Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-620 Topic 12 Question 51 Discussion

Actual exam question for Cisco's 300-620 exam
Question #: 51
Topic #: 12
[All 300-620 Questions]

An engineer must limit management access to me Cisco ACI fabric that originates from a single subnet where the NOC operates. Access should be limited to SSH and HTTPS only. Where should the policy be configured on the Cisco APIC to meet the requirements?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Chandra
2 months ago
I'm leaning towards option C as well. It makes the most sense to control the management access at the interface lChandral, where we can specifically limit the allowed protocols.
upvoted 0 times
Alex
4 days ago
Yes, that way we can restrict management access to just SSH and HTTPS from the NOC subnet.
upvoted 0 times
...
Genevive
5 days ago
I agree, configuring the ACL on the management interface of the APIC is the most logical solution.
upvoted 0 times
...
Catarina
6 days ago
I think option C is the best choice. It allows us to control access at the interface level.
upvoted 0 times
...
...
Lenita
2 months ago
Haha, I bet the engineer who wrote this question has a really good sense of humor. Configuring an ACL on the console interface? That's like trying to lock the front door while leaving the back door wide open!
upvoted 0 times
Joanne
5 days ago
D) ACL on the console interface
upvoted 0 times
...
Malissa
7 days ago
C) ACL on the management interface of the APIC
upvoted 0 times
...
Devorah
9 days ago
B) policy on the management VLAN
upvoted 0 times
...
Sarah
16 days ago
A) policy In the management tenant
upvoted 0 times
...
Nancey
1 months ago
B) policy on the management VLAN
upvoted 0 times
...
Francine
2 months ago
That's a good point, it would be pretty funny to configure the ACL on the console interface!
upvoted 0 times
...
Carlota
2 months ago
C) ACL on the management interface of the APIC
upvoted 0 times
...
Candida
2 months ago
A) policy In the management tenant
upvoted 0 times
...
...
Alica
2 months ago
Option D is a bit of a stretch, don't you think? Why would we need to configure an ACL on the console interface? That's just silly.
upvoted 0 times
...
Felix
2 months ago
I'm not sure about this one. Wouldn't it make more sense to configure the policy in the management tenant? That seems like the logical place to handle management access.
upvoted 0 times
...
Kerry
2 months ago
I think the correct answer is option C. The policy should be configured as an ACL on the management interface of the APIC to limit access to SSH and HTTPS only.
upvoted 0 times
Giuseppe
1 months ago
That makes sense, limiting access to SSH and HTTPS only from a single subnet where the NOC operates.
upvoted 0 times
...
Latrice
2 months ago
I agree, option C is the correct answer. It should be configured as an ACL on the management interface of the APIC.
upvoted 0 times
...
...
Shantell
2 months ago
I believe the ACL should be configured on the management interface of the APIC for better control.
upvoted 0 times
...
Mindy
2 months ago
I agree with Whitney, it makes sense to limit access in the management tenant.
upvoted 0 times
...
Whitney
2 months ago
I think the policy should be configured in the management tenant.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77