2016 December Cisco Official New Released 700-702 Dumps in Lead2pass.com!
100% Free Download! 100% Pass Guaranteed!
Although the Cisco 700-702 dumps are very popular, Lead2pass offers a wide range of Cisco 700-702 exam dumps and will continue to release new study guide to meet the rapidly increasing demand of the IT industry.
Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/700-702.html
What does the role-based access control in the Cisco Application Policy Infrastructure Controller provide?
A. RBAC is not supported in Cisco ACL
B. File system separation
C. The distributed database
D. Per-tenant admin separation
Cisco ACI permits tenant users to modify the parameters and configuration of the ACI fabric that they own and control. They can also read statistics and monitor faults and events for the entities (managed objects) that apply to them, such as endpoints, EPGs, and application profiles. Tenant users can perform configuration changes and read fault and event logs from the parts of the ACI fabric to which they have access.
The ACI switch operating system includes a role-based access control (RBAC) feature that allows highly specific access for a given role. This RBAC feature scales to a maximum of 64 unique roles and 256 rules per role. The ACI APIs retrieve data directly from the object store. A core APIC internal data access control system provides multitenant isolation and prevents information privacy from being compromised across tenants. Read and write restrictions prevent any tenant from seeing any other tenant’s configuration, statistics, faults, or event data. Unless the administrator assigns permissions to do so, tenants are restricted from reading fabric configuration, policies, statistics, faults, and events.
The APIC implements a two-level solution for access control:
Traditional role-based control: This control level defines the types of objects that a user is authorized to access. Users are assigned roles (collections of privileges) that govern read-only or read-write access to managed objects in the system. All managed object classes have one or more privileges that are assigned to them.
Domain-based control. This control level defines the domains in which a user is authorized to access objects.
A shard is a unit of data. How many copies does each Cisco APIC shard have including the active shard?
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-fabric/white-paper-c11-730021.html (effect of replication on reliablity)
Which three authentication protocols can be configured in the Cisco Application Policy Infrastructure Controller? (Choose three.)
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-fabric/white-paper-c11-730021.html (System Access: Authentication, Authorization, and RBAC)
The Cisco APIC supports both local and external authentication and authorization (TACACS+, RADIUS, Lightweight Directory Access Protocol [LDAP]) as well as role-based administrative control (RBAC) to control read and write access for all managed objects and to enforce Cisco ACI administrative and per-tenant administrative separation. The Cisco APIC also supports domain-based access control, which enforces where (under which subtrees) a user has access permissions.
Which statement describes a bridge domain as it relates to the Cisco ACI?
A. Separates tenants
B. A separate routing instance
C. A container for IP subnets
D. A container for end points
With which option can the Cisco Application Policy Infrastructure Controller be configured?
A. With the Cisco UCS Manager GUI
B. With a service level agreement
C. With the Cisco UCS Central interface
D. With the application programming interface
E. With the CLI
Which two functions are provided by the Cisco Application Policy Infrastructure Controller? (Choose two.)
A. Telemetry data for fabric operations
B. Policy repository
C. Distributed management plane
D. Control plane forwarding
E. Data plane forwarding
Which three challenges can the Cisco ACI integration of Layer 4 to Layer 7 services help a customer solve? (Choose three.)
A. Operational challenge of waiting on specialized administrators to configure individual devices
B. Limited device features
C. Chain of network services that includes multiple vendors
D. Costly and error-prone change control
E. Politics within an IT management organization
What is the function of the OpFlex protocol policy element?
A. Stores statistical information
B. Learns and knows every device in the network
C. Resolves policy and configures network hardware/software
D. Captures and stores the user intent in policy
E. Limits device features
The policy repository (PR) is a logically centralized entity containing the definition of all policies governing the behavior of the system. In Cisco ACI, this function is performed by the Cisco APIC or by the leaf nodes of the network fabric. The policy authority handles policy resolution requests from each policy element.
Policy Element (Policy Agent)
A policy element (PE) is a logical abstraction for a physical or virtual device that implements and enforces policy. This is where the Policy Agent describe in detail herein resides. Policy elements are responsible for requesting portions of the policy from the policy authority as new endpoints connect, disconnect, or change. Additionally, policy elements are responsible for rendering that policy from an abstract form into a concrete form that maps to their internal capabilities.
This process is a local operation and can function differently on each device as long as the semantics of the policy are honored.
The endpoint registry (ER) stores the current operation state (identity, location, etc.) of each endpoint (EP) in the system. The endpoint registry receives information about each endpoint from the local policy element and then can share it with other policy elements in the system. The endpoint registry may be physically co-located with the policy authority, but it may also be distributed in the network fabric itself. In Cisco’s ACI solution, the endpoint registry actually lives in a distributed database within the network itself to provide additional performance and resiliency.
Which attribute that is associated to the end point identity does the Cisco ACI fabric use VxLAN to remove?
B. Operating system
What is needed to forward IP multicast between bridge domains?
A. Forwarding IP multicast between bridge domains is not possible
B. External rendezvous point
C. External PIM router
D. External Layer 2 switch
E. External OSPF router
Lead2pass offers the latest Cisco 700-702 dumps and a good range of Cisco Certification 700-702 answers. Most of our Cisco 700-702 exam dumps are exclusively prepared by the best brains and highly skilled professionals from the IT domain to ensure 100% pass in your Cisco 700-702 Exam.
700-702 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDZ0IwcnNGS2FzMnM
2016 Cisco 700-702 exam dumps (All 60 Q&As) from Lead2pass:
http://www.lead2pass.com/700-702.html [100% Exam Pass Guaranteed]