Which three statements about ACI border leaf are true? (Choose three.)

Which three statements about ACI border leaf are true? (Choose three.)
A. Any ACI leaf can be a border leaf. There is no limitation in the number of leaf switches that can be used as border leaves.
B. The border leaf can also be used to connect to compute. IP storage, and service appliances.
C. The border leaves are ACl leaves that provide Layer 3 connections to outside networks.
D. The border /eaves are dedicated leaf switches that support on only Layer 2 and Layer 3 out in an ACI fabric.
E. Only 32 border leaves are supported an ACI fabric.

Answer: ABC

Which statement about the procedure to verify that the VSM is connected to vCenter Server is true?

Refer to the exhibit.

image147 - 
Which statement about the procedure to verify that the VSM is connected to vCenter Server is true?
Which statement about the procedure to verify that the VSM is connected to vCenter Server is true?
A. Install a new extension key and unregister the old extension key.
B. Unregister the old extension key and install a new extension key
C. Unregister the extension key.
D. Install a new extension key.
E. Issue no connect and connect commands.

Answer: B

Which option describes the reason for the displayed output?

Refer to the exhibit.

image139 - 
Which option describes the reason for the displayed output?
When the engineer tried to check CoPP on the switch, the engineer observed the error that is shown in the exhibit.
Which option describes the reason for the displayed output?
A. The Cisco NX-OS version that is running does not support CoPP.
B. The CoPP feature is not enabled on this switch.
C. The CoPP CLI is available from the default VDC
D. CoPP is enabled by default but not configured.

Answer: C

Which open source controller is a general purpose SDN controller for service provider and enterprise network operations?

Which open source controller is a general purpose SDN controller for service provider and enterprise network operations?
A. Open Network Operation System
B. Beacon OpenFlow controller
C. OpenStack Neutron
D. Linux foundation OpenDaylight
E. Cisco OpenDaylight Controller

Answer: D

Which two things can be determined from the SEL log output?

Refer to the exhibit.

image133 - 
Which two things can be determined from the SEL log output?
Which two things can be determined from the SEL log output? (Choose two.)
A. The server experienced a crash.
B. The server experienced correctable memory errors.
C. DIMMs in channel 2 are experiencing memory errors.
D. DIMMs in channel 0 are experiencing memory errors.
E. Memory errors have crossed two thresholds.

Answer: BE

Which description of what happens after initial setup to activate these interlinks is true?

You are setting up an ACI spine-leaf architecture and interconnecting the spine switches with the leaf switches.
Which description of what happens after initial setup to activate these interlinks is true?
A. The interlinks are Layer 2 connections and only the allowed VLAN list must be added.
B. An overlay is created automatically, which creates a setup where the uplinks do not need to managed automatically.
C. Fabric path must be configured on the interlinks.
D. The Links are creating a Layer 3 network, and all links must be configured as point-to-point links.

Answer: B

Which two statements about policing, queuing, and scheduling are true? (Choose two.)

Which two statements about policing, queuing, and scheduling are true? (Choose two.)
A. The WRHD algorithm is reactive approach only to traffic congestion.
B. Policing is the monitoring of data rates for a particular class of traffic. The device can also monitor associated burst sizes.
C. You can apply weighted random early detection to a class of traffic, which allows packets to be dropped based on the CoS field.
D. You can schedule traffic by imposing a maximum data rate on a class of traffic so that excess packets are dropped.

Answer: BC

Which two statements about VXLAN are true? (Choose two.)

Which two statements about VXLAN are true? (Choose two.)
A. VXLAN adds an additional 32 bytes worth of headers.
B. Devices that terminate VXLAN tunnels are known as VTEPs.
C. A VTEP is a virtual or physical device that maps end devices to VXLAN segments.
D. VXLAN uses a UDP destination port of 4987.

Answer: BC