What does a bridge domain represent?
A. Layer 3 cloud
B. Layer 2 forwarding construct
C. tenant
D. physical domain
An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group?
A. Enable the Export Route Control Subnet for the External Endpoint Group flag.
B. Enable an L3Out with Shared Route Control Subnet.
C. Configure subnets with the External Subnets for External EPG flag enabled.
D. Configure subnets with the Import Route Control Subnet flag enabled.
A network engineer must configure a Cisco ACI system to detect network loops for untagged and tagged traffic. The loop must be detected and stopped by disabling an interface within 4 seconds. Which configuration must be used?
A. Option A
B. Option B
C. Option C
D. Option D
Which two dynamic routing protocols are supported when using Cisco ACI to connect to an external Layer 3 network? (Choose two.)
A. iBGP
B. VXLAN
C. IS-IS
D. RIPv2
E. eBGP
An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements?
A. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select
-Format: XML
-Modify Global AES Encryption Settings: Enabled
B. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select
-Format: XML
-Modify Global AES Encryption Settings: Disabled
C. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select
-Format: JSON
-Modify Global AES Encryption Settings: Disabled
D. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select
-Format: JSON
-Modify Global AES Encryption Settings: Enabled
A customer must deploy three Cisco ACI based data centers. Each site must be separated from the others. Which characteristic of Cisco ACI Multi-Pod makes it unsuitable for this deployment?
A. creates a virtual pod in the remote location
B. requires all pods to share the same Cisco APIC cluster
C. has distance and scale limitations
D. places leaf switches in the remote site that belong to the same fabric as at the headquarters site
Refer to the exhibit.
The external subnet and internal EPG1 must communicate with each other, and the L3Out traffic must leak into the VRF named "VF1". Which configuration set accomplishes these goals?
A. Export Route Control Subnet Import Route Control Subnet Aggregate Shared Routes
B. External Subnets for External EPG Shared Route Control Subnet Shared Security Import Subnet
C. External Subnets for External EPG Import Route Control Subnet Shared Route Control Subnet
D. Export Route Control Subnet Shared Security Import Subnet Aggregate Shared Routes
An engineer configures a Cisco ACI Multi-Pod for disaster recovery. Which action should be taken for the new nodes to be discoverable by the existing Cisco APICs?
A. Configure IGMPv3 on the interfaces of IPN routers that face the Cisco ACI spine.
B. Enable subinterfaces with dot1q tagging on all links between the IPN routers.
C. Enable DHCP relay on all links that are connected to Cisco ACI spines on IPN devices.
D. Configure BGP as the underlay protocol in IPN.
Refer to the exhibit.
An engineer is migrating legacy servers into the Cisco ACI environment. The requirement is to ensure that all endpoints and MAC addresses are learned properly in legacy and Cisco ACI switches. Which configuration set must be configured under the bridge domain called bd_360 to accomplish this goal?
A. L2 Unknown Unicast: Hardware Proxy ARP Flooding: Disabled
B. L2 Unknown Unicast: Flood ARP Flooding: Enabled
C. L2 Unknown Unicast: Hardware Proxy ARP Flooding: Enabled
D. L2 Unknown Unicast: Flood ARP Flooding: Disabled
For which type of endpoint entry does a Cisco ACI leaf switch keep the original TEP source address instead of rewriting the outer source IP address to its TEP address?
A. local entry
B. remote entry
C. bounce entry
D. COOP entry