لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?
A. “Limit IP learning to network” setting within the bridge domain
B. “Limit IP learning to subnet” setting within the EPG
C. “Limit IP learning to network” setting within the EPG
D. “Limit IP learning to subnet” setting within the bridge domain
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?
A. merge
B. atomic
C. best effort
D. replace
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which type of policy configures the suppression of faults that are generated from a port being down?
A. fault lifecycle assignment
B. event lifecycle assignment
C. fault severity assignment
D. event severity assignment
عرض الإجابة
اجابة صحيحة: C
السؤال #4
An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?
A. It is forwarded to one of the spines to perform as a spine proxy
B. It is flooded within the whole fabric
C. It is dropped by the leaf when the destination endpoint is not present in the endpoint table
D. It is forwarded to one of the APICs to perform as a proxy
عرض الإجابة
اجابة صحيحة: BE
السؤال #5
Which two objects are created as a result of the configuration? (Choose two.)
A. application profile
B. attachable AEP
C. bridge domain
D. endpoint group
E. VRF
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)
A. Spine1
B. apic1
C. Spine2
D. Leaf1
E. Leaf2
F. apic2
عرض الإجابة
اجابة صحيحة: A
السؤال #7
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?
A. The leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables
B. The Layer 2 unknown hardware proxy lacks support of the topology change notification
C. The leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables
D. The spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database
عرض الإجابة
اجابة صحيحة: A
السؤال #8
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?
A. Endpoints must connect directly to the ACI leaf port
B. External endpoints are in a different bridge domain than the endpoints in the fabric
C. Endpoint learning encompasses the MAC address only
D. External endpoints are in the same EPG as the directly attached endpoints
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?
A. The source MAC and IP address of the traffic is learned as a local endpoint
B. The source MAC address of the traffic is learned as a remote endpoint
C. No source MAC or IP address of the traffic is learned as a remote endpoint
D. The source IP address of the traffic is learned as a remote endpoint
عرض الإجابة
اجابة صحيحة: AC
السؤال #10
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?
A. Inspect event records in the APIC UI to see all actions performed by users
B. Inspect /var/log/audit_messages on the APIC to see a record of all user actions
C. Inspect audit logs in the APIC UI to see all user events
D. Inspect the output of show command history in the APIC CLI
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?
A. ARP gleaning
B. dynamic endpoint attach
C. hardware proxy
D. network-stitching
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?
A. Under System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear
B. Create a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold
C. Under System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault
D. Create a new global health score policy that ignores specific faults as identified by their unique fault code
عرض الإجابة
اجابة صحيحة: A
السؤال #13
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?
A. L2 unknown unicast: flood
B. GARP based detection
C. unicast routing
D. subnet scope
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: