An engineer created a monitoring policy called Test in a Cisco ACI fabric and had to change the severity level of the monitored object Call home source. Which set of actions prevent the event from appearing in event reports?
ASelect Faults Severity Assignment Policies.Set severity level to cleared.
BSelect Event Severity Assignment Policies.Set severity level to squelched.
CSelect Faults Severity Assignment Policies.Set severity level to squelched.
DSelect Event Severity Assignment Policies.Set severity level to cleared.
What is the result of the pcEnPref flag configured on the epg-App_EPG?
AAny configuration changes to the private network are validated.
BAccess control rules for the L3Out network are applied.
CAccess control rules for the private network are applied.
DAny changes to the underlying EPG objects are forbidden.
A network engineer implements an L3Out inside the Cisco ACI fabric. The engineer plans to connect a Cisco ACI leaf switch to a switch outside of the Cisco ACI fabric to exchange routes via a routing protocol. The external switch interface is configured with IP address 192.168.15.1/30. The ACI engineer wants to use a routing protocol that uses a hierarchical network design. The Cisco ACI fabric should use the L3Out to access the Internet. Which set of steps must be taken to meet these requirements?
ASet up the BGP Protocol policy with the appropriate Autonomous System number.Create the Routed Outside object and Node profile, selecting BGP as the routing protocol.Build the Interface profile, selecting SVI and the appropriate VPC.Configure the 0.0.0.0/32 network as part of the External Network object.
BSet up the EIGRP Protocol policy with the selected Autonomous System number.Set up the Routed External Network object and Node profile, selecting EIGRP.Create the Switch profile, selecting VPC and the appropriate interfaces.Create the default network and associate it with the Routed Outside object.
CSet up the EIGRP Protocol policy with the selected Autonomous System number.Configure an Interface policy and an External Bridged Domain.Create an External Bridged Network using the configured VLAN pool.Build the Leaf profile, selecting Routed Sub-Interface and the appropriate VLAN.
DConfigure the OSPF Protocol policy with an area of 0.Create the Routed Outside object and Node profile, selecting OSPF as the routing protocol.Build the Interface profiles, selecting Routed Interface and the appropriate interface.Set up the External Network object with a network of 0.0.0.0/0.
Refer to the exhibit. Cisco ACI fabric is connected to a Cisco Catalyst 3850 Series Switch using EBGP. Server 2 is unable to communicate with Server 1. Leaf-2 fails to learn the external subnet 10.2.2.0/24 and other external subnets from other L3Outs. Which configuration ensures that the networks from Leaf-2 are learned by the external network?
AConfigure 10.2.2.0/24 under the external EPG of the L3Out.
BImplement a contract between the Server 2 EPG and the L3Out.
CImplement the bridge domain to advertise the bridge domain subnet.
DConfigure Spine-1 as the MP-BGP route reflector.
Refer to the exhibit. An engineer plans to upgrade the Cisco ACI fabric. Leaf1 and Leaf2 are deployed in a VPC. The fabric is peering with R1 using BGP protocol. Which two actions upgrade the fabric nondisruptively? (Choose two.)
AConfigure the Graceful upgrade option.
BDisable the BGP neighborship between Cisco ACI fabric and R1.
CEnable the Graceful Insertion and Removal option.
DConfigure one maintenance group for every leaf.
ECreate one update group for all spines.
Refer to the exhibit. An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements?
ASet L2 Unknown Unicast to Flood.
BSet L2 Unknown Unicast to Hardware Proxy.
CDisable Unicast Routing.
DEnable ARP Flooding.
An engineer must perform a Cisco ACI fabric upgrade that minimizes the impact on user traffic and allows only permitted users to perform an upgrade. Which two configuration steps should be taken to meet these requirements? (Choose two.)
AGrant tenant-ext-admin access to a user who performs an upgrade
BDivide Cisco APIC controllers into two or more maintenance groups
CCombine all switches into an upgrade group
DGrant the fabric administrator role to a user who performs an upgrade
EDivide switches into two or more maintenance groups
Refer to the exhibit. Which Adjacency Type value should be set when the client endpoint and the service node interface are in a different subnet?
ARouted
BUnicast
CL3Out
DL3
Refer to the exhibit. A Cisco APIC raises this fault when connectivity for EPG-3 is configured. Which action clears the fault?
AAssociate BD-3 to VRF-1.
BImplement a domain for EPG-3.
CConfigure a subnet on BD-3.
DCreate BD-3 for EPG-3.
Which description regarding the initial APIC cluster discovery process is true?
AThe APIC uses an internal IP address from a pool to communicate with the nodes.
BEvery switch is assigned a unique AV by the APIC.
CThe APIC discovers the IP address of the other APIC controllers by using Cisco Discovery Protocol.
DThe ACI fabric is discovered starting with the spine switches.
An ACI administrator notices a change in the behavior of the fabric. Which action must be taken to determine if a human intervention introduced the change?
AInspect event records in the APIC UI to see all actions performed by users.
BInspect /var/log/audit_messages on the APIC to see a record of all user actions.
CInspect audit logs in the APIC UI to see all user events.
DInspect the output of show command history in the APIC CLI.
Which components must be configured for the BGP Route Reflector policy to take effect?
Aspine fabric interface overrides and profiles
Baccess policies and profiles
Cpod policy groups and profiles
Dleaf fabric interface overrides and profiles
DRAG DROP -
An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.
Select and Place:
An engineer configured a bridge domain with the hardware-proxy option for Layer 2 unknown unicast traffic. Which statement is true about this configuration?
AThe leaf switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the local forwarding tables.
BThe Layer 2 unknown hardware proxy lacks support of the topology change notification.
CThe leaf switch forwards the Layers 2 unknown unicast packets to all other leaf switches if it is unable to find the MAC address in its local forwarding tables.
DThe spine switch drops the Layer 2 unknown unicast packet if it is unable to find the MAC address in the proxy database.
A data center administrator is upgrading an ACI fabric. There are 3 APIC controllers in the fabric and all the servers are dual-homed to pairs of leaf switches configured in VPC mode. How should the fabric be upgraded to minimize possible traffic impact during the upgrade?
A
Create two maintenance groups for the APIC controllers: VPC left and VPC right. 2. Upgrade the first group of controllers. 3. Upgrade the second group of controllers. 4. Upgrade the leaf switches.
B
Create two maintenance groups for APIC controllers: VPC left and VPC right. 2. Upgrade the leaf switches. 3. Upgrade the first group of controllers. 4. Upgrade the second group of controllers.
C
Create two maintenance groups for the leaf switches: VPC left and VPC right. 2. Upgrade the APIC controllers. 3. Upgrade the first group of leaf switches. 4. Upgrade the second group of leaf switches.
D
Create two maintenance groups for the leaf switches: VPC left and VPC right. 2. Upgrade the first group of switches. 3. Upgrade the second group of switches. 4. Upgrade the APIC controllers.
What are two requirements for the IPN network when implementing a Multi-Pod ACI fabric? (Choose two.)
AEIGRP routing
BPIM ASM multicast routing
CBGP routing
DVLAN ID 4
EOSPF routing
A Solutions Architect is asked to design two data centers based on Cisco ACI technology that can extend L2/L3, VXLAN, and network policy across locations. ACI
Multi-Pod has been selected. Which two requirements must be considered in this design? (Choose two.)
AACI underlay protocols, i.e. COOP, IS-IS and MP-BGP, spans across pods. Create QoS policies to make sure those protocols have higher priority.
BA single APIC Cluster is required in a Multi-Pod design. It is important to place the APIC Controllers in different locations in order to maximize redundancy and reliability.
CACI Multi-Pod requires an IP Network supporting PIM-Bidir.
DACI Multi-Pod does not support Firewall Clusters across Pods. Firewall Clusters should always be local.
EMulti-Pod requires multiple APIC Controller Clusters, one per pod. Make sure those clusters can communicate to each other through a highly available connection.
When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?
Alimit IP learning to subnet
Bscope
Cgateway IP
Dsubnet control
Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)
Aextending the routed domain out of the ACI fabric
Bcreating a single homed Layer 3 Out
Ccreating an external physical network
Dextending the bridge domain out of the ACI fabric
Eextending the EPG out of the ACI fabric
When Cisco ACI connects to an outside Layers 2 network, where does the ACI fabric flood the STP BPDU frame?
Awithin the bridge domain
Bwithin the APIC
Cwithin the access encap VLAN
Dbetween all the spine and leaf switches
An engineer must connect Cisco ACI fabric using Layer 2 with external third-party switches. The third-party switches are configured using 802.1s protocol. Which two constructs are required to complete the task? (Choose two.)
Aspanning tree policy for mapping MST Instances to VLANs
BMCP policy with PDU per VLAN enabled
CMCP instance policy with administrative slate disabled
Ddedicated EPG for native VLAN
Estatic binding of native VLAN in all existing EPGs
Refer to the exhibit. An engineer is integrating a VMware vCenter with Cisco ACI VMM domain configuration. ACI creates port-group names with the format of
"Tenant | Application | EPG". Which configuration option is used to generate port groups with names formatted as "Tenant=Application=EPG"?
Aenable tag collection
Bsecurity domains
Cdelimiter
Dvirtual switch name
An engineer is extending an EPG out of the ACI fabric using static path binding. Which statement about the endpoints is true?
AEndpoints must connect directly to the ACI leaf port.
BExternal endpoints are in a different bridge domain than the endpoints in the fabric.
CEndpoint learning encompasses the MAC address only.
DExternal endpoints are in the same EPG as the directly attached endpoints.
In the context of ACI Multi-Site, when is the information of an endpoint (MAC/IP) that belongs to site 1 advertised to site 2 using the EVPN control plane?
AEndpoint information is not exchanged across sites unless COOP protocol is used.
BEndpoint information is not exchanged across sites unless a policy is configured to allow communication across sites.
CEndpoint information is exchanged across sites as soon as the endpoint is discovered in one site.
DEndpoint information is exchanged across sites when the endpoints are discovered in both sites.
When the subnet is configured on a bridge domain, on which physical devices is the gateway IP address configured?
Aall leaf switches and all spine nodes
Bonly spine switches where the bridge domain of the tenant is present
Conly leaf switches where the bridge domain of the tenant is present
Dall border leaf nodes where the bridge domain of the tenant is present