On which two interface types should a user configure storm control to protect against broadcast traffic? (Choose two.)
A. APIC facing interfaces
B. port channel on a single leaf switch
C. all interfaces on the leaf switches in the fabric
D. endpoint-facing trunk interface
E. fabric uplink interfaces on the leaf switches
The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI leaf to learn a source IP as a local endpoint? (Choose two.)
A. Through Ethernet traffic received in a bridge domain.
B. IP traffic routed through an SVI.
C. Through VXLAN traffic received on the uplink.
D. IP traffic routed through a Layer 3 Out.
E. Through ARP received on an SVI.
An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?
A. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select
-Format: XML
-Modify Global AES Encryption Settings: Enabled
B. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select
-Format: XML
-Modify Global AES Encryption Settings: Disabled
C. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select
-Format: JSON
-Modify Global AES Encryption Settings: Disabled
D. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select
-Format: JSON
-Modify Global AES Encryption Settings: Enabled
An engineer must securely export Cisco APIC configuration snapshots to a secure, offsite location The exported configuration must be transferred using an encrypted tunnel and encoded with a platform-agnostic data format that provides namespace support. Which configuration set must be used?
A. Policy: Export Policy Protocol: TLS Format: JSON
B. Policy: Import Policy Protocol: TLS Format: XML
C. Policy: Import Policy Protocol: SCP Format: JSON
D. Policy: Export Policy Protocol: SCP Format: XML
What do Pods use to allow Pod-to-Pod communication in a Cisco ACI Multi-Pod environment?
A. over Layer 3 directly connected back-to-back spines
B. over Layer 3 Out connectivity via border leafs
C. over Layer 3 IPN connectivity via border leafs
D. over Layer 3 IPN connectivity via spines
An engineer must configure a Layer 3 connection to the WAN router. The hosts in production VRF must access WAN subnets. The engineer associates EPGs in the production VRF with the external routed domain. Which action completes the task?
A. Configure the Export Route Control Subnet scope for the external EPG.
B. Configure the External Subnets for the External EPG scope for the external EPG.
C. Configure the Import Route Control Subnet scope for the external EPG.
D. Configure the Shared Route Control Subnet scope for the external EPG.
What are two PBR characteristics of the Cisco ACI Active-Active Across Pods deployment mode in Cisco ACI Multi-Pod design? (Choose two.)
A. Traffic is dynamically redirected to the firewall that owns the connection.
B. Deployment occurs in transparent mode.
C. The connection state is unsynchronized.
D. Deployment occurs in go-to mode only.
E. This mode causes the traffic to flow asymmetrically.
Where are STP BPDUSs flooded in Cisco ACI fabric?
A. in the access encapsulation VLAN part of different VLAN pools
B. in the bridge domain VLAN
C. in the native VLAN ID
D. in the VNID that is assigned to the FD VLAN
An engineer plans a Cisco ACI firmware upgrade. The ACI fabric consists of three Cisco APIC controllers, two spine switches, and four leaf switches. Two leaf switches have 1-Gb copper ports for bare metal servers, and the other two leaf switches have 10-Gb SFP ports to connect storage. Which set of actions accomplishes an upgrade with minimal disruptions?
A. Upgrade the APIC controllers by selecting the desired firmware and choosing Upgrade Now. Divide the switches into two upgrade groups: spines and leaves. Start the firmware upgrade on the spine upgrade group and then proceed with the leaf upgrade group.
B. Upgrade the APIC controllers by initiating the upgrade process that uses the most recent uploaded firmware. Divide the switches into three upgrade groups: spines, 1-Gb switches, and 10-Gb switches. Start the firmware upgrade on the spine upgrade group and then proceed with the other two groups.
C. Upgrade the APIC controllers by selecting the desired firmware and choosing Upgrade Now.
Divide the switches into two upgrade groups with one spine, one 1-Gb switch, and one 10-Gb switch per group.
Start the firmware upgrade on the first upgrade group and when it finishes, start the second upgrade group.
D. Upgrade the APIC controllers as a single group by selecting the firmware and choosing Upgrade Now. Divide the switches into four upgrade groups with one switch per group. Start the firmware upgrade on each upgrade group in succession until all four are complete.
DRAG DROP
An engineer is configuring a VRF for a tenant named Cisco. Drag and drop the child objects on the left onto the correct containers on the right for this configuration.
Select and Place: