is assigned a unique AV by the APIC.
C) The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.
D) The ACI fabric is discovered starting with the spine switches.
Question
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

A) The source MAC and IP address of the traffic is learned as a local endpoint.
B) The source MAC address of the traffic is learned as a remote endpoint.
C) No source MAC or IP address of the traffic is learned as a remote endpoint.
D) The source IP address of the traffic is learned as a remote endpoint.
Question
A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

A) tenant
B) security domain
C) primary Cisco APIC
D) managed object class
Question
Which components must be configured for the BGP Route Reflector policy to take effect?

A) spine fabric interface overrides and profiles
B) access policies and profiles
C) pod policy groups and profiles
D) leaf fabric interface overrides and profiles
Question
Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

A) extending the routed domain out of the ACI fabric
B) creating a single homed Layer 3 Out
C) creating an external physical network
D) extending the bridge domain out of the ACI fabric
E) extending the EPG out of the ACI fabric
Question
An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

A) Layer 2 remote fabric
B) Layer 2 outside
C) Layers 2 internal
D) Static path binding
E) VXLAN outside
Question
What does a bridge domain represent?

A) Layer 3 cloud
B) Layer 2 forwarding construct
C) tenant
D) physical domain
Question
An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

A) merge
B) atomic
C) best effort
D) replace
Question
An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

A) It is forwarded to one of the spines to perform as a spine proxy.
B) It is flooded within the whole fabric.
C) It is dropped by the leaf when the destination endpoint is not present in the endpoint table.
D) It is forwarded to one of the APICs to perform as a proxy.
Question
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

A) L2 unknown unicast: flood
B) GARP based detection
C) unicast routing
D) subnet scope
Question
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

A) Inspect event records in the APIC UI to see all actions performed by users.
B) Inspect /var/log/audit_messages on the APIC to see a record of all user actions.
C) Inspect audit logs in the APIC UI to see all user events.
D) Inspect the output of show command history in the APIC CLI. Inspect the output of show command history in the APIC CLI.
Question
Which type of profile needs to be created to deploy an access port policy group?

A) attachable entity
B) Pod
C) module
D) leaf interface
Question
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?

A) Under System -> Faults , right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear. Under System -> Faults , right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.
B) Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.
C) Under System -> Faults , right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault. Ignore Fault to create a fault severity assignment policy that hides the fault.
D) Create a new global health score policy that ignores specific faults as identified by their unique fault code.
Question
In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

A) VXLAN
B) LLDP
C) ISIS
D) STP
Question
Which two statements regarding ACI Multi-Site are true? (Choose two.)

A) The Multi-Site orchestrator must be directly attached to one ACI leaf.
B) Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.
C) ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.
D) ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.
E) The Inter-Site network routers should run OSPF to establish peering with the spines.
Question
<strong>  Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of Tenant | Application | EPG. Which configuration option is used to generate port groups with names formatted as Tenant=Application=EPG?</strong> A) enable tag collection B) security domains C) delimiter D) virtual switch name <div style=padding-top: 35px> Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of "Tenant | Application | EPG". Which configuration option is used to generate port groups with names formatted as "Tenant=Application=EPG"?

A) enable tag collection
B) security domains
C) delimiter
D) virtual switch name
Question
When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

A) datacenter
B) VMware vSphere Standard vSwitch
C) VMware vSphere Distributed Switch
D) cluster
Question
In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

A) Endpoint information is not exchanged across sites unless COOP protocol is used.
B) Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.
C) Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.
D) Endpoint information is exchanged across sites when the endpoints are discovered in both sites.
Question
<strong>  Refer to the exhibit. An engineer is implementing Cisco ACI - VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in route based on originating virtual port on the VMware VDS?</strong> A) Static Channel - Mode On B) MAC Pinning-Physical-NIC-load C) LACP Passive D) MAC Pinning+ E) LACP Active <div style=padding-top: 35px> Refer to the exhibit. An engineer is implementing Cisco ACI - VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in "route based on originating virtual port" on the VMware VDS?

A) Static Channel - Mode On
B) MAC Pinning-Physical-NIC-load
C) LACP Passive
D) MAC Pinning+
E) LACP Active
Question
A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

A) ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.
B) A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.
C) ACI Multi-Pod requires an IP Network supporting PIM-Bidir.
D) ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.
E) Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.
Question
<strong>  Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?</strong> A) 300 B) 410 C) 350 D) 510 <div style=padding-top: 35px> Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

A) 300
B) 410
C) 350
D) 510
Question
An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

A) No policies are downloaded because LLDP is the only supported discovery protocol.
B) Policies are downloaded when the hypervisor host is connected to the VMM VDS.
C) Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.
D) No policies are downloaded because there is no discovery protocol neighborship.
Question
An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

A) from leaf ports tagged as VLAN 0
B) from leaf ports untagged
C) from leaf ports tagged as VLAN 4094
D) from leaf ports tagged as VLAN 1
Question
Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

A) vzAny contracts
B) standard contracts
C) application EPGs
D) uSeg EPGs
Question
Which tenant is used when configuring in-band management IP addresses for Cisco APICs, leaf nodes, and spine nodes?

A) default
B) infra
C) common
D) mgmt
Question
Where is the COOP database located?

A) leaf
B) spine
C) APIC
D) endpoint
Question
A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

A) 1. Create two maintenance groups for the APIC controllers: VPC left and VPC right. 2. Upgrade the first group of controllers. 3. Upgrade the second group of controllers. 4. Upgrade the leaf switches.
B) 1. Create two maintenance groups for APIC controllers: VPC left and VPC right. 2. Upgrade the leaf switches. 3. Upgrade the first group of controllers. 4. Upgrade the second group of controllers.
C) 1. Create two maintenance groups for the leaf switches: VPC left and VPC right. 2. Upgrade the APIC controllers. 3. Upgrade the first group of leaf switches. 4. Upgrade the second group of leaf switches.
D) 2. Upgrade the first group of switches. 3. Upgrade the second group of switches. 4. Upgrade the APIC controllers.
Question
When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

A) within the bridge domain
B) within the APIC
C) within the access encap VLAN
D) between all the spine and leaf switches
Question
Which protocol does ACI use to securely sane the configuration in a remote location?

A) SCP
B) HTTPS
C) TFTP
D) FTP
Question
How is an EPG extended outside of the ACI fabric?

A) Create an external bridged network that is assigned to a leaf port.
B) Create an external routed network that is assigned to an EPG.
C) Enable unicast routing within an EPG.
D) Statically assign a VLAN ID to a leaf port in an EPG.
Question
Which new construct must a user create when configuring in-band management?

A) VLAN pool
B) management contract
C) management tenant
D) bridge domain
Question
What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

A) EIGRP routing
B) PIM ASM multicast routing
C) BGP routing
D) VLAN ID 4
E) OSPF routing
Question
Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

A) cisco-security domain
B) cisco-auth-features
C) cisco-aci-role
D) cisco-av-pair
Question
What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination endpoint?

A) The leaf switch does not learn the source endpoint through data plane learning.
B) The leaf switch drops the traffic that is destined to the endpoint.
C) The leaf switch floods the traffic to the endpoint throughout the fabric.
D) The leaf switch sends the traffic to the wrong destination leaf.
Question
Which two types of interfaces are supported on border leaf switches to connect to an external router? (Choose two.)

A) subinterface with VXLAN tagging
B) subinterface with 802.1Q tagging
C) FEX host interface
D) out of band interface
E) Switch Virtual Interface
Question
<strong>  Refer to the exhibit. An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)</strong> A) LACP Mode: LACP Standby B) LB Mode: Destination IP Address and TCP/UDP Port C) LB Mode: Source and Destination MAC Address D) LB Mode: Source IP Address and TCP/UDP Port E) LACP Mode: LACP Active <div style=padding-top: 35px> Refer to the exhibit. An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)

A) LACP Mode: LACP Standby
B) LB Mode: Destination IP Address and TCP/UDP Port
C) LB Mode: Source and Destination MAC Address
D) LB Mode: Source IP Address and TCP/UDP Port
E) LACP Mode: LACP Active
Question
An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements: Control the amount of application data flowing into the system Allow the newly connected device to auto-negotiate link speed with the leaf switch Which two ACI policies must be configured to achieve these requirements? (Choose two.)

A) link level policy
B) L2 interface policy
C) slow drain policy
D) ingress data plane policing policy
E) ingress control plane policing policy
Question
What represents the unique identifier of an ACI object?

A) universal resource identifier (URI)
B) application programming interface
C) management information tree
D) distinguished name
Question
An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a bridge domain. Which setting should be configured to support this requirement?

A) disable Limit IP Learning to Subnet
B) disable IP Data-plane Learning
C) disable Unicast Routing
D) disable Advertise Host Routes
Question
An engineer must limit management access to the Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

A) policy in the management tenant
B) ACL on the console interface
C) ACL on the management interface of the APIC
D) policy on the management VLAN
Question
<strong>  Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?</strong> A) Routed B) Unicast C) L3Out D) L3 <div style=padding-top: 35px> Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?

A) Routed
B) Unicast
C) L3Out
D) L3
Question
Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

A) Layer 3 outside interface association
B) EPG static port binding
C) VMM domain profile
D) EPG association
E) IP address pool association
Question
Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

A) The source MAC address of the traffic is learned as a local endpoint.
B) The source MAC address of the traffic is learned as a remote endpoint.
C) The source IP address of the traffic is learned as a remote endpoint.
D) The source IP address of the traffic is learned as a local endpoint.
Question
<strong>  Refer to the exhibit. Which action should be taken to ensure authentication if the RADIUS servers are unavailable?</strong> A) Adjust the priority of server 10.1.1.1 to 1. B) Assign the user to the default role. C) Set the default login realm to LDAP. D) Set the fallback login to local. <div style=padding-top: 35px> Refer to the exhibit. Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

A) Adjust the priority of server 10.1.1.1 to 1.
B) Assign the user to the default role.
C) Set the default login realm to LDAP.
D) Set the fallback login to local.
Question
Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from being learned by the fabric?

A) enable Limit IP Learning to Subnet
B) enable Unicast Routing
C) enable IP Data-plane Learning
D) enable ARP Flooding to BD
Question
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

A) The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.
B) The Layer 2 unknown hardware proxy lacks support of the topology change notification.
C) The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.
D) The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.
Question
What must be configured to allow SNMP traffic on the APIC controller?

A) out-of-band management interface
B) contract under tenant mgmt
C) SNMP relay policy
D) out-of-band bridge domain
Question
<strong>  When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?</strong> A) all leaf switches and all spine nodes B) only spine switches where the bridge domain of the tenant is present C) only leaf switches where the bridge domain of the tenant is present D) all border leaf nodes where the bridge domain of the tenant is present <div style=padding-top: 35px> When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

A) all leaf switches and all spine nodes
B) only spine switches where the bridge domain of the tenant is present
C) only leaf switches where the bridge domain of the tenant is present
D) all border leaf nodes where the bridge domain of the tenant is present
Question
Which type of port is used for in-band management within ACI fabric?

A) spine switch port
B) APIC console port
C) leaf access port
D) management port
Question
What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

A) over Layer 3 directly connected back-to-back spines
B) over Layer 3 Out connectivity via border leafs
C) over Layer 3 IPN connectivity via border leafs
D) over Layer 3 IPN connectivity via spines
Question
An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

A) Raised
B) Retaining
C) Soaking, Clearing
D) Raised, Clearing
E) Soaking
Question
On which two interface types should a user configure storm control to protect against broadcast traffic? (Choose two.)

A) APIC facing interfaces
B) port channel on a single leaf switch
C) all interfaces on the leaf switches in the fabric
D) endpoint-facing trunk interface
E) fabric uplink interfaces on the leaf switches
Question
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

A) "Limit IP learning to network" setting within the bridge domain.
B) "Limit IP learning to subnet" setting within the EPG.
C) "Limit IP learning to network" setting within the EPG.
D) "Limit IP learning to subnet" setting within the bridge domain.
Question
Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

A) forwarding tag trees
B) PIM routing
C) spanning trees
D) shortest-path trees
Question
A customer migrates a legacy environment to Cisco ACI. A Layer 2 trunk is configured to interconnect the two environments. The customer also builds ACI fabric in an application-centric mode. Which feature should be enabled in the bridge domain to reduce instability during the migration?

A) Set Multi-Destination Flooding to Flood in BD.
B) Enable Flood in Encapsulation.
C) Set Multi-Destination Flooding to Flood in Encapsulation.
D) Disable Endpoint Dataplane Learning
Question
An engineer must connect Cisco ACI fabric using Layer 2 with external third-party switches. The third-party switches are configured using 802.1s protocol. Which two constructs are required to complete the task? (Choose two.)

A) spanning tree policy for mapping MST Instances to VLANs
B) MCP policy with PDU per VLAN enabled
C) MCP instance policy with administrative slate disabled
D) dedicated EPG for native VLAN
E) static binding of native VLAN in all existing EPGs
Question
Which statement regarding ACI Multi-Pod and TEP pool is true?

A) The IP addresses used in the IPN network can overlap TEP pool of the APIC.
B) A different TEP pool must be assigned to each Pod.
C) The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.
D) The same TEP pool is used in all Pods.
Question
Which statement about ACI syslog is true?

A) Notifications for different scopes of syslog objects can be sent only to one destination.
B) Syslog messages are sent to the destination through the spine.
C) All syslog messages are sent to the destination through APIC.
D) Switches send syslog messages directly to the destinations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Configuring Cisco MDS 9000 Series Switches (DCSAN)
1
When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?

A) limit IP learning to subnet
B) scope
C) gateway IP
D) subnet control
gateway IP
2
Which table holds IP address, MAC address and VXLAN/VLAN information on a Cisco ACI leaf?

A) endpoint
B) adjacency
C) RIB
D) ARP
endpoint
3
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?

A) Endpoints must connect directly to the ACI leaf port.
B) External endpoints are in a different bridge domain than the endpoints in the fabric.
C) Endpoint learning encompasses the MAC address only.
D) External endpoints are in the same EPG as the directly attached endpoints.
Endpoint learning encompasses the MAC address only.
4
<strong>  Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)</strong> A) application profile B) attachable AEP C) bridge domain D) endpoint group E) VRF Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)

A) application profile
B) attachable AEP
C) bridge domain
D) endpoint group
E) VRF
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?

A) Enable MCP on the ACI fabric.
B) Disable STP in the external network.
C) Disable STP on the ACI fabric.
D) Enable STP on the ACI fabric.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
<strong>  Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)</strong> A) Spine1 B) apic1 C) Spine2 D) Leaf1 E) Leaf2 F) apic2 Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)

A) Spine1
B) apic1
C) Spine2
D) Leaf1
E) Leaf2
F) apic2
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
Which description regarding the initial APIC cluster discovery process is true?

A) The APIC uses an internal IP address from a pool to communicate with the nodes.
B) Every switch is assigned a unique AV by the APIC.
C) The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.
D) The ACI fabric is discovered starting with the spine switches.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?

A) The source MAC and IP address of the traffic is learned as a local endpoint.
B) The source MAC address of the traffic is learned as a remote endpoint.
C) No source MAC or IP address of the traffic is learned as a remote endpoint.
D) The source IP address of the traffic is learned as a remote endpoint.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?

A) tenant
B) security domain
C) primary Cisco APIC
D) managed object class
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
Which components must be configured for the BGP Route Reflector policy to take effect?

A) spine fabric interface overrides and profiles
B) access policies and profiles
C) pod policy groups and profiles
D) leaf fabric interface overrides and profiles
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)

A) extending the routed domain out of the ACI fabric
B) creating a single homed Layer 3 Out
C) creating an external physical network
D) extending the bridge domain out of the ACI fabric
E) extending the EPG out of the ACI fabric
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

A) Layer 2 remote fabric
B) Layer 2 outside
C) Layers 2 internal
D) Static path binding
E) VXLAN outside
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
What does a bridge domain represent?

A) Layer 3 cloud
B) Layer 2 forwarding construct
C) tenant
D) physical domain
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)
B) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)
C) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)
D) <strong>An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

A) merge
B) atomic
C) best effort
D) replace
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

A) It is forwarded to one of the spines to perform as a spine proxy.
B) It is flooded within the whole fabric.
C) It is dropped by the leaf when the destination endpoint is not present in the endpoint table.
D) It is forwarded to one of the APICs to perform as a proxy.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?

A) L2 unknown unicast: flood
B) GARP based detection
C) unicast routing
D) subnet scope
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

A) Inspect event records in the APIC UI to see all actions performed by users.
B) Inspect /var/log/audit_messages on the APIC to see a record of all user actions.
C) Inspect audit logs in the APIC UI to see all user events.
D) Inspect the output of show command history in the APIC CLI. Inspect the output of show command history in the APIC CLI.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
Which type of profile needs to be created to deploy an access port policy group?

A) attachable entity
B) Pod
C) module
D) leaf interface
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?

A) Under System -> Faults , right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear. Under System -> Faults , right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.
B) Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.
C) Under System -> Faults , right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault. Ignore Fault to create a fault severity assignment policy that hides the fault.
D) Create a new global health score policy that ignores specific faults as identified by their unique fault code.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?

A) VXLAN
B) LLDP
C) ISIS
D) STP
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
Which two statements regarding ACI Multi-Site are true? (Choose two.)

A) The Multi-Site orchestrator must be directly attached to one ACI leaf.
B) Routers in the Inter-Site network must run OSPF, DHCP relay, and MP-BGP.
C) ACI Multi-Site is a solution that supports a dedicated APIC cluster per site.
D) ACI Multi-Site is a solution that allows one APIC cluster to manage multiple ACI sites.
E) The Inter-Site network routers should run OSPF to establish peering with the spines.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
<strong>  Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of Tenant | Application | EPG. Which configuration option is used to generate port groups with names formatted as Tenant=Application=EPG?</strong> A) enable tag collection B) security domains C) delimiter D) virtual switch name Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of "Tenant | Application | EPG". Which configuration option is used to generate port groups with names formatted as "Tenant=Application=EPG"?

A) enable tag collection
B) security domains
C) delimiter
D) virtual switch name
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

A) datacenter
B) VMware vSphere Standard vSwitch
C) VMware vSphere Distributed Switch
D) cluster
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?

A) Endpoint information is not exchanged across sites unless COOP protocol is used.
B) Endpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.
C) Endpoint information is exchanged across sites as soon as the endpoint is discovered in one site.
D) Endpoint information is exchanged across sites when the endpoints are discovered in both sites.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
<strong>  Refer to the exhibit. An engineer is implementing Cisco ACI - VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in route based on originating virtual port on the VMware VDS?</strong> A) Static Channel - Mode On B) MAC Pinning-Physical-NIC-load C) LACP Passive D) MAC Pinning+ E) LACP Active Refer to the exhibit. An engineer is implementing Cisco ACI - VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in "route based on originating virtual port" on the VMware VDS?

A) Static Channel - Mode On
B) MAC Pinning-Physical-NIC-load
C) LACP Passive
D) MAC Pinning+
E) LACP Active
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)

A) ACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.
B) A single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.
C) ACI Multi-Pod requires an IP Network supporting PIM-Bidir.
D) ACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.
E) Multi-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
<strong>  Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?</strong> A) 300 B) 410 C) 350 D) 510 Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

A) 300
B) 410
C) 350
D) 510
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

A) No policies are downloaded because LLDP is the only supported discovery protocol.
B) Policies are downloaded when the hypervisor host is connected to the VMM VDS.
C) Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.
D) No policies are downloaded because there is no discovery protocol neighborship.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?

A) from leaf ports tagged as VLAN 0
B) from leaf ports untagged
C) from leaf ports tagged as VLAN 4094
D) from leaf ports tagged as VLAN 1
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

A) vzAny contracts
B) standard contracts
C) application EPGs
D) uSeg EPGs
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
Which tenant is used when configuring in-band management IP addresses for Cisco APICs, leaf nodes, and spine nodes?

A) default
B) infra
C) common
D) mgmt
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
Where is the COOP database located?

A) leaf
B) spine
C) APIC
D) endpoint
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?

A) 1. Create two maintenance groups for the APIC controllers: VPC left and VPC right. 2. Upgrade the first group of controllers. 3. Upgrade the second group of controllers. 4. Upgrade the leaf switches.
B) 1. Create two maintenance groups for APIC controllers: VPC left and VPC right. 2. Upgrade the leaf switches. 3. Upgrade the first group of controllers. 4. Upgrade the second group of controllers.
C) 1. Create two maintenance groups for the leaf switches: VPC left and VPC right. 2. Upgrade the APIC controllers. 3. Upgrade the first group of leaf switches. 4. Upgrade the second group of leaf switches.
D) 2. Upgrade the first group of switches. 3. Upgrade the second group of switches. 4. Upgrade the APIC controllers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

A) within the bridge domain
B) within the APIC
C) within the access encap VLAN
D) between all the spine and leaf switches
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
Which protocol does ACI use to securely sane the configuration in a remote location?

A) SCP
B) HTTPS
C) TFTP
D) FTP
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
How is an EPG extended outside of the ACI fabric?

A) Create an external bridged network that is assigned to a leaf port.
B) Create an external routed network that is assigned to an EPG.
C) Enable unicast routing within an EPG.
D) Statically assign a VLAN ID to a leaf port in an EPG.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
Which new construct must a user create when configuring in-band management?

A) VLAN pool
B) management contract
C) management tenant
D) bridge domain
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)

A) EIGRP routing
B) PIM ASM multicast routing
C) BGP routing
D) VLAN ID 4
E) OSPF routing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

A) cisco-security domain
B) cisco-auth-features
C) cisco-aci-role
D) cisco-av-pair
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination endpoint?

A) The leaf switch does not learn the source endpoint through data plane learning.
B) The leaf switch drops the traffic that is destined to the endpoint.
C) The leaf switch floods the traffic to the endpoint throughout the fabric.
D) The leaf switch sends the traffic to the wrong destination leaf.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
Which two types of interfaces are supported on border leaf switches to connect to an external router? (Choose two.)

A) subinterface with VXLAN tagging
B) subinterface with 802.1Q tagging
C) FEX host interface
D) out of band interface
E) Switch Virtual Interface
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
<strong>  Refer to the exhibit. An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)</strong> A) LACP Mode: LACP Standby B) LB Mode: Destination IP Address and TCP/UDP Port C) LB Mode: Source and Destination MAC Address D) LB Mode: Source IP Address and TCP/UDP Port E) LACP Mode: LACP Active Refer to the exhibit. An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)

A) LACP Mode: LACP Standby
B) LB Mode: Destination IP Address and TCP/UDP Port
C) LB Mode: Source and Destination MAC Address
D) LB Mode: Source IP Address and TCP/UDP Port
E) LACP Mode: LACP Active
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
An engineer needs to deploy a leaf access port policy group in ACI Fabric to support the following requirements: Control the amount of application data flowing into the system Allow the newly connected device to auto-negotiate link speed with the leaf switch Which two ACI policies must be configured to achieve these requirements? (Choose two.)

A) link level policy
B) L2 interface policy
C) slow drain policy
D) ingress data plane policing policy
E) ingress control plane policing policy
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
What represents the unique identifier of an ACI object?

A) universal resource identifier (URI)
B) application programming interface
C) management information tree
D) distinguished name
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a bridge domain. Which setting should be configured to support this requirement?

A) disable Limit IP Learning to Subnet
B) disable IP Data-plane Learning
C) disable Unicast Routing
D) disable Advertise Host Routes
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
An engineer must limit management access to the Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

A) policy in the management tenant
B) ACL on the console interface
C) ACL on the management interface of the APIC
D) policy on the management VLAN
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
<strong>  Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?</strong> A) Routed B) Unicast C) L3Out D) L3 Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?

A) Routed
B) Unicast
C) L3Out
D) L3
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

A) Layer 3 outside interface association
B) EPG static port binding
C) VMM domain profile
D) EPG association
E) IP address pool association
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?

A) The source MAC address of the traffic is learned as a local endpoint.
B) The source MAC address of the traffic is learned as a remote endpoint.
C) The source IP address of the traffic is learned as a remote endpoint.
D) The source IP address of the traffic is learned as a local endpoint.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
<strong>  Refer to the exhibit. Which action should be taken to ensure authentication if the RADIUS servers are unavailable?</strong> A) Adjust the priority of server 10.1.1.1 to 1. B) Assign the user to the default role. C) Set the default login realm to LDAP. D) Set the fallback login to local. Refer to the exhibit. Which action should be taken to ensure authentication if the RADIUS servers are unavailable?

A) Adjust the priority of server 10.1.1.1 to 1.
B) Assign the user to the default role.
C) Set the default login realm to LDAP.
D) Set the fallback login to local.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from being learned by the fabric?

A) enable Limit IP Learning to Subnet
B) enable Unicast Routing
C) enable IP Data-plane Learning
D) enable ARP Flooding to BD
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

A) The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.
B) The Layer 2 unknown hardware proxy lacks support of the topology change notification.
C) The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.
D) The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
What must be configured to allow SNMP traffic on the APIC controller?

A) out-of-band management interface
B) contract under tenant mgmt
C) SNMP relay policy
D) out-of-band bridge domain
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
<strong>  When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?</strong> A) all leaf switches and all spine nodes B) only spine switches where the bridge domain of the tenant is present C) only leaf switches where the bridge domain of the tenant is present D) all border leaf nodes where the bridge domain of the tenant is present When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?

A) all leaf switches and all spine nodes
B) only spine switches where the bridge domain of the tenant is present
C) only leaf switches where the bridge domain of the tenant is present
D) all border leaf nodes where the bridge domain of the tenant is present
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
Which type of port is used for in-band management within ACI fabric?

A) spine switch port
B) APIC console port
C) leaf access port
D) management port
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?

A) over Layer 3 directly connected back-to-back spines
B) over Layer 3 Out connectivity via border leafs
C) over Layer 3 IPN connectivity via border leafs
D) over Layer 3 IPN connectivity via spines
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)

A) Raised
B) Retaining
C) Soaking, Clearing
D) Raised, Clearing
E) Soaking
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
On which two interface types should a user configure storm control to protect against broadcast traffic? (Choose two.)

A) APIC facing interfaces
B) port channel on a single leaf switch
C) all interfaces on the leaf switches in the fabric
D) endpoint-facing trunk interface
E) fabric uplink interfaces on the leaf switches
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?

A) "Limit IP learning to network" setting within the bridge domain.
B) "Limit IP learning to subnet" setting within the EPG.
C) "Limit IP learning to network" setting within the EPG.
D) "Limit IP learning to subnet" setting within the bridge domain.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

A) forwarding tag trees
B) PIM routing
C) spanning trees
D) shortest-path trees
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
A customer migrates a legacy environment to Cisco ACI. A Layer 2 trunk is configured to interconnect the two environments. The customer also builds ACI fabric in an application-centric mode. Which feature should be enabled in the bridge domain to reduce instability during the migration?

A) Set Multi-Destination Flooding to Flood in BD.
B) Enable Flood in Encapsulation.
C) Set Multi-Destination Flooding to Flood in Encapsulation.
D) Disable Endpoint Dataplane Learning
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
An engineer must connect Cisco ACI fabric using Layer 2 with external third-party switches. The third-party switches are configured using 802.1s protocol. Which two constructs are required to complete the task? (Choose two.)

A) spanning tree policy for mapping MST Instances to VLANs
B) MCP policy with PDU per VLAN enabled
C) MCP instance policy with administrative slate disabled
D) dedicated EPG for native VLAN
E) static binding of native VLAN in all existing EPGs
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
Which statement regarding ACI Multi-Pod and TEP pool is true?

A) The IP addresses used in the IPN network can overlap TEP pool of the APIC.
B) A different TEP pool must be assigned to each Pod.
C) The Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod.
D) The same TEP pool is used in all Pods.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
Which statement about ACI syslog is true?

A) Notifications for different scopes of syslog objects can be sent only to one destination.
B) Syslog messages are sent to the destination through the spine.
C) All syslog messages are sent to the destination through APIC.
D) Switches send syslog messages directly to the destinations.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 65 flashcards in this deck.