Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 600-660 - Implementing Cisco Application Centric Infrastructure - Advanced (600-660 DCACIA)

Page: 1 / 2
Total 60 questions

What is a design implication for Cisco ACI using an application-centric approach?

A.

Multiple VLANs and/or multiple EPGs are under one bridge domain

B.

VLAN numbers are in the names of the bridge domain and EPG objects

C.

One EPG is mapped to multiple bridge domains

D.

One VLAN equals one EPG equals one bridge domain

An engineer must migrate servers from a legacy data center infrastructure to a Cisco ACI fabric. Drag and drop the steps from the left into the order that they must be completed on the right to ensure the least amount of downtime.

Where are STP BPDUs flooded in Cisco ACI fabric?

A.

in the bridge domain VLAN

B.

in the native VLAN ID

C.

in the access encapsulation VLAN part of different VLAN pools

D.

in the VNID that is assigned to the FD VLAN

Refer to the exhibit.

How are the STP BPDUs forwarded over Cisco ACI fabric?

A.

STP BPDUs that are generated by Switch2 are received by Switch1 and Switch3.

B.

Cisco ACI fabric drops all STP BPDUs that are generated by the external switches.

C.

Cisco ACI acts as the STP root for all three external switches.

D.

STP BPDUs that are generated by Switch1 are received only by Switch3.

An engineer must limit local and remote endpoint learning to the bridge domain subnet. Which action should be taken inside the Cisco APIC?

A.

Disable Remote EP Learn

B.

Enable Enforce Subnet Check

C.

Disable Endpoint Dataplane Learning

D.

Enable Limit IP Learning to Subnet

Which two actions are the Cisco best practices to configure NIC teaming load balancing for Cisco UCS B- Series blades that are connected to the Cisco ACI leaf switches? (Choose two.)

A.

Create vPC+

B.

Enable LACP active mode

C.

Create PAgP

D.

Create vPC

E.

Enable MAC pinning

What does the VXLAN source port add to the overlay packet forwarding when it uses the hash of Layer 2, Layer 3, and Layer 4 headers of the inner packet?

A.

ECMP

B.

TCP optimization

C.

disabled fragmentation

D.

jumbo frames

An organization migrates its virtualized servers from a legacy environment to Cisco ACI. VM1 is incorrectly attached to PortGroup IT|3TierApp|Web.

Which action limits IP address learning in BD1?

A.

Enable Enforce Subnet Check

B.

Enable Rouge Endpoint Control

C.

Enable GARP-based EP Move Detection Mode

D.

Disable Remote EP Learn

An engineer designers a Cisco ACI Multi-Pod solution that requires a pair of active-standby firewalls in different pods for external connectivity. How should the firewalls be implemented?

A.

PBR for routed firewalls

B.

separate L3Out peerings for routed firewalls

C.

routed firewall for the default gateway

D.

transparent firewalls

An engineer configures a new Cisco ACI Multi-Pod setup. Which action should be taken for fabric discovery to be successful for the nodes in Pod 2?

A.

Select the Route Reflector field in Pod Peering

B.

Enable the DSCP class-cos translation policy for Layer 3 traffic

C.

Configure POD 2 Data Plane TEP under the Pod Connection Profile

D.

Add the IPN subnet under the Fabric External Routing Profile