Cisco (300-620-DCACI) Exam Questions And Answers page 10
A bridge domain for an EPG called Web Servers must be created in the Cisco APIC. The configuration must meet these requirements:
• Only traffic to known MAC addresses must be allowed to reduce noise.
• The multicast traffic must be limited to the ports that are participating in multicast routing.
• The endpoints within the bridge domain must be kept in the endpoint table for 20 minutes without any updates.
Which set of steps configures the bridge domain that satisfies the requirements?
• Only traffic to known MAC addresses must be allowed to reduce noise.
• The multicast traffic must be limited to the ports that are participating in multicast routing.
• The endpoints within the bridge domain must be kept in the endpoint table for 20 minutes without any updates.
Which set of steps configures the bridge domain that satisfies the requirements?
Set L2 Unknown Unicast to Hardware Proxy.
Configure L3 Unknown Multicast Flooding to Optimized Flood.
Create an Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.
Configure L3 Unknown Multicast Flooding to Optimized Flood.
Create an Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.
Multicast Destination Flooding should be set to Flood in BD.
Set L3 Unknown Multicast Flooding to Flood.
Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.
Set L3 Unknown Multicast Flooding to Flood.
Select the default Endpoint Retention Policy with a Local Endpoint Aging Interval of 1200 seconds.
Select the ARP Flooding checkbox.
Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.
Set L3 Unknown Multicast Flooding to Optimized Flooding.
Create an Endpoint Retention Policy with a Remote Endpoint Aging Interval of 20 minutes.
Set L3 Unknown Multicast Flooding to Optimized Flooding.
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
Which protocol does ACI use to securely sane the configuration in a remote location?
SCP
HTTPS
TFTP
FTP
ACI Fabric Connectivity Policies
ACI Fabric Automation
A Cisco APIC is configured with RADIUS authentication as the default. The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?
Associate console authentication with the RADIUS realm
Reference the local realm in the fallback domain
Create an additional login domain that references local accounts
Enable the fallback check with the default authentication domain
ACI Fabric Access Policies
ACI Tenant Policies
Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)
application profile
attachable AEP
bridge domain
endpoint group
VRF
ACI Fabric Access Policies
ACI Tenant Policies
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?
The source MAC and IP address of the traffic is learned as a local endpoint.
The source MAC address of the traffic is learned as a remote endpoint.
No source MAC or IP address of the traffic is learned as a remote endpoint.
The source IP address of the traffic is learned as a remote endpoint.
ACI Fabric Connectivity Policies
ACI Application Network Profiles
The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI leaf to learn a source IP as a local endpoint? (Choose two.)
Through Ethernet traffic received in a bridge domain.
IP traffic routed through an SVI.
Through VXLAN traffic received on the uplink.
IP traffic routed through a Layer 3 Out.
Through ARP received on an SVI.
ACI Fabric Connectivity Policies
ACI Application Network Profiles
What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?
over Layer 3 directly connected back-to-back spines
over Layer 3 Out connectivity via border leafs
over Layer 3 IPN connectivity via border leafs
over Layer 3 IPN connectivity via spines
ACI Fabric Connectivity Policies
ACI Application Network Profiles
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?
Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear.
Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold.
Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault.
Create a new global health score policy that ignores specific faults as identified by their unique fault code.
ACI Fabric Access Policies
ACI Tenant Policies
An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used?
interface policy group
switch policy group
switch profile
interface profile
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
Refer to the exhibit. An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?
Set L2 Unknown Unicast to Flood.
Set L2 Unknown Unicast to Hardware Proxy.
Disable Unicast Routing.
Enable ARP Flooding.
ACI Fabric Access Policies
ACI Application Network Profiles
Comments