When creating a subnet within a bridge domain, which configuration option is used to specify the network visibility of the subnet?
A. limit IP learning to subnet
B. scope
C. gateway IP
D. subnet control
An engineer must connect a new host to port 1/1 on Leaf 101. A Cisco ACI fabric has an MCP policy configured but experiences excessive Layer 2 loops. The engineer wants the Cisco ACI fabric to detect and prevent Layer 2 loops in the fabric. Which set of actions accomplishes these goals?
A. Enable MCP locally. Associate the MCP policy with an interface policy group.
B. Enable MCP locally. Associate the MCP policy with an interface profile.
C. Enable MCP globally. Associate the MCP policy with an interface selector.
D. Enable MCP globally. Associate the MCP policy with an interface policy group.
Which endpoint learning operation is completed on the ingress leaf switch when traffic is received from a Layer 3 Out?
A. The source MAC address of the traffic is learned as a local endpoint.
B. The source MAC address of the traffic is learned as a remote endpoint.
C. The source IP address of the traffic is learned as a remote endpoint.
D. The source IP address of the traffic is learned as a local endpoint.
What must be enabled in the bridge domain to have the endpoint table learn the IP addresses of endpoints?
A. L2 unknown unicast: flood
B. GARP based detection
C. unicast routing
D. subnet scope
An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?
A. Enable the Export Route Control Subnet for the External Endpoint Group flag.
B. Enable an L3Out with Shared Route Control Subnet.
C. Configure subnets with the External Subnets for External EPG flag enabled.
D. Configure subnets with the Import Route Control Subnet flag enabled.
Which two actions extend a Layer 2 domain beyond the ACI fabric? (Choose two.)
A. extending the routed domain out of the ACI fabric
B. creating a single homed Layer 3 Out
C. creating an external physical network
D. extending the bridge domain out of the ACI fabric
E. extending the EPG out of the ACI fabric
A network engineer must integrate VMware vCenter cluster with Cisco ACI. The requirement is for the management traffic of the hypervisors and VM controllers to use the virtual switch associated with the Cisco Application Policy. The EPG called "Vmware-MGMT" with VLAN 300 has been created for this purpose. Which set of steps must be taken to complete the configuration?
A. Add VLAN 300 with static allocation to the VLAN POOL that is used for VMM integration. Attach the VMM domain to the target EPG with resolution preprovision, mode static, untagged access VLAN, and Port-Encap 300.
B. Associate the target EPG with the VMM domain with default settings. Enable Infrastructure VLAN on AAEP used toward VMware hypervisors.
C. Enable Infrastructure VLAN on AAEP used toward VMware hypervisors. Associate the target EPG with the VMM domain with default settings.
D. Enable Infrastructure VLAN on AAEP used toward VMware hypervisors. Create a static binding in the target EPG toward VMware hypervisors with VLAN 300, untagged access VLAN, and Untagged 802.1P mode.
An engineer configures a one-armed policy-based redirect service Insertion for an unmanaged firewall. The engineer configures these Cisco ACI objects:
1.
a contract named All_Traffic_Allowed
2.
a Layer 4 to Layer 7 device named FW-Device
3.
a policy-based redirect policy named FW-1Arm-Policy-Based RedirectPolicy
Which configuration set redirects the traffic to the firewall?
A. Configure a policy-based redirect subject. Associate the policy-based redirect subject with All_Traffic_Allowed.
B. Configure a firewall bridge domain. Associate the bridge domain with FW-Device.
C. Configure a device interface policy. Associate the device interface policy with FW-Device.
D. Configure a service graph. Associate the service graph with All_Traffic_Allowed.
A recent set of changes by a Cisco ACI administrator corrupted the APIC cluster. The ACI engineer must restore the configuration of the previous day. The APIC nodes in the cluster can communicate but fail to connect with other networks. The administrator plans to overwrite the entire existing configuration with the backup configuration. Which set of actions accomplishes this task?
A. Restore using the last configuration on the factory-reset APIC. Use an import policy set to Best-effort.
B. Roll back the configuration using a local snapshot. Use an import policy set to Atomic Replace.
C. Roll back the configuration using a local snapshot. Use an import policy set to Best-effort Merge.
D. Restore the configuration imported from an FTP server. Use an import policy set to Atomic.
Which two actions does the Cisco ACI take when a bridge domain is configured with a subnet and unicast routing is enabled? (Choose two.)
A. enables routing to and from that subnet
B. disables the ARP flooding feature
C. learns MAC and IP addresses
D. stops remote endpoint learning
E. discovers endpoints from data plane learning only