Cisco (300-620-DCACI) Exam Questions And Answers page 13
Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)
apic1
Spine2
Leaf1
Leaf2
apic2
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?
limit IP learning to subnet
scope
gateway IP
subnet control
ACI Fabric Access Policies
ACI Tenant Policies
Refer to the exhibit. An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link. Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)
Layer 3 routed port
VPC with SVI
port channel with SVI
Layer 3 routed subinterface
Layer 3 floating SVI
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
An ACI engineer is implementing a Layer 3 Out inside the Cisco ACI fabric that must meet these requirements:
• The data center core switch must be connected to one of the leaf switches with a single 1G link.
• The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.
• The data center core switch interface must be using 802.1Q tagging, and each VLAN will be configured with a dedicated IP address.
Which set of steps accomplishes this goals?
• The data center core switch must be connected to one of the leaf switches with a single 1G link.
• The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.
• The data center core switch interface must be using 802.1Q tagging, and each VLAN will be configured with a dedicated IP address.
Which set of steps accomplishes this goals?
Set up the EIGRP Protocol policy with the selected Autonomous System number.
Create the Routed Outside object and Node Profile, selecting EIGRP.
Configure the Interface profile, selecting Routed Interface and the appropriate interfaces.
Create the External Network object with a network of 0.0.0 0/0.
Create the Routed Outside object and Node Profile, selecting EIGRP.
Configure the Interface profile, selecting Routed Interface and the appropriate interfaces.
Create the External Network object with a network of 0.0.0 0/0.
Set up the EIGRP Protocol policy with the selected Autonomous System number.
Set up the Routed External Network object and Node Profile, selecting EIGRP.
Create the Switch profile, selecting Port-channel and the appropriate interfaces.
Create the default network and associate it with the Routed Outside object.
Set up the Routed External Network object and Node Profile, selecting EIGRP.
Create the Switch profile, selecting Port-channel and the appropriate interfaces.
Create the default network and associate it with the Routed Outside object.
Set up the BGP Protocol policy with the Autonomous System number of 0.
Configure an Interface policy and an External Bridged Domain.
Create an External Bridged Network using the configured VLAN pool.
Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.
Configure an Interface policy and an External Bridged Domain.
Create an External Bridged Network using the configured VLAN pool.
Build the Leaf profile, selecting Routed sub-interface and the appropriate VLAN.
Configure the OSPF Protocol policy with an area of 0.
Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol.
Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN.
Configure the External Network object with a network of 0 0.0 0/0.
Create Routed Outside object and Node Profile, selecting OSPF as the routing protocol.
Build the Interface profile, selecting Routed Sub-interface and the appropriate VLAN.
Configure the External Network object with a network of 0 0.0 0/0.
ACI Fabric Connectivity Policies
ACI Tenant Policies
An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)
Raised
Retaining
Soaking, Clearing
Raised, Clearing
Soaking
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination endpoint?
The leaf switch does not learn the source endpoint through data plane learning.
The leaf switch drops the traffic that is destined to the endpoint.
The leaf switch floods the traffic to the endpoint throughout the fabric.
The leaf switch sends the traffic to the wrong destination leaf.
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of Tenant | Application | EPG . Which configuration option is used to generate port groups with names formatted as Tenant=Application=EPG ?
enable tag collection
security domains
delimiter
virtual switch name
ACI Tenant Policies
ACI Application Network Profiles
Which description regarding the initial APIC cluster discovery process is true?
The APIC uses an internal IP address from a pool to communicate with the nodes.
Every switch is assigned a unique AV by the APIC.
The APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.
The ACI fabric is discovered starting with the spine switches.
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
An engineer must configure a group of servers with a contract that uses TCP port 80. The EPG that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?
Configure the EPG as a provider and L3 out as consumer of the contract.
Configure OSPF to exchange routes between the L3 out and EPG.
Configure a taboo contract and apply it to the EPG.
Configure the EPG as a consumer and L3 out as a provider of the contract.
ACI Fabric Access Policies
ACI Tenant Policies
When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?
within the bridge domain
within the APIC
within the access encap VLAN
between all the spine and leaf switches
ACI Fabric Access Policies
ACI Fabric Connectivity Policies
Comments