Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-630 - Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA)

Page: 3 / 4
Total 119 questions

Refer to the exhibit.

Which two configuration steps are required in ISN for Cisco ACI Multi-Site setup? (Choose two.)

A.

Connect Spine2 to ISN routers.

B.

Configure BIDIR-PIM throughout the ISN

C.

Increase ISN MTU to support the maximum MTU that is sent by endpoints

D.

Configure OSPF between spines and ISN routers

E.

Enable IGMPv3 on ISN routers

An engineer implements the Cisco ACI solution and needs to confirm that the leaf switch correctly learns the remote endpoint MAC. Which information must be included in the VXLAN packet that is received from the Cisco ACI spine for the Cisco ACI leaf to learn MAC as a remote endpoint?

A.

VRF

B.

application profile

C.

bridge domain

D.

EPG

Refer to the exhibit. Drag and drop the subnets and flags from the left into the External Network Instance Profile policies on the right to create a setup that advertises only 10.10.0.0/24 and 10.10.1.0/24 prefixes in VRF1 and establishes connectivity between VRFs. Not all options are used.

Refer to the exhibit.

Which configuration must be implemented on L3Out EBGP to advertise out of the fabric 172.16.2.0/24 network that is learned from L3Out OSPF?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

In a Cisco ACI Multi-Site deployment, traffic fails to pass between Site-A and Site-B. and an engineer troubleshoots the link between ISN-01 and Node-201. Which set of actions establishes connectivity?

A.

• Configure the MTU on the link to be at least 1000 bytes larger than the MTU of the ACI fabrics.

• Configure the link as a routed subinteriace by using VLAN-4.

B.

• Configure the MTU on the link to be at least 100 bytes larger than the MTU of the ACI fabrics.

• Configure the link as an access interface by using VLAN-4.

C.

• Configure the MTU on the link to be at least 100 bytes larger than the MTU of the ACI fabrics.

• Configure the link as a routed subinterface by using VLAN-4.

D.

• Configure the MTU on the link to be at least 1000 bytes larger than the MTU of the ACI fabrics.

• Configure the link as an access interface by using VLAN-4.

How is the traffic directed to the firewall pair in a two-site Multi-Pod deployment with an active/standby firewall pair stretched across pods?

A.

to the pod with the active service node

B.

to a collector in the Inter-Pod Network

C.

to the pod designated as the primary pod

D.

to the local service node for processing

Which firewall connection allows for the integration of service nodes in transparent mode with a Cisco ACI Multi-Pod setup?

A.

active-standby mode across pods

B.

active-active mode per pods for communication between internal endpoints

C.

active-standby mode per pods for communication between endpoints and external networks

D.

active-active mode across pods

Refer to the exhibit.

An engineer must have communication between EPG1 in VRF1 and External EPG in VRF2. Which three actions should be taken for the defined subnets in the L3Out External EPG to accomplish this goal? (Choose three.)

A.

Enable Shared Route Control Subnet

B.

Enable External Subnets for External EPG

C.

Enable Export Route Control Subnet

D.

Enable Shared Security Import Subnet

E.

Enable Aggregate Shared Routes

F.

Enable Import Route Control Subnet

Refer to the exhibit.

Which type of design approach is shown?

A.

traditional VLAN/subnet model

B.

edge-core-edge model

C.

application-centric

D.

network-centric

Refer to the exhibit.

The external subnet and internal EPG1 must communicate with each other, and the L30ut traffic must leak Into the VRF named "VF1". Which configuration set accomplishes these goals?

A.

External Subnets for External EPG Import Route Control Subnet Shared Route Control Subnet

B.

External Subnets for External EPG Shared Route Control Subnet Shared Security Import Subnet

C.

Export Route Control Subnet Shared Security Import Subnet Aggregate Shared Routes

D.

Export Route Control Subnet Import Route Control Subnet Aggregate Shared Routes