Refer to the exhibit
F16438[FSM:STAGE:FAILED]: Establish connection Stage: comp/prov-VMware/ ctrlr-[RTPACILab]-TestVcenter Failed to retrieve ServiceContent from the vCenter server 10.122.253.152(FSMSTAGE:ifc:vmmmgr:CompCtrlrAdd:Connect)
Which option is a potential reason why you would see this output while provisioning a DVS?
A. The specified data center does not exist on the vCenter m question.
B. The Cisco APIC(s) cannot reach the vCenter host/vm.
C. The Service Content process has crashed.
D. Cisco Discovery Protocol is disabled on the vswitch policy tied to the corresponding AAEP.
If a Cisco ARC cluster is fully operational, how many replica copies does each shard have in addition to the leader replica?
A. 4
B. 3
C. 1
D. 2
Which option describes the ASICs that comprise the 2 RU spine chassis PID Cisco Nexus 9336PQ?
A. three Broadcom and one Alpine
B. two Broadcom and two Alpine
C. two Broadcom and one Alpine
D. one Broadcom and two Alpine
Which two statements about when the ARP request/response is not set to flooding on an Cisco ACI Fabric are true? (Choose two.)
A. Static endpoint entries can be configured under the Tenant Networking section of the Cisco ACI Ul for silent hosts to communicate with each other.
B. When the ARP originator and ARP target are known to the proxy, forwarding can no longer occur using the proxy because the source and destination are now known
C. When an ARP target device responds, a response is sent to the proxy, which has an entry (or the ARP originator, so it is then forwarded to the leaf where ARP originator resides.
D. When ARP response is known by the proxy, the ARP is forwarded from the leaf that received the ARP to the spine, and onto the leaf where the ARP target resides.
E. The proxy age time has no limit If the target of the ARP has not sourced a frame for some lime, the entry remains indefinite because this i$ the only way forwarding can work between silent hosts.
Which two actions occur when an EPG is being validated on a switch? (Choose two.)
A. IDs assignment validation
B. VLAN validation
C. path validation
D. BD, CTX configured validation
Which two methods in Cisco ACI are used for Layer 2 extension ol a bridge domain or EPG to external devices? (Choose two.)
A. Create an external bridged network to extend the entire bridge domain.
B. Create a routed outside network connection using the OSPF protocol to extend the EPG.
C. Create a routed outside network connection using the BGP to extend the entire bridge domain.
D. Create a connectivity profile to external devices that include the bridge domain or EPG information.
E. Create a static binding to a path (port + encap-ID) inside an EPG.
Which scope type is used when the subnet address needs to be 'leaked" to a different context or tenant?
A. public
B. shared
C. infra
D. private
Which Cisco UCS policy is required for VM endpoints to be discovered by the Cisco ACI fabric?
A. LAN connectivity policy
B. network control policy
C. dynamic vNIC connection policy
D. LACP policy
Where does the VIP for the vPC come from?
A. assigned by Cisco ARC from the management tenant IP space.
B. allocated from the vPC domain number assigned to the vPC peers.
C. DHCP from the infra TEP pool leaf portion.
D. DHCP from the infra TEP pool VIP portion.
A user must upgrade their Cisco ACI Fabric In which order should they upgrade?
A. It will always be the switches first and the APICs second.
B. It will always be the APICs first and the switches second.
C. It will always depend on the specifics of the software release.
D. It does not matter which you upgrade first (ARC/Switch) or second (APIC/Switch)