Cisco 300-630 - Implementing Cisco Application Centric Infrastructure - Advanced Exam
Page: 2 / 24
Total 120 questions
Question #6 (Topic: Single Topic)

Refer to the exhibit. What must be configured to allow the PBR node (LB-int) to monitor the availability of the endpoint that is in the EPG server?
A. Endpoint Dataplane Learning
B. Unicast Route disabled for client and server bridge domains
C. PBR node tracking
D. Direct Connect in the service graph template
Answer: A
Question #7 (Topic: Single Topic)
An engineer must limit local and remote endpoint learning to the bridge domain subnet. Which action should be taken inside the Cisco APIC?
A. Disable Remote EP Learn
B. Enable Enforce Subnet Check
C. Disable Endpoint Dataplane Learning
D. Enable Limit IP Learning to Subnet
Answer: B
Question #8 (Topic: Single Topic)
What is the purpose of the Forwarding Tag (FTAG) in Cisco ACI?
A. FTAG is used in Cisco ACI to add a label to the iVXLAN traffic in the fabric to apply the correct policy.
B. FTAG is used in Cisco ACI to add a label to the VXLAN traffic in the fabric to apply the correct policy.
C. FTAG trees in Cisco ACI are used to load balance unicast traffic.
D. FTAG trees in Cisco ACI are used to load balance mutli-destination traffic.
Answer: D
Question #9 (Topic: Single Topic)
DRAG DROP
A leaf receives unicast traffic that is destined to an unknown source, and spine proxy is enabled in the corresponding bridge domain. Drag and drop the Cisco ACI
forwarding operations from the left into the order the operation occurs on the right.
Select and Place:

A leaf receives unicast traffic that is destined to an unknown source, and spine proxy is enabled in the corresponding bridge domain. Drag and drop the Cisco ACI
forwarding operations from the left into the order the operation occurs on the right.
Select and Place:

Answer:

Question #10 (Topic: Single Topic)
An engineer deployed a Cisco ACI fabric and noticed that the fabric learns endpoints from subnets that are not configured on a bridge domain. To meet strict
security requirements, the engineer must prevent this behavior. Which action must be taken to prevent this behavior?
security requirements, the engineer must prevent this behavior. Which action must be taken to prevent this behavior?
A. Activate Enable Data Plane Endpoint Learning
B. Implement Pervasive Gateway
C. Configure Static Binding
D. Enable Enforce Subnet Check
Answer: D