Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Data Center > 300-620

300-620 Implementing Cisco Application Centric Infrastructure (300-620 DCACI) Question and Answers

Question # 4

Refer to the exhibit. An engineer must disable the communication between the two backup servers in the backup EPG. Which action accomplishes this goal?

A.

Set Preferred Group Member to Excluded.

B.

Set the physical domain to None.

C.

Set a different static binding for the encap VLAN.

D.

Set Intra EPG Isolation to Enforced.

Full Access
Question # 5

What must be configured to redistribute externally learned OSPF routes within the ACI fabric?

A.

Route Control Profile

B.

BGP Route Reflector

C.

BGP Inter-leak Route Map

D.

PIM Sparse Mode

Full Access
Question # 6

Refer to the exhibit. A client is configuring a new Cisco ACI fabric. All VLANs will be extended during the migration phase using the VPC connections on leaf switches 3. 4 and leaf switches toward the legacy network. The migration phase has these requirements;

* If The legacy switches must be able to transfer BPDUs through the ACI fabric.

* If the legacy switches fail to break a loop. Cisco ACI must break the loop.

Which group settings must be configured on VPC interface policy groups ipg_vpc-legacy_1 and ipg_vpc-legacy_2 to meet these requirements?

A.

MCP: enabled

BPDU Guard: enabled

BPDU Filter: disabled

B.

MCP: enabled

BPDU Guard: disabled

BPDU Filter: disabled

C.

MCP: disabled

BPDU Guard: disabled

BPDU Filter: enabled

D.

MCP: disabled

BPDU Guard: enabled

BPDU Filter enable

Full Access
Question # 7

How does Cisco ACI detect the IP address of a silent host that moved from one location to another without notifying a Cisco ACI leaf?

A.

ARP requests are flooded in the bridge domain.

B.

Bounce entries are installed on the leaf switch.

C.

Endpoint announce messages are sent to COOP.

D.

Silent hosts are detected by the ACI fabric.

Full Access
Question # 8

A customer creates Layer 3 connectivity to the outside network. However, only border leaf switches start receiving destination updates to other networks from the newly created L3Out. The updates must also be propagated to other Cisco ACI leaf switches. The L3Out is linked with the EPGs via a contract. Which action must be taken in the pod policy group to accomplish this goal?

A.

Apply a BGP route reflector policy.

B.

Enable a COOP policy.

C.

Configure an IS-IS policy.

D.

Implement an access management policy.

Full Access
Question # 9

The engineer notices frequent MAC and IP address moves between different leaf switch ports. Which action prevents this problem from occurring?

A.

Disable enforce subnet check.

B.

Enable endpoint loop protection.

C.

Enable rogue endpoint control.

D.

Disable IP bridge domain enforcement.

Full Access
Question # 10

An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?

A.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Enabled

B.

Under the Create Remote location settings, select Protocol: FTP

Under the Export policy, select

- Format: XML

- Modify Global AES Encryption Settings: Disabled

C.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Disabled

D.

Under the Create Remote location settings, select Protocol: SCP

Under the Export policy, select

- Format: JSON

- Modify Global AES Encryption Settings: Enabled

Full Access
Question # 11

An engineer is in the process of discovering a new Cisco ACI fabric consisting of two spines and four leaf switches. The discovery of leaf 1 has just been completed. Which two nodes are expected to be discovered next? (Choose two.)

A.

spine 1

B.

leaf 4

C.

spine 2

D.

leaf 3

E.

leaf 2

Full Access
Question # 12

Refer to the exhibit. An engineer configures a Layer 4 to Layer 7 device object. The device is a virtual firewall with a single network adapter and it must be deployed in routed mode. Which .. completes the configuration of the device object?

A.

Change Function Type to GoTo.

B.

Add an outside interface to the cluster interfaces.

C.

Change context awareness to Multiple.

D.

Enable Promiscuous Mode.

Full Access
Question # 13

Which type of port is used for in-band management within ACI fabric?

A.

spine switch port

B.

APIC console port

C.

leaf access port

D.

management port

Full Access
Question # 14

An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?

A.

merge

B.

atomic

C.

best effort

D.

replace

Full Access
Question # 15

An engineer is implementing a Cisco ACI environment that consists of more than 20 servers. Two of the servers support only Cisco Discovery Protocol with no order link discovery protocol. The engineer wants the servers to be discovered automatically by the Cisco ACI fabric when connected. Which action must be taken to meet this requirement?

A.

Create an override policy that enables Cisco Discovery Protocol after LLDP is enabled in the default policy group.

B.

Configure a higher order interface policy that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

C.

Configure a lower order policy group that enables Cisco Discovery Protocol for the interface on the desired leaf switch.

D.

Create an interface profile for the interface that disables LLDP on the desired switch that is referenced by the interface policy group.

Full Access
Question # 16

Refer to the exhibit. The EPG-100 must be extended to the vCenter as a port group with a tagged VLAN ID of 100. Which set of actions accomplishes this goal?

A.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

B.

Define a static VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vcdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

C.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the del vdev domain.

Associate the dc1vcdev domain with EPG and select these settings:

Untagged VLAN Access: unselected

VLAN Mode: Static with Encap: 100

D.

Define a dynamic VLAN range (from 100-200) under a VLAN pool that is associated with the dc1vdev domain.

Associate the dc2vcdev domain with EPG and select these settings:

Untagged VLAN Access: selected

VLAN Mode: Static with Encap: 100

Full Access
Question # 17

An engineer is implementing a connection that represents an external bridged network. Which two configurations are used? (Choose two.)

A.

Layer 2 remote fabric

B.

Layer 2 outside

C.

Layers 2 internal

D.

Static path binding

E.

VXLAN outside

Full Access
Question # 18

Which protocol does ACI use to securely sane the configuration in a remote location?

A.

SCP

B.

HTTPS

C.

TFTP

D.

FTP

Full Access
Question # 19

What controls communication between EPGs?

A.

Inter-EPG communication is controlled by BGP.

B.

Inter-EPG communication is controlled by contracts.

C.

Inter-EPG communication is controlled by IS-IS.

D.

Inter-EPG communication is controlled by VXLAN.

Full Access
Question # 20

Which two types of interfaces are supported on border leaf switches to connect to an external router? (Choose two.)

A.

subinterface with VXLAN tagging

B.

subinterface with 802.1Q tagging

C.

FEX host interface

D.

out of band interface

E.

Switch Virtual Interface

Full Access
Question # 21

An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.

Full Access
Question # 22

Cisco ACI fabric must detect all silent endpoints for the Layer 3 bridge domain. Which actions accomplish this goal?

A.

Disable Unicast Routing.

Enable L2 Unknown Unicast Hardware Proxy.

B.

Disable Unicast Routing.

Enable L2 Unknown Unicast Flood.

C.

Enable Unicast Routing. Disable ARP Flooding.

D.

Enable Unicast Routing. Enable ARP Flooding.

Full Access
Question # 23

Refer to the exhibit. New e-commerce software is deployed on Cisco ACI fabric. The environment must meet these requirements:

The overall number of contracts must be reduced by reusing the existing contracts within a VRF when possible.

The e-commerce software must communicate only with software EPGs that are part of the same ANP.

The e-commerce software must be prevented from communicating with applications in different ANPs.

Which scope must be selected to meet these requirements?

A.

Application Profile

B.

Endpoint Group

C.

Tenant

D.

Global

Full Access
Question # 24

Refer to the exhibit. Which two configurations enable inter-VRF communication? (Choose two.)

A.

Set the subnet scope to Shared Between VRFs.

B.

Enable Advertise Externally under the subnet scope.

C.

Export the contract and import as a contract interface.

D.

Change the contract scope to Tenant.

E.

Change the subject scope to VRF.

Full Access
Question # 25

An engineer must configure a Layer 3 connection to the WAN router. The hosts in production VRF must access WAN subnets. The engineer associates EPGs in the production VRF with the external routed domain. Which action completes the task?

A.

Configure the Export Route Control Subnet scope for the external EPG.

B.

Configure the External Subnets for the External EPG scope for the external EPG.

C.

Configure the Import Route Control Subnet scope for the external EPG.

D.

Configure the Shared Route Control Subnet scope for the external EPG.

Full Access
Question # 26

Which two IP address types are available for transport over the ISN when they are configured from Cisco ACI Multi-Site Orchestrator? (Choose two.)

A.

Management IP of APICs

B.

Management IP of the MSO Node

C.

Anycast Overlay Multicast TEP

D.

MP-BGP EVPN Router-ID

E.

Common Pervasive Gateway

Full Access
Question # 27

Which two components are essential parts of a Cisco ACI Virtual Machine Manager (VMM) domain policy configuration? (Choose two.)

A.

VMM domain profile

B.

EPG static port binding

C.

Layer 3 outside interface association

D.

IP address pool association

E.

EPG association

Full Access
Question # 28

An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?

A.

The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.

B.

The Layer 2 unknown hardware proxy lacks support of the topology change notification.

C.

The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.

D.

The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.

Full Access
Question # 29

Refer to the exhibit A Cisco ACI fabric is using out-of-band management connectivity The APIC must access a routable host with an IP address of 192 168 11 2 Which action accomplishes this goal?

A.

Change the switch APIC Connectivity Preference to in-band management

B.

Remove the in-band management address from the APIC.

C.

Add a Fabric Access Policy to allow management connections.

D.

Modify the Pod Profile to use the default Management Access Policy

Full Access
Question # 30

An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)

A.

Enable the BPDU interface controls under the spanning tree interface policy.

B.

Configure a new STP interface policy.

C.

Bind the spanning tree policy to the switch policy group.

D.

Associate the STP interface policy to the appropriate interface policy group.

E.

Create a new region policy under the spanning tree policy.

F.

Map VLAN range to MAT instance number.

Full Access
Question # 31

A network engineer must allow secure access to the Cisco ACl out-of-band (OOB) management only from external subnets 10 0 0024 and 192.168 20 G'25. Which configuration set accomplishes this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Refer to the exhibit.

An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of “Tenant | Application | EPG”. Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG”?

A.

enable tag collection

B.

security domains

C.

delimiter

D.

virtual switch name

Full Access
Question # 33

Cisco ACI fabric contains 10 standalone leaf switches. An engineer must configure only the first two leaf switches in a VPC. Which VPC protection type must be configured to accomplish goal?

A.

serial

B.

explicit

C.

reciprocal

D.

consecutive

Full Access
Question # 34

A company is implementing a new security policy to track system access, configuration, and changes. The network engineer must enable the log collection to track user login and logout attempts. In addition, any configuration changes such as a fabric node failure must be collected in the logs. The syslog policy is configured to send logs to the company SEIM appliance.

Which two log types must be enabled to meet the security requirements? (Choose two.)

A.

error

B.

audit

C.

event

D.

health

E.

fault

Full Access
Question # 35

What is the name of the automatically configured VLAN 3600 presented during Cisco ACI fabric discovery?

A.

Transit VLAN

B.

Infrastructure VLAN

C.

Loopback VLAN

D.

Fabric VLAN

Full Access
Question # 36

An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?

A.

No policies are downloaded because LLDP is the only supported discovery protocol.

B.

Policies are downloaded when the hypervisor host is connected to the VMM VDS.

C.

Policies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship.

D.

No policies are downloaded because there is no discovery protocol neighborship.

Full Access
Question # 37

Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?

A.

vzAny contracts

B.

standard contracts

C.

application EPGs

D.

uSeg EPGs

Full Access
Question # 38

An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?

A.

It is forwarded to one of the spines to perform as a spine proxy.

B.

It is flooded within the whole fabric.

C.

It is dropped by the leaf when the destination endpoint is not present in the endpoint table.

D.

It is forwarded to one of the APICs to perform as a proxy.

Full Access
Question # 39

An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?

A.

Inspect event records in the APIC UI to see all actions performed by users.

B.

Inspect /var/log/audit_messages on the APIC to see a record of all user actions.

C.

Inspect audit logs in the APIC UI to see all user events.

D.

Inspect the output of show command history in the APIC CLI.

Full Access
Question # 40

The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?

A.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

B.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Enable

C.

L2 Unknown Unicast: Flood

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

D.

L2 Unknown Unicast: Hardware Proxy

L3 Unknown Multicast Flooding: Optimize Flood

Multi Destination Flooding: Flood in BD

ARP Flooding: Disable

Full Access
Question # 41

A network engineer configures the Cisco ACI fabric to connect to vCenter with these requirements:

Port groups must be automatically created on the distributed virtual switch.

Port groups must use the VLAN allocation in the range between 20-30.

The deployment must optimize the CAM space on the leaf switches.

Which set of actions meets these criteria?

A.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

B.

Create a dynamic VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to On Demand.

C.

Create a static VLAN pool with the VLAN range of 20-30.

Create a physical domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

D.

Create a static VLAN pool with the VLAN range of 20-30.

Create a VMM domain and associate it with the VLAN pool.

Create the EPG and associate the domain.

Set the deployment immediacy to Immediate.

Full Access
Question # 42

Refer to the exhibit. The default route is not present in the routing tables of the Cisco ACI leaf switches. All static and direct routes are currently being redistributed and advertised. Which jn must be taken to advertise a default route on the eBGP L30ut?

A.

Configure a static default route on the ACI node profiles with next-hop null.

B.

Create a Default Route Leak Policy on the L3Qut.

C.

Enable a BGP peer prefix policy set to Always.

D.

Implement an export route map matching 0.0.0.0/0.

Full Access
Question # 43

A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic The loop must be detected and slopped by disabling an interface within 4 seconds Which configuration must be used?

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 44

An engineer implements a configuration backup on the Cisco APIC. The backup job must meet these requirements:

• The backup must transfer the encrypted data to the remote server.

• The transfer must be resumed if the connection is interrupted.

Which configuration set meets these requirements?

A.

Select protocol HTTP in Create Remote Location. Choose JSON format in Configuration Export Policy.

B.

Select protocol TFTP in Create Remote Location. Choose JSON format in Configuration Export Policy

C.

Select protocol FTP in Create Remote Location. Choose XML format in Configuration Export Policy.

D.

Select protocol SFTP in Create Remote Location. Choose XML format in Configuration Export Policy.

Full Access
Question # 45

Refer to the exhibit. A tenant is configured with a single L30ut and a single-homed link to the core router called Core-1. An engineer must add a second link to the L30ut that connects to Core-2 router. Which action allows the traffic from Core-2 to BL-1002 to have the same connectivity as the traffic from Core-1 to BL-1001?

A.

Add a second path to the logical interface profile of the existing L30ut

B.

Add a second subnet to the external EPG to the existing L30ut.

C.

Add a second OSPF interface profile to the logical interface profile.

D.

Add a second interface to the external domain to the existing L30ut.

Full Access
Question # 46

An engineer must add a group of 70 bare-metal ESXi servers to the Cisco ACI fabric, which is integrated with vCenter. These configuration steps are complete:

The configured pool of ESXi hosts is configured with an Attachable Access Entity Profile (AAEP) called AEP_VMM.

The new group uses the AAEP called AEP_BAREMETAL.

Which action extends functional VMM integration to the new nodes?

A.

Update AAEP to AEP_VMM on all policy groups that are used toward bare-metal servers.

B.

Create a new AAEP container object for policy groups for AEP_VMM.

C.

Implement a separate VMM domain for the bare-metal servers by using AEP_VMM.

D.

Add the VMM domain under the AEP_BAREMETAL AAEP object.

Full Access
Question # 47

An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements?

A.

Divide Cisco APIC controllers into two or more maintenance groups.

B.

Grant tenant-ext-admin access to a user who performs an upgrade

C.

Combine all switches into an upgrade group.

D.

Divide switches into two or more maintenance groups.

E.

Grant the fabric administrator role to a user who performs an upgrade.

Full Access
Question # 48

When configuring Cisco ACI VMM domain integration with VMware vCenter, which object is created in vCenter?

A.

datacenter

B.

VMware vSphere Standard vSwitch

C.

VMware vSphere Distributed Switch

D.

cluster

Full Access
Question # 49

A network engineer must configure a new SNMP configuration and syslog servers. The requirement is for all faults and events related to endpoint groups, bridge domains, and VRFs to be sent to it. Which action must be taken to meet the requirements?

A.

Enable access monitoring policies on the required endpoint groups, bridge domains, and VRFs.

B.

Utilize common tenant monitoring policies in the Cisco APIC.

C.

Configure fabric monitoring policies and attach to the spine switch in the fabric.

D.

Implement fabric-wide monitoring policies on all nodes.

Full Access
Question # 50

Refer to the exhibit. A company merges three of its departments: CORP, HR, and SERVICES, Currently, the connectivity between departments is achieved by using VRF route leaking. The requirement is to redesign the Cisco ACI networking architecture to communicate between EPGs and BDs from any tenant without configuring contracts or VRF route leaking. Which configuration meets these criteria?

A.

Configure an unenforced VRF in the user tenant and map all required EPGs to it.

B.

Implement an enforced VRF in the common tenant and map all required BDs to it.

C.

Configure an enforced VRF in the user tenant and map all required EPGs to it.

D.

Implement an unenforced VRF in the common tenant and map all required BDs to it.

Full Access
Question # 51

Which method does the Cisco ACI fabric use to load-balance multidestination traffic?

A.

PIM routing

B.

spanning trees

C.

shortest-path trees

D.

forwarding tag trees

Full Access
Question # 52

As part of a migration, legacy non-ACI switches must be connected to the Cisco ACI fabric. All non-ACI switches run per-VLAN RSTP. After the non-ACI switches are connected to Cisco ACI, the STP convergence caused a microloop and significant CPU spike on all switches. Which configuration on the interfaces of the external switches that face the Cisco ACI fabric resolves the problem?

A.

BPDU guard

B.

aggressive STP timers

C.

BPDU filtering

D.

STP type link shared

Full Access
Question # 53

An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:

a contract named All_Traffic_Allowed

a Layer 4 to Layer 7 device named FW-Device

a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy

Which configuration set redirects the traffic to the firewall?

A.

Configure a policy-based redirect subject.

Associate the policy-based redirect subject with All_Traffic_Allowed.

B.

Configure a firewall bridge domain.

Associate the bridge domain with FW-Device.

C.

Configure a device interface policy.

Associate the device interface policy with FW-Device.

D.

Configure a service graph.

Associate the service graph with All_Traffic_Allowed.

Full Access
Question # 54

What is the result of selecting the On Demand attribute in the Deploy Immediacy feature during VMM domain association to an EPG?

A.

The EPG policy is downloaded to the leaf when a hypervisor is connected, and a VM is placed in a port group.

B.

The EPG policy is programmed in the hardware policy CAM only when the first packet is received through the data path.

C.

The EPG policy is programmed in the hardware policy CAM as soon as the policy is downloaded in the leaf software.

D.

The EPG policy is downloaded to the leaf when a hypervisor is attached to a DVS. and CDP or LLDP adjacency is formed.

Full Access
Question # 55

Refer to the exhibit.

Which two objects are created as a result of the configuration? (Choose two.)

A.

application profile

B.

attachable AEP

C.

bridge domain

D.

endpoint group

E.

VRF

Full Access
Question # 56

A network engineer must backup the PRODUCTION tenant. The configuration backup should be stored on the APIC using a markup language and contain all secure information. Which export policy must be used to meet these requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option D

D.

Option D

Full Access
Question # 57

Cisco ACI fabric has three different endpoints S1, S2. and S3. These endpoints must communicate with each other without contracts. These objects have been created in APIC:

•Two EPGs named DNS_EPG and Database_EPG

•Two application profiles. PROD_App and Data_App

•Two bridge domains DNS_BD and Database_BD

•PROD_APP and Database_BD mapped to Tenant PROD

•Data_App and DNS_BD mapped to Tenant Data

Which set of actions completes the fabric configuration?

A.

Add S1, S2, S3 under Database_EPG.

MAP Database_EPG under PROD_ App.

Associate Datbase_EPG with DNS_BD.

B.

Add S1, S2, S3, under DNS_EPG.

MAP DNS_EPG to Data_App.

Associate DNS_EPG with Dns_BD.

C.

Add S1, S2, S3 under DNS_EPG.

MAP DNS_EPG to Data_App.

Associate DNS_EPG with Database_BD.

D.

Add S1, S2, S3 under Database_EPG.

MAP Database_EPG under Data_App.

Associate Datbase_EPG with Database_BD.

Full Access
Question # 58

A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?

A.

Associate the VMM domain with the EPGs that must be available in vCenter.

B.

Assign the uplinks of the ESXi hosts to the vDS that the APIC created.

C.

Configure contracts for the EPGs that are required on the ESXi hosts.

D.

Create the port groups on the vCenter that reflect the EPG names in the APIC.

Full Access
Question # 59

In a Cisco ACI Multi-Site fabric, the Inter-Site BUM Traffic Allow option is enabled in a specific stretched bridge domain. What is used to forward BUM traffic to all endpoints in the same broadcast domain?

A.

ingress replication on the spines in the source site

B.

egress replication on the destination leaf switches

C.

egress replication on the source leaf switches

D.

ingress replication on the spines in the destination site

Full Access
Question # 60

Which description regarding the initial APIC cluster discovery process is true?

A.

The APIC uses an internal IP address from a pool to communicate with the nodes.

B.

Every switch is assigned a unique AV by the APIC.

C.

The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.

D.

The ACI fabric is discovered starting with the spine switches.

Full Access
Question # 61

Where is the COOP database located?

A.

leaf

B.

spine

C.

APIC

D.

endpoint

Full Access
Question # 62

An engineer is implementing a Cisco ACI data center network that includes Cisco Nexus 2000 Series 10G fabric extenders. Which physical topology is supported?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 63

An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics?

A.

All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected.

B.

Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts can be monitored.

C.

EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not collected.

D.

The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic.

Full Access
Question # 64

Refer to the exhibit.

A customer is deploying a WAN with these requirements: •Routers 1 and 2 must receive only routes 192.168.11.0/24 and 192.168.21.0724 from the Cisco ACI fabric •Reachability to the WAN users must be permitted only for the servers that are located in vrf_prod.

Which settings must be configured to meet these objectives?

A.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

B.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Private to VRF. Configure the subnet 192.168.31.0/24 as Advertised Externally. Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

C.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as Shared Route Control Subnet.

D.

Configure the subnets 192.168.11.0/24 and 192.168.21.0/24 as Advertised Externally.

Configure the subnet 192.168.31.0/24 as Private to VRF.

Configure an EPG subnet 0.0.0.0/0 as External Subnets for External EPG.

Full Access
Question # 65

Refer to the exhibit.

An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?

A.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the provider tenant.

B.

• Define the contract in the provider tenant and export it to the consumer tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

C.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device and service graph template in the provider tenant and the ASA bridge domains in the consumer tenant.

D.

• Define the contract in the provider tenant and export it to the provider tenant.

• Define the L4-L7 device, service graph template, and ASA bridge domains in the consumer tenant.

Full Access
Question # 66

An engineer configures an L30ut in VRF-1 that was configured for Import Route Control Enforcement. The L30ut uses OSPF to peer with a core switch. The L30ut has one external EPG, it has been configured with a subnet 10.1.0.0/24. Which scope must be set to force 10.1.0.0/24 to populate in the routing table for VRF-1?

A.

External Subnet for External EPG

B.

Export Route Control Subnet

C.

Shared Route for External EPG

D.

Import Route Control Subnet

Full Access
Question # 67

Refer to the exhibit. An engineer must divert the traffic between VM-1 and VM-2 by using a Multi-Node service graph. The solution should prevent an insufficient number of available Layer 4 to Layer 7 devices in the first cluster. Which configuration set accomplishes this goal?

A.

PBR node tracking

tracking threshold with action bypass

symmetric PBR

resilient hashing

B.

PBR node tracking

tracking threshold with action permit

unidirectional PBR

resilient hashing

C.

PBR node tracking

tracking threshold with action permit

symmetric PBR

resilient hashing

D.

PBR node tracking

tracking threshold with action deny

symmetric PBR

unidirectional PBR

Full Access
Question # 68

Refer to the exhibit.

A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?

A.

300

B.

410

C.

350

D.

510

Full Access
Question # 69

An Cisco ACI leaf switch learns the source IP address of a packet that enters the front panel port of the switch. Which bridge domain setting is used?

A.

Unicast Routing

B.

L3 Unknown Multicast Flooding - Flood

C.

ARP Flooding

D.

Unknown Unicast - Hardware proxy

Full Access
Question # 70

Refer to the exhibit. VM1 and VM2 are in Cisco ACI POD1 and communication takes place. Which event is triggered when VM2 is live migrated from POD1 to POD2?

A.

Leaf 102 installs a bounce entry for VM2 pointing to the PTEP address of leaf 201.

B.

Leaf 201 creates a tunnel with leaf 102 because of the bounced traffic that is destined to VM2.

C.

Spines from POD2 send an MP-BGP EVPN update to the leaves in POD1 about the new location of VM2.

D.

An MP-BGP EVPN update is received by spines in POD1 announcing the reachability of VM2 via the proxy VTEP address of the spines in POD2.

Full Access
Question # 71

When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?

A.

within the bridge domain

B.

within the APIC

C.

within the access encap VLAN

D.

between all the spine and leaf switches

Full Access
Question # 72

What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)

A.

Traffic is dynamically redirected to the firewall that owns the connection.

B.

Deployment occurs in transparent mode.

C.

The connection state is unsynchronized.

D.

Deployment occurs in go-to mode only.

E.

This mode causes the traffic to flow asymmetrically.

Full Access
Question # 73

Refer to the exhibit.

An application called App_1 is hosted on the server called S1. A silent host application. App_2. is hosted on S2. Both applications use the same VLAN encapsulation, which action forces Cisco ACI fabric to learn App_2 on ACI leaf 2?

A.

Set Multi-Destination Flooding to Drop.

B.

Set Unicast Routing to Hardware Proxy.

C.

Set L2 Unknown Unicast to Flood.

D.

Set L3 Unknown Multicast to Optimized flood.

Full Access
Question # 74

Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?

A.

OSPF

B.

ISIS

C.

BGP

D.

EIGRP

Full Access