Sample Questions and Answers
What allows ACI to handle endpoints that move across leaf switches?
Dynamic VLANs
B. COOP
C. Mobility Proxy
D. VXLAN
Answer: B
Explanation: COOP (Council of Oracle Protocol) tracks endpoint movement and updates the fabric with new endpoint locations.
Which ACI policy enables automatic VLAN allocation from a pool?
Interface policy
B. VLAN pool
C. Domain policy
D. Switch profile
Answer: B
Explanation: The VLAN pool defines a range of VLANs that can be dynamically allocated for endpoint connectivity in VMM or physical domains.
What is a leaf switch’s primary role in the ACI fabric?
Route between spines
B. Aggregate spine interfaces
C. Connect to endpoints and apply policy
D. Provide network clock
Answer: C
Explanation: Leaf switches connect directly to endpoints and enforce policies received from the APIC.
What must be associated with an EPG for it to provide L3 routing?
Contract
B. Bridge Domain with subnet
C. Fabric Access Policy
D. Static VLAN
Answer: B
Explanation: An EPG must be associated with a Bridge Domain that has a defined subnet for L3 routing to be available.
How is communication between tenants typically controlled in ACI?
Filters
B. Contracts between VRFs
C. L2Out
D. External routers
Answer: B
Explanation: Communication between different VRFs (tenants) is controlled using export/import policies or inter-VRF contracts.
What is required to monitor traffic between two EPGs in ACI?
SPAN session
B. NetFlow export
C. Contract with logging
D. Fabric Mirror policy
Answer: C
Explanation: A contract with logging enabled allows traffic monitoring between EPGs and helps with auditing and troubleshooting.
What function does an Attachable Access Entity Profile (AEP) serve?
Maps VLANs to tenants
B. Associates interface policies with physical/virtual domains
C. Manages spine switch roles
D. Controls COOP behavior
Answer: B
Explanation: AEP maps interface policy groups to physical or virtual domains, ensuring proper endpoint-to-fabric association.
What is a common reason for endpoint flapping in an ACI fabric?
DHCP mismatch
B. MTU inconsistency
C. Multiple MAC addresses on different leafs
D. Spanning tree misconfiguration
Answer: C
Explanation: When the same MAC is seen on multiple leafs, ACI perceives endpoint flapping, which can disrupt communication.
What is the default behavior of EPGs in different VRFs without contracts?
Full communication
B. Denied communication
C. ARP only
D. Ping-only access
Answer: B
Explanation: By default, communication between EPGs in separate VRFs is denied unless explicitly allowed via contracts or route leaking.
What is required for ACI to peer with external BGP routers?
External L2 Domain
B. BGP Peer ASN configuration
C. VRF import/export policy
D. Syslog policy
Answer: B
Explanation: To form a BGP peering session, you must configure remote ASN and BGP peering details in the L3Out.
What object must be configured to assign an interface to a leaf switch?
Interface selector
B. Access policy group
C. Switch profile
D. VMM domain
Answer: C
Explanation: The Switch Profile defines which interfaces belong to which leaf switches and associates them with interface policies.
Which object allows grouping of multiple contracts and policies for reuse?
Service graph
B. Policy set
C. Application profile
D. Tenant profile
Answer: B
Explanation: A policy set groups contracts, filters, and QoS policies for easy application and reuse across multiple EPGs.
Which protocol does ACI use for fabric encapsulation and data transport?
STP
B. MPLS
C. VXLAN
D. VTP
Answer: C
Explanation: VXLAN (Virtual Extensible LAN) is used by ACI to encapsulate traffic and carry it across the underlay IP fabric.
What is the effect of enabling GARP filtering on a bridge domain?
Increases multicast
B. Reduces unnecessary ARP flooding
C. Blocks endpoint learning
D. Allows duplicate MACs
Answer: B
Explanation: GARP (Gratuitous ARP) filtering prevents excessive broadcasts by limiting unnecessary ARP messages.
What ACI construct replaces the traditional concept of access control lists?
QoS policy
B. Contract
C. EPG
D. VRF
Answer: B
Explanation: Contracts in ACI enforce security and communication policies, much like traditional ACLs but in a policy-driven model.
How does ACI handle subnet advertisement from bridge domains?
Via contract filters
B. Static route injection
C. Explicit subnet advertisement settings
D. Proxy MAC tables
Answer: C
Explanation: Subnets in a bridge domain must be marked for advertisement to be included in external routing protocols.
What happens if a filter in a contract does not match any traffic?
Traffic is dropped
B. Traffic is forwarded
C. Contract is bypassed
D. Flooding occurs
Answer: A
Explanation: If traffic does not match any filter rule in the contract, it is dropped by default due to ACI’s zero-trust model.
Which type of EPG supports grouping of external endpoints like routers or firewalls?
L2EPG
B. External EPG
C. Shadow EPG
D. Management EPG
Answer: B
Explanation: External EPGs are used to group external network devices for communication with internal EPGs via L3Out.
What is needed to extend a bridge domain across multiple leaf switches?
OSPF routing
B. Static route in APIC
C. VLAN encapsulation and VXLAN mapping
D. Leaf-to-leaf cabling
Answer: C
Explanation: A VXLAN ID is used to extend bridge domains across multiple leafs, mapped to encapsulated VLANs.
What is an ACI In-Band management address used for?
Endpoint IP assignment
B. Leaf-to-spine routing
C. APIC access via fabric
D. SNMP traps only
Answer: C
Explanation: An In-Band management address allows APIC or other devices to be managed using the same ACI fabric network.
What policy is required to enable multicast routing in ACI?
QoS policy
B. IGMP policy
C. PIM policy
D. Route map
Answer: C
Explanation: PIM (Protocol Independent Multicast) policy must be configured on L3Out interfaces to support multicast routing.
Which of the following is a valid use case for microsegmentation in ACI?
VLAN assignment
B. Endpoint learning
C. VM-level security within the same EPG
D. Physical port configuration
Answer: C
Explanation: Microsegmentation provides granular security within the same EPG, based on VM attributes or security tags.
What is required to track the health of an ACI fabric component?
Flow monitor
B. Health score
C. Syslog alert
D. ARP entry
Answer: B
Explanation: Health scores in ACI monitor fabric components and give quantitative insights into performance, faults, and policy compliance.
Reviews
There are no reviews yet.