لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
DRAG DROP (Drag and Drop is not supported)An engineer must configure RADIUS authentication with Cisco ACI for remote authentication with out-of-band management access. Drag and drop the RADIUS configuration steps from the left into the required implementation order on the right. Not all steps are used.
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which feature dynamically assigns or modifies the EPG association of virtual machines based on their attributes?
A. zAny contracts
B. tandard contracts
C. pplication EPGs
D. Seg EPGs
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A Cisco ACI is integrated with a VMware vSphere environment. The port groups must be created automatically in vSphere and propagated to hypervisors when created in the ACI environment. Which action accomplishes this goal?
A. reate the port groups on the vCenter that reflect the EPG names in the APIC
B. ssign the uplinks of the ESXi hosts to the vDS that the APIC created
C. onfigure contracts for the EPGs that are required on the ESXi hosts
D. ssociate the VMM domain with the EPGs that must be available in vCenter
عرض الإجابة
اجابة صحيحة: D
السؤال #4
What happens to the traffic flow when the Cisco ACI fabric has a stale endpoint entry for the destination endpoint?
A. he leaf switch does not learn the source endpoint through data plane learning
B. he leaf switch drops the traffic that is destined to the endpoint
C. he leaf switch floods the traffic to the endpoint throughout the fabric
D. he leaf switch sends the traffic to the wrong destination leaf
عرض الإجابة
اجابة صحيحة: D
السؤال #5
The existing network and ACI fabric have been connected to support workload migration. Servers will physically terminate at the Cisco ACI, but their gateway must stay in the existing network. The solution needs to adhere to Cisco’s best practices. The engineer started configuring the relevant Bridge Domain and needs to complete the configuration. Which group of settings are required to meet these requirements?
A. 2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enable
B. 2 Unknown Unicast: FloodL3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enable
C. 2 Unknown Unicast: FloodL3 Unknown Multicast Flooding: Optimize Flood Multi Destination Flooding: Flood in BDARP Flooding: Disable
D. 2 Unknown Unicast: Hardware ProxyL3 Unknown Multicast Flooding: Optimize Flood Multi Destination Flooding: Flood in BDARP Flooding: Disable
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Refer to the exhibit. A client reports that the ACI domain connectivity to the fiber channel storage is experiencing a B2B credit oversubscription. The environment has a SYSLOG server for state collection messages. Which value should be chosen to clear the critical fault?
A. 00
B. 10
C. 50
D. 10
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What does a bridge domain represent?
A. ndpoint
B. djacency
C. IB
D. RP
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A network administrator configures AAA inside the Cisco ACI fabric. The authentication goes through the local users if the TACACS+ server is not reachable. If the Cisco APIC is out of the cluster, the access must be granted through the fallback domain. Which configuration set meets these requirements?
A. ing Check: TrueDefault Authentication Realm: LocalFallback Check: True
B. ing Check: TrueDefault Authentication Realm: TACACS+Fallback Check: False
C. ing Check: FalseDefault Authentication Realm: LocalFallback Check: False
D. ing Check: FalseDefault Authentication Realm: TACACS+Fallback Check: True
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which protocol does ACI use to securely sane the configuration in a remote location?
A. CP
B. TTPS
C. FTP
D. TP
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which setting prevents the learning of Endpoint IP addresses whose subnet does not match the bridge domain subnet?
A. Limit IP learning to network" setting within the bridge domain
B. Limit IP learning to subnet" setting within the EPG
C. Limit IP learning to network" setting within the EPG
D. Limit IP learning to subnet" setting within the bridge domain
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which components must be configured for the BGP Route Reflector policy to take effect?
A. pine fabric interface overrides and profiles
B. ccess policies and profiles
C. od policy groups and profiles
D. eaf fabric interface overrides and profiles
عرض الإجابة
اجابة صحيحة: C
السؤال #12
A situation causes a fault to be raised on the APIC. The ACI administrator does not want that fault to be raised because it is not directly relevant to the environment. Which action should the administrator take to prevent the fault from appearing?
A. nder System -> Faults, right-click on the fault and select Acknowledge Fault so that acknowledged faults will immediately disappear
B. reate a stats threshold policy with both rising and falling thresholds defined so that the critical severity threshold matches the squelched threshold
C. nder System -> Faults, right-click on the fault and select Ignore Fault to create a fault severity assignment policy that hides the fault
D. reate a new global health score policy that ignores specific faults as identified by their unique fault code
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Refer to the exhibit. An engineer must configure an L3Out peering with the backbone network. The L3Out must forward unicast and multicast traffic over the link.Which two methods should be used to configure L3Out to meet these requirements? (Choose two.)
A. nable tag collection
B. ecurity domains
C. elimiter
D. irtual switch name
عرض الإجابة
اجابة صحيحة: DE
السؤال #14
Which type of policy configures the suppression of faults that are generated from a port being down?
A. ault lifecycle assignment
B. vent lifecycle assignment
C. ault severity assignment
D. vent severity assignment
عرض الإجابة
اجابة صحيحة: C
السؤال #15
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. A Cisco ACI fabric is newly deployed, and the security team requires more visibility of all inter EPG traffic flows. All traffic in a VRF must be forwarded to an existing firewall pair. During failover, the standby firewall must continue to use the same IP and MAC as the primary firewall. Drag and drop the steps from the left into the implementation order on the right to configure the service graph that meets the requirements. (Not all steps ar
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which tenant is used when configuring in-band management IP addresses for Cisco APICs, leaf nodes, and spine nodes?
A. niversal resource identifier (URI)
B. pplication programming interface
C. anagement information tree
D. istinguished name
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Refer to the exhibit. Which action should be taken to ensure authentication if the RADIUS servers are unavailable?
A. djust the priority of server 10
B. ssign the user to the default role
C. et the default login realm to LDAP
D. et the fallback login to local
عرض الإجابة
اجابة صحيحة: D
السؤال #18
An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a Cisco ACI fabric. Which action must be taken to receive the required messages?
A. dd Faults and Events to the monitor policy
B. dd Session Logs and Audit Logs to the monitor policy
C. nclude Audit Logs and Events in the Syslog source policy
D. nclude Events and Session Logs in the Syslog source policy
عرض الإجابة
اجابة صحيحة: A
السؤال #19
On which two interface types should a user configure storm control to protect against broadcast traffic? (Choose two.)
A. oute Control Profile
B. GP Route Reflector
C. GP Inter-leak Route Map
D. IM Sparse Mode
عرض الإجابة
اجابة صحيحة: BD
السؤال #20
What must be configured to allow SNMP traffic on the APIC controller?
A. ut-of-band management interface
B. ontract under tenant mgmt
C. NMP relay policy
D. ut-of-band bridge domain
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Which Cisco APIC configuration prevents a remote network that is not configured on the bridge domain from being learned by the fabric?
A. et Multi-Destination Flooding to Flood in BD
B. nable Flood in Encapsulation
C. et Multi-Destination Flooding to Flood in Encapsulation
D. isable Endpoint Dataplane Learning
عرض الإجابة
اجابة صحيحة: A
السؤال #22
An engineer configures a Multi-Pod system with the default getaway residing outside of the ACI fabric for a bridge domain. Which setting should be configured to support this requirement?
A. ver Layer 3 directly connected back-to-back spines
B. ver Layer 3 Out connectivity via border leafs
C. ver Layer 3 IPN connectivity via border leafs
D. ver Layer 3 IPN connectivity via spines
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?
A. outed
B. nicast
C. 3Out
D. 3
عرض الإجابة
اجابة صحيحة: D
السؤال #24
An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?
A. nable the Export Route Control Subnet for the External Endpoint Group flag
B. nable an L3Out with Shared Route Control Subnet
C. onfigure subnets with the External Subnets for External EPG flag enabled
D. onfigure subnets with the Import Route Control Subnet flag enabled
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Which two types of interfaces are supported on border leaf switches to connect to an external router? (Choose two.)
A. nable Limit IP Learning to Subnet
B. nable Unicast Routing
C. nable IP Data-plane Learning
D. nable ARP Flooding to BD
عرض الإجابة
اجابة صحيحة: BE
السؤال #26
An engineer configured Layer 2 extension from the ACI fabric and changed the Layer 2 unknown unicast policy from Flood to Hardware Proxy. How does this change affect the flooding of the L2 unknown unicast traffic?
A. t is forwarded to one of the spines to perform as a spine proxy
B. t is flooded within the whole fabric
C. t is dropped by the leaf when the destination endpoint is not present in the endpoint table
D. t is forwarded to one of the APICs to perform as a proxy
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which statement regarding ACI Multi-Pod and TEP pool is true?
A. he IP addresses used in the IPN network can overlap TEP pool of the APIC
B. different TEP pool must be assigned to each Pod
C. he Pod1 TEP pool must be split and a portion of the TEP pool allocated to each Pod
D. he same TEP pool is used in all Pods
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which method does the Cisco ACI fabric use to load-balance multidestination traffic?
A. orwarding tag trees
B. IM routing
C. panning trees
D. hortest-path trees
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Refer to the exhibit. Which two components should be configured as route reflectors in the ACI fabric? (Choose two.)
A. imit IP learning to subnet
B. cope
C. ateway IP
D. ubnet control
عرض الإجابة
اجابة صحيحة: AC
السؤال #30
A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with network control policies. The APIC configuration is as follows:•Tenant = TenantX•Security Domain = TenantX-SD•User = XThe customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these requirement?
A. hell:domains = TenantX-SD/fabric-admin/,common//read-all
B. hell:domains = TenantX-SD/tenant-admin
C. hell:domains = TenantX-SD/tenant-ext-admin/,common//read-all
D. hell:domains = TenantX-SD/tenant-admin/,common//read-all
عرض الإجابة
اجابة صحيحة: C
السؤال #31
An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location. The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support. Which configuration set must be used?
A. olicy: Export PolicyProtocol: TLSFormat: JSON
B. olicy: Import PolicyProtocol: TLSFormat: XML
C. olicy: Import PolicyProtocol: SCPFormat: JSON
D. olicy: Export PolicyProtocol: SCPFormat: XML
عرض الإجابة
اجابة صحيحة: D
السؤال #32
An engineer is troubleshooting fabric discovery in a newly deployed Cisco ACI fabric and analyzes this output:Which ACI fabric address is assigned to interface lo1023?
A. XLAN tunnel endpoint
B. hysical tunnel endpoint
C. abric tunnel endpoint
D. ynamic tunnel endpoint
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Which statement about ACI syslog is true?
A. otifications for different scopes of syslog objects can be sent only to one destination
B. yslog messages are sent to the destination through the spine
C. ll syslog messages are sent to the destination through API
D. witches send syslog messages directly to the destinations
عرض الإجابة
اجابة صحيحة: A
السؤال #34
Which description regarding the initial APIC cluster discovery process is true?
A. he APIC uses an internal IP address from a pool to communicate with the nodes
B. very switch is assigned a unique AV by the APIC
C. he APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol
D. he ACI fabric is discovered starting with the spine switches
عرض الإجابة
اجابة صحيحة: A
السؤال #35
An engineer is creating a configuration import policy that must terminate if the imported configuration is incompatible with the existing system. Which import mode achieves this result?
A. erge
B. tomic
C. est effort
D. eplace
عرض الإجابة
اجابة صحيحة: B
السؤال #36
An engineer is implementing Cisco ACI at a large platform-as-a-service provider using APIC controllers, 9396PX leaf switches, and 9336PQ spine switches. The leaf switch ports are configured as IEEE 802.1p ports. Where does the traffic exit from the EPG in IEEE 802.1p mode in this configuration?
A. rom leaf ports tagged as VLAN 0
B. rom leaf ports untagged
C. rom leaf ports tagged as VLAN 4094
D. rom leaf ports tagged as VLAN 1
عرض الإجابة
اجابة صحيحة: A
السؤال #37
In the context of VMM, which protocol between ACI leaf and compute hosts ensures that the policies are pushed to the leaf switches for immediate and on demand resolution immediacy?
A. XLAN
B. LDP
C. SIS
D. TP
عرض الإجابة
اجابة صحيحة: A
السؤال #38
An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal?
A. pplication profile
B. enant
C. ontract
D. ridge domain
عرض الإجابة
اجابة صحيحة: B
السؤال #39
Refer to the exhibit. An engineer is implementing Cisco ACI "" VMware vCenter integration for a blade server that lacks support of bonding. Which port channel mode results in "route based on originating virtual port" on the VMware VDS?
A. atacenter
B. Mware vSphere Standard vSwitch
C. Mware vSphere Distributed Switch
D. luster
عرض الإجابة
اجابة صحيحة: D
السؤال #40
A network engineer is integrating a new Hyperflex storage duster into an existing Cisco ACI fabric. The Hyperflex cluster must be managed by vCenter, so a new vSphere Distributed switch must be created. In addition, the hardware discovery must be performed by a vendor-neutral discovery protocol. Which set of steps meets these requirements?
A. onfigure an Interface Policy group, select CDP, and apply it to the desired interfaces
B. onfigure an Interface Policy group, select LLDP, and apply it to the selected interfaces
C. onfigure a Switch Policy group, select LLDP, and apply it to the indicated interfaces
D. onfigure an Interface Policy group, select CDP, and apply it to the designated interfaces
عرض الإجابة
اجابة صحيحة: B
السؤال #41
DRAG DROP (Drag and Drop is not supported)Drag and drop the Cisco ACI Layer 4 to Layer 7 service insertion terms on the left to the correct descriptions on the right.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #42
In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?
A. elect Out-of-Band as Management EPG in the default DateTimePolicy
B. reate an Override Policy with NTP Out-of-Band for leaf and spine switches
C. hange the interface used for APIC external connectivity to ooband
D. dd a new filter to the utilized Out-of-Band-Contract to allow NTP protocol
عرض الإجابة
اجابة صحيحة: A
السؤال #43
Refer to the exhibit. An engineer configures the Cisco ACI fabric for VMM integration with ESXi servers that are to be connected to the ACI leaves. The server team requires the network switches to initiate the LACP negotiation as opposed to the servers. The LAG group consists of two 10 Gigabit Ethernet links. The server learn also wants to evenly distribute traffic across all available links. Which two enhanced LAG policies meet these requirements? (Choose two.)
A. efault
B. nfra
C. ommon
D. gmt
عرض الإجابة
اجابة صحيحة: CE
السؤال #44
A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/L3, VXLAN, and network policy across locations. ACI Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)
A. isable Limit IP Learning to Subnet
B. isable IP Data-plane Learning
C. isable Unicast Routing
D. isable Advertise Host Routes
عرض الإجابة
اجابة صحيحة: AE
السؤال #45
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?
A. he leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables
B. he Layer 2 unknown hardware proxy lacks support of the topology change notification
C. he leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables
D. he spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database
عرض الإجابة
اجابة صحيحة: D
السؤال #46
What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?
A. xternal Subnets for the External EPG
B. hared Route Control Subnet
C. mport Route Control Subnet
D. hared Security Import Subnet
عرض الإجابة
اجابة صحيحة: D
السؤال #47
Which feature allows firewall ACLs to be configured automatically when new endpoints are attached to an EPG?
A. RP gleaning
B. ynamic endpoint attach
C. ardware proxy
D. etwork-stitching
عرض الإجابة
اجابة صحيحة: B
السؤال #48
When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?
A. ll leaf switches and all spine nodes
B. nly spine switches where the bridge domain of the tenant is present
C. nly leaf switches where the bridge domain of the tenant is present
D. ll border leaf nodes where the bridge domain of the tenant is present
عرض الإجابة
اجابة صحيحة: C
السؤال #49
An ACI engineer is implementing a Layer 3 Out inside the Cisco ACI fabric that must meet these requirements:-The data center core switch must be connected to one of the leaf switches with a single 1G link.-The routes must be exchanged using a link-state routing protocol that supports hierarchical network design.-The data center core switch interface must be using 802.1Q tagging, and each VLAN will be configured with a dedicated IP address.Which set of steps accomplishes this goals?
A. et up the EIGRP Protocol policy with the selected Autonomous System number
B. et up the EIGRP Protocol policy with the selected Autonomous System number
C. et up the BGP Protocol policy with the Autonomous System number of 0
D. onfigure the OSPF Protocol policy with an area of 0
عرض الإجابة
اجابة صحيحة: D
السؤال #50
An engineer is in the process of discovering a new Cisco ACI fabric consisting of two spines and four leaf switches. The discovery of leaf 1 has just been completed. Which two nodes are expected to be discovered next? (Choose two.)
A. witch L2 Unknown Unicast to Flood
B. et L2 Unknown Unicast to Hardware Proxy
C. ulticast Destination Flooding should be set to Flood in BD
D. elect the ARP Flooding checkbox
عرض الإجابة
اجابة صحيحة: AC
السؤال #51
A network engineer must allow secure access to the Cisco ACI out-of-band (OOB) management only from external subnets 10.0.0.0/24 and 192.168.20.0/25. Which configuration set accomplishes this goal?
A. reate a L3Out in the MGMT tenant in OOB VRF
B. reate a PBR service graph in the MGMT tenant
C. reate an EPG and BD in the MGMT tenant in OOB VRF
D. reate an OOB contract that allows the required ports
عرض الإجابة
اجابة صحيحة: D
السؤال #52
An engineer must connect a new host to port 1/1 on Leaf 101. A Cisco ACI fabric has an MCP policy configured but experiences excessive Layer 2 loops. The engineer wants the Cisco ACI fabric to detect and prevent Layer 2 loops in the fabric. Which set of actions accomplishes these goals?
A. nable MCP locally
B. nable MCP locally
C. nable MCP globally
D. nable MCP globally
عرض الإجابة
اجابة صحيحة: D
السؤال #53
Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of "Tenant | Application | EPG". Which configuration option is used to generate port groups with names formatted as “Tenant=Application=EPG"?
A. tatic Channel "" Mode On
B. AC Pinning-Physical-NIC-load
C. ACP Passive
D. AC Pinning+
E. ACP Active
عرض الإجابة
اجابة صحيحة: D
السؤال #54
A Cisco ACI environment consists of multiple silent hosts that are often relocated between leaf switches. When the host is relocated, the bridge domain takes more than a few seconds to relearn the host’s new location. The requirement is to minimize the relocation impact and make the ACI fabric relearn the new location of the host faster. Which action must be taken to meet these requirements?
A. et Unicast Routing to Enabled
B. onfigure ARP Flooding to Enabled
C. et L2 Unknown Unicast to Hardware Proxy
D. onfigure IP Data-Plane Learning to No
عرض الإجابة
اجابة صحيحة: B
السؤال #55
When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?
A. ayer 3 cloud
B. ayer 2 forwarding construct
C. enant
D. hysical domain
عرض الإجابة
اجابة صحيحة: C
السؤال #56
DRAG DROP (Drag and Drop is not supported) An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #57
An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements? (Choose two.)
A. SPF
B. S-IS
C. GP
D. IGRP
عرض الإجابة
اجابة صحيحة: DE
السؤال #58
Which endpoint learning operation is completed on the egress leaf switch when traffic is received from an L3Out?
A. he source MAC and IP address of the traffic is learned as a local endpoint
B. he source MAC address of the traffic is learned as a remote endpoint
C. o source MAC or IP address of the traffic is learned as a remote endpoint
D. he source IP address of the traffic is learned as a remote endpoint
عرض الإجابة
اجابة صحيحة: B
السؤال #59
DRAG DROP (Drag and Drop is not supported)An engineer must configure VMM domain integration on a Cisco UCS B-Series server that is connected to a Cisco ACI fabric. Drag and drop the products used to create VMM domain from the bottom into the sequence in which they should be implemented at the top. Products are used more than once.
A. tatic Channel
B. AC Pinning
C. ACP
D. LDP
عرض الإجابة
اجابة صحيحة: A
السؤال #60
How is an EPG extended outside of the ACI fabric?
A. reate an external bridged network that is assigned to a leaf port
B. reate an external routed network that is assigned to an EPG
C. nable unicast routing within an EPG
D. tatically assign a VLAN ID to a leaf port in an EPG
عرض الإجابة
اجابة صحيحة: D
السؤال #61
The company’s Cisco ACI fabric hosts multiple customer tenants. To meet a service level agreement, the company is constantly monitoring the Cisco ACI environment. Syslog is one of the methods used for monitoring. Only events related to leaf and spine environmental information without specific customer data should be logged. To which ACI object must the configuration be applied to meet these requirements?
A. nfra tenant
B. ccess policy
C. witch profile
D. abric policy
عرض الإجابة
اجابة صحيحة: D
السؤال #62
Which type of port is used for in-band management within ACI fabric?
A. pine switch port
B. PIC console port
C. eaf access port
D. anagement port
عرض الإجابة
اجابة صحيحة: C
السؤال #63
A customer must upgrade the Cisco ACI fabric to use a feature from the new code release. However, there is no direct path from the current release to the desired one. Based on the Cisco APIC Upgrade/Downgrade Support Matrix, the administrator must go through one intermediate release.Which set of steps must be taken to upgrade the fabric to the new release?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: A
السؤال #64
An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco APIC should the policy be configured to meet this requirement?
A. ni/tn-common/monepg-default
B. ni/infra/monifra-default
C. ni/fabric/monfab-default
D. ni/fabric/moncommon
عرض الإجابة
اجابة صحيحة: D
السؤال #65
The Application team reports that a previously existing port group has disappeared from vCenter. An engineer confirms that the VMM domain association for the EPG is no longer present. Which action determines which user is responsible for the change?
A. heck the EPG audit logs for the “deletion” action and compare the affected object and user
B. valuate the potential faults that are raised for that EPG
C. xamine the health score and drill down to an object that affects the EPG combined score
D. nspect the server logs to see who was logging in to the APIC during the last few hours
عرض الإجابة
اجابة صحيحة: A
السؤال #66
An engineer has set the VMM resolution immediacy to pre-provision in a Cisco ACI environment. No Cisco Discovery Protocol neighborship has been formed between the hypervisors and the ACI fabric leaf nodes. How does this affect the download policies to the leaf switches?
A. o policies are downloaded because LLDP is the only supported discovery protocol
B. olicies are downloaded when the hypervisor host is connected to the VMM VDS
C. olicies are downloaded to the ACI leaf switch regardless of Cisco Discovery Protocol neighborship
D. o policies are downloaded because there is no discovery protocol neighborship
عرض الإجابة
اجابة صحيحة: C
السؤال #67
Refer to the exhibit. Which two objects are created as a result of the configuration? (Choose two.)
A. 2 unknown unicast: flood
B. ARP based detection
C. nicast routing
D. ubnet scope
عرض الإجابة
اجابة صحيحة: CE
السؤال #68
Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?
A. he source MAC address of the traffic is learned as a local endpoint
B. he source MAC address of the traffic is learned as a remote endpoint
C. he source IP address of the traffic is learned as a remote endpoint
D. he source IP address of the traffic is learned as a local endpoint
عرض الإجابة
اجابة صحيحة: B
السؤال #69
An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics?
A. ll EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected
B. isco ACI does not capture statistics at the EPG level
C. PG statistics can be collected only for VMM domains
D. he collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic
عرض الإجابة
اجابة صحيحة: A
السؤال #70
Where is the COOP database located?
A. eaf
B. pine
C. PIC
D. ndpoint
عرض الإجابة
اجابة صحيحة: B
السؤال #71
A network engineer demonstrates Cisco ACI to a customer. One of the test cases is to validate a disaster recovery event by resetting the ACI fabric to factory and then restoring the fabric to the state it was in before the event. Which setting must be enabled on ACI to export all configuration parameters that are necessary to meet these requirements?
A. nabled AES encryption
B. enerated a tech-support file
C. ncrypted export destination
D. nabled JSON format export
عرض الإجابة
اجابة صحيحة: A
السؤال #72
What are two descriptions of ACI Multi-Site? (Choose two.)
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: DE
السؤال #73
Which two protocols support accessing backup files on a remote location from the APIC? (Choose two.)
A. isco-security domain
B. isco-auth-features
C. isco-aci-role
D. isco-av-pair
عرض الإجابة
اجابة صحيحة: BC
السؤال #74
A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements?
A. onfigure ACI Service Graph with Unidirectional PBR
B. mplement ACI Service Graph with GIPo
C. mplement ACI Service Graph Two Nodes with GIPo
D. onfigure ACI Service Graph with Symmetric PBR
عرض الإجابة
اجابة صحيحة: D
السؤال #75
An engineer wants to filter the System Faults page and view only the active faults that are present in the Cisco ACI fabric. Which two lifecycle stages must be selected for filtering? (Choose two.)
A. olicy in the management tenant
B. CL on the console interface
C. CL on the management interface of the APIC
D. olicy on the management VLAN
عرض الإجابة
اجابة صحيحة: AD
السؤال #76
Refer to the exhibit. An engineer must implement the inter-tenant service graph. Which set of actions must be taken to accomplish this goal?
A. Define the contract in the provider tenant and export it to the consumer tenant
B. Define the contract in the provider tenant and export it to the consumer tenant
C. Define the contract in the provider tenant and export it to the provider tenant
D. Define the contract in the provider tenant and export it to the provider tenant
عرض الإجابة
اجابة صحيحة: B
السؤال #77
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?
A. orwarding: Custom L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled
B. orwarding: Custom L2 Unknown Unicast: Flood L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Enabled
C. orwarding: Custom L2 Unknown Unicast: Hardware Proxy L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled
D. orwarding: Custom L2 Unknown Unicast: Flood L3 Unknown Multicast Flooding: Flood Multi Destination Flooding: Flood in BD ARP Flooding: Disabled
عرض الإجابة
اجابة صحيحة: C
السؤال #78
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?
A. ndpoints must connect directly to the ACI leaf port
B. xternal endpoints are in a different bridge domain than the endpoints in the fabric
C. ndpoint learning encompasses the MAC address only
D. xternal endpoints are in the same EPG as the directly attached endpoints
عرض الإجابة
اجابة صحيحة: D
السؤال #79
An engineer is implementing a Cisco ACI environment that consists of more than 20 servers. Two of the servers support only Cisco Discovery Protocol with no order link discovery protocol. The engineer wants the servers to be discovered automatically by the Cisco ACI fabric when connected. Which action must be taken to meet this requirement?
A. reate an override policy that enables Cisco Discovery Protocol after LLDP is enabled in the default policy group
B. onfigure a higher order interface policy that enables Cisco Discovery Protocol for the interface on the desired leaf switch
C. onfigure a lower order policy group that enables Cisco Discovery Protocol for the interface on the desired leaf switch
D. reate an interface profile for the interface that disables LLDP on the desired switch that is referenced by the interface policy group
عرض الإجابة
اجابة صحيحة: B
السؤال #80
A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #81
DRAG DROP (Drag and Drop is not supported)Drag and drop the Cisco ACI filter entry options from the left onto the correct categories on the right indicating what are required or optional parameters.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #82
Refer to the exhibit. A Cisco ACI fabric is using out-of-band management connectivity. The APIC must access a routable host with an IP address of 192.168.11.2. Which action accomplishes this goal?
A. hange the switch APIC Connectivity Preference to in-band management
B. odify the Pod Profile to use the default Management Access Policy
C. dd a Fabric Access Policy to allow management connections
D. emove the in-band management address from the APIC
عرض الإجابة
اجابة صحيحة: D
السؤال #83
All workloads in VLAN 1001 have been migrated into EPG-1001. The requirement is to move the gateway address for VLAN 1001 from the core outside the Cisco ACI fabric into the Cisco ACI fabric. The endpoints in EPG-1001 must route traffic to endpoints in other EPGs and minimize flooded traffic in the fabric. Which configuration set is needed on the bridge domain to meet these requirements?
A. nable FloodEnable Unicast Routing
B. isable Local IP Learning LimitDisable Unicast Routing
C. isable ARP FloodDisable Limit Endpoint Learning
D. nable Hardware ProxyEnable Unicast Routing
عرض الإجابة
اجابة صحيحة: D
السؤال #84
An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy?
A. ACP Active
B. AC Pinning
C. ACP Passive
D. AC Pinning-Physical-NIC-load
عرض الإجابة
اجابة صحيحة: B
السؤال #85
Refer to the exhibit. A systems engineer is implementing the Cisco ACI fabric. However, the Server2 information is missing from the Leaf 101 endpoint table and the COOP database of the spine. The requirement is for the bridge domain configuration to enforce the ACI fabric to forward the unicast packets generated by Server1 destined to Server2. Which action must be taken to meet these requirements?
A. nable ARP Flooding
B. et L2 Unknown Unicast to Flood
C. et IP Data-Plane Learning to No
D. nable Unicast Routing
عرض الإجابة
اجابة صحيحة: B
السؤال #86
What is MP-BGP used for in Cisco ACI fabric?
A. P-BGP VPNv4 AF is used as protocol on L3Out between a border leaf and an external router
B. P-BGP Layer 2 VPN EVPN AF is used to propagate L3Out routes that are received from a border leaf
C. P-BGP VPNv4 AF is used to propagate L3Out routes that are received from a border leaf to the fabric
D. P-BGP VPNv4 AF is used between spines in an ACI Multi-Pod fabric to propagate the endpoint
عرض الإجابة
اجابة صحيحة: C
السؤال #87
New ESXi hosts are procured in a data center compute expansion project. An engineer must update the configuration on the Cisco APIC controllers to support the addition of the new servers to the existing VMM domain. Which action should be taken to support this change?
A. reate a range of internal VLANs in the associated VLAN pool
B. et the encapsulation mode as VXLAN
C. nable infrastructure VLAN in the associated AEP
D. ap the leaf interface selector to the AEP that is associated with the VMM domain
عرض الإجابة
اجابة صحيحة: D
السؤال #88
Which action sets Layer 2 loop migration in an ACI Fabric with a Layer 2 Out configured?
A. nable MCP on the ACI fabric
B. isable STP in the external network
C. isable STP on the ACI fabric
D. nable STP on the ACI fabric
عرض الإجابة
اجابة صحيحة: A
السؤال #89
The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI leaf to learn a source IP as a local endpoint? (Choose two.)
A. hen VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range
B. hen VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range
C. hen VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range
D. hen VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range
عرض الإجابة
اجابة صحيحة: BE
السؤال #90
An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.)
A. et L2 Unknown Unicast to Flood
B. et L2 Unknown Unicast to Hardware Proxy
C. isable Unicast Routing
D. nable ARP Flooding
عرض الإجابة
اجابة صحيحة: ABD
السؤال #91
An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?
A. PDU Guard
B. er-VLAN MCP
C. torm Control
D. PDU Filter
عرض الإجابة
اجابة صحيحة: B
السؤال #92
Refer to the exhibit. An engineer configures an L3Out but receives the error presented. Which action clears the fault?
A. cknowledge the QoS-related error
B. ssociate a custom QoS class
C. reate a custom QoS policy
D. et the QoS policy to Level 3
عرض الإجابة
اجابة صحيحة: A
السؤال #93
Which type of profile needs to be created to deploy an access port policy group?
A. ttachable entity
B. od
C. odule
D. eaf interface
عرض الإجابة
اجابة صحيحة: A
السؤال #94
An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?
A. nder the Create Remote location settings, select Protocol: FTPUnder the Export policy, selectFormat: XMLModify Global AES Encryption Settings: Enabled
B. nder the Create Remote location settings, select Protocol: FTPUnder the Export policy, selectFormat: XMLModify Global AES Encryption Settings: Disabled
C. nder the Create Remote location settings, select Protocol: SCPUnder the Export policy, select -Format: JSONModify Global AES Encryption Settings: Disabled
D. nder the Create Remote location settings, select Protocol: SCPUnder the Export policy, select -Format: JSONModify Global AES Encryption Settings: Enabled
عرض الإجابة
اجابة صحيحة: D
السؤال #95
In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?
A. ndpoint information is not exchanged across sites unless COOP protocol is used
B. ndpoint information is not exchanged across sites unless a policy is configured to allow communication across sites
C. ndpoint information is exchanged across sites as soon as the endpoint is discovered in one site
D. ndpoint information is exchanged across sites when the endpoints are discovered in both sites
عرض الإجابة
اجابة صحيحة: A
السؤال #96
When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?
A. onfigure a Layer 2 external bridged network on the interfaces facing the MST switches
B. nable the native VLAN on the interfaces facing the MST switches using static ports in a dedicated EPG
C. nable BPDU filter under the STP interface policy on the interfaces facing the MST switches
D. onfigure the STP instance to VLAN mapping under the switch STP policy
عرض الإجابة
اجابة صحيحة: B
السؤال #97
An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used?
A. nterface policy group
B. witch policy group
C. witch profile
D. nterface profile
عرض الإجابة
اجابة صحيحة: A
السؤال #98
A RADIUS user resolves its role via the Cisco AV Pair. What object does the Cisco AV Pair resolve to?
A. enant
B. ecurity domain
C. rimary Cisco APIC
D. anaged object class
عرض الإجابة
اجابة صحيحة: D
السؤال #99
When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?
A. ithin the bridge domain
B. ithin the APIC
C. ithin the access encap VLAN
D. etween all the spine and leaf switches
عرض الإجابة
اجابة صحيحة: A
السؤال #100
An engineer must configure a group of servers with a contract that uses TCP port 80. The EPG that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements?
A. onfigure the EPG as a provider and L3 out as consumer of the contract
B. onfigure OSPF to exchange routes between the L3 out and EPG
C. onfigure a taboo contract and apply it to the EPG
D. onfigure the EPG as a consumer and L3 out as a provider of the contract
عرض الإجابة
اجابة صحيحة: A
السؤال #101
Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment?
A. OLF
B. ulti-Site
C. ulti-Pod
D. tretched Fabric
عرض الإجابة
اجابة صحيحة: B
السؤال #102
Refer to the exhibit. A customer must back up the current Cisco ACI configuration securely to the remote location using encryption and authentication. The backup job must run once per day. The customer’s security policy mandates that any sensitive information including passwords must not be exported from the device. Which set of steps meets these requirements?
A. xport destination using FTP protocol
B. xport destination using FTP protocol
C. xport destination using SCP protocol
D. xport destination using SCP protocol
عرض الإجابة
اجابة صحيحة: C
السؤال #103
A Cisco APIC is configured with RADIUS authentication as the default. The network administrator must ensure that users can access the APIC GUI with a local account if the RADIUS server is unreachable. Which action must be taken to accomplish this goal?
A. ssociate console authentication with the “RADIUS” realm
B. eference the “local” realm in the fallback domain
C. reate an additional login domain that references local accounts
D. nable the fallback check with the default authentication domain
عرض الإجابة
اجابة صحيحة: B
السؤال #104
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?
A. nspect event records in the APIC UI to see all actions performed by users
B. nspect /var/log/audit_messages on the APIC to see a record of all user actions
C. nspect audit logs in the APIC UI to see all user events
D. nspect the output of show command history in the APIC CLI
عرض الإجابة
اجابة صحيحة: C
السؤال #105
What represents the unique identifier of an ACI object?
A. LAN pool
B. anagement contract
C. anagement tenant
D. ridge domain
عرض الإجابة
اجابة صحيحة: D
السؤال #106
What is the minimum number of APICs does Cisco recommend to deploy in a production cluster?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #107
An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?
A. pply a BGP route reflector policy
B. nable a COOP policy
C. onfigure an IS-IS policy
D. mplement an access management policy
عرض الإجابة
اجابة صحيحة: B
السؤال #108
Regarding the MTU value of MP-BGP EVPN control plane packets in Cisco ACI, which statement about communication between spine nodes in different sites is true?
A. y default, spine nodes generate 9000-bytes packets to exchange endpoints routing information
B. y default, spine nodes generate 1500-bytes packets to exchange endpoints routing information
C. y default, spine nodes generate 1500-bytes packets to exchange endpoints routing information
D. y default, spine nodes generate 9000-bytes packets to exchange endpoints routing information
عرض الإجابة
اجابة صحيحة: D
السؤال #109
An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain. Which action must be completed in this scenario?
A. he Management VMkernel EPG resolution must be set to Pre-Provision
B. he administrator must create an in-band VMM Management EPG before performing the migration
C. he administrator must set the Management VMkernel BD resolution immediacy to On-Demand
D. he VMkernel Management BD must be located under the Management Tenant
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: