Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Leaf 1002 receives a packet from a host attached to Leaf1001. The packet contains the MAC address. IP address, and VRF of the source. Which information does each node learn?

A.

Leaf 1002 learns the IP address of the source.

Spine2001 learns the VRF of the source.

B.

Leaf 1002 learns the VRF of the source.

Leaf1002 learns the IP address of the source.

C.

Leaf1001 learns the MAC address of the source.

Leaf1002 learns the IP address of the source.

D.

Leaf1001 learns the IP address of the source.

Spine2001 learns the IP address of the source

An engineer Is configuring a Cisco ACI fabric and requires a shared L30ut network connectivity to external networks. The connectivity must be shared between different tenants. Which tenant type must be created to meet this requirement?

A.

common tenant

B.

infra tenant

C.

management tenant

D.

user tenant

An engineer designs a Cisco ACI Multi-Pod solution that requires a pair of active-standby firewalls in different pods for external connectivity. How should the firewalls be implemented?

A.

PBR for routed firewalls

B.

separate L3Out peerings for routed firewalls

C.

routed firewall for the default gateway

D.

transparent firewalls

Cisco ACI fabric is migrated from network-centric mode to application-centric mode. What is possible in an application-centric design?

A.

remapping of VLAN pools

B.

migration of bare metal servers to virtual machines

C.

creation of additional EPGs under one bridge domain

D.

Cisco ACI VMM integration with hypervisors

What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?

A.

A different MAC/IP combination can be configured for the firewall in each pod.

B.

The local pod anycast node is preferred by the local spines.

C.

A cluster can be deployed in transparent mode across pods.

D.

Local traffic in a pod is load-balanced between the clustered firewalls.

Refer to the exhibit.

The external subnet and internal EPG1 must communicate with each other, and the L30ut traffic must leak Into the VRF named "VF1". Which configuration set accomplishes these goals?

A.

External Subnets for External EPG Import Route Control Subnet Shared Route Control Subnet

B.

External Subnets for External EPG Shared Route Control Subnet Shared Security Import Subnet

C.

Export Route Control Subnet Shared Security Import Subnet Aggregate Shared Routes

D.

Export Route Control Subnet Import Route Control Subnet Aggregate Shared Routes

An organization deploys active-active data centers and active-standby firewalls in each data center. Which action should be taken in a Cisco ACI Multi-Pod to maintain traffic symmetry through the firewalls?

A.

Enable Endpoint Dataplane Learning

B.

Disable service node Health Tracking

C.

Enable Pod ID Aware Redirection

D.

Disable Resilient Hashing

Refer to the exhibit.

Which three actions should be taken to implement the vPC in the Cisco ACI fabric? (Choose three.)

A.

Select a common vPC interface policy group

B.

Select individual interface profiles

C.

Select common interface profiles

D.

Select individual switch profiles

E.

Select common switch profiles

How is broadcast forwarded in Cisco ACI Multi-Pod after ARP flooding is enabled?

A.

For the specific bridge domain, all spines forward the broadcast frames to IPN routers

B.

Broadcast frames are forwarded inside the pod and across the IPN using the multicast address that is associated to the bridge domain

C.

Within a pod, the ingress leaf switch floods the broadcast frame on all fabric ports

D.

Ingress replication is used on the spines to forward broadcast frames in the IPN infrastructure

A network engineer configured an active-active firewall cluster that is stretched across separate pods in the Cisco ACI fabric. Which two implementation setups for anycast services are available? (Choose two.)

A.

Modify the Cisco ACI contract scope

B.

Modify the MAC address on the second firewall

C.

Configure the firewalls behind an EPG subnet

D.

Deselect No Default SVI Gateway under EPG Subnet

E.

Deploy a Layer 4 to Layer 7 service graph with PBR