Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > F5 > F5 Networks > 101

101 Application Delivery Fundamentals Question and Answers

Question # 4

A website is using source address persistence with a 30 second timeout A client is idle for 35 seconds

What happens to their connection?

A.

The client receives a "404 Page Not Found'" error

B.

The client connection is dropped

C.

The client remains on the same server

D.

The Client request is load balanced

Full Access
Question # 5

A BIG-IP Administrator has a cluster of devices.

What should the administrator do after creating a new Virtual Server on device 1?

A.

synchronize the settings of device 1 to the group

B.

create a new cluster on device 1

C.

create the new virtual server on device 2

D.

synchronize the settings of the group to device 1

Full Access
Question # 6

Which TransportLayer Security (TLS) extension can be used to enable a single virtual server to serve multiple HTTPS websites in different can be used to enable a single virtual server to server domains?

A.

Session Tickets

B.

OCSP Staping

C.

Server Name indication

D.

Certificate Status Request

Full Access
Question # 7

What are the two primary functions of the OSI 7 layer model (Choose two)

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors

Full Access
Question # 8

What is the nest hop used to send traffic to reach 192.168.1.50?

A.

172. 17. 12. 51

B.

192. 168. 150

C.

172. 17. 12.254

D.

172. 17. 12/ 255

Full Access
Question # 9

What is used to establish trust relationships between BIG-IP devices?

A.

trust ID

B.

device group identification

C.

certificate-based authentication

D.

unit IDs

Full Access
Question # 10

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

A.

Positive

B.

Context-based

C.

Negative

D.

Role-based

Full Access
Question # 11

An administrator points the browser at h.tp://www mydomain com.The destination server listens on TCP port 8080 Which feature must be enabled on the virtual server for this configuration to work?

A.

HTTP persistence

B.

source NAT

C.

destination address affinity

D.

port translation

Full Access
Question # 12

Tl SISSL prides which functionary when a web browser connects to web site using the HTTPS protocol?

A.

delivers secure communication over a network connection

B.

prevents the web server from being compromised

C.

protects network packets from interception by intermedianes

D.

stop the web browser from automatically downloading malware

Full Access
Question # 13

An administrator configures a custom MAC masquerade address on a redundant BIG-IP system

What will be the result?

A.

The administrator will be prompted during configuration to define which until will use the MAC masquerade address

B.

The MAC masquerade address will be concurrently used by both active and standby unit

C.

The MAC masquerade address will only be used by the active unit. The standby unit in use the system's actual interfaces (s) MAC address

D.

The MAC masquerade address will only be used by the un.t with higher unit ID The other unit wilt use the system's actual interface(s) MACaddress

Full Access
Question # 14

The BIG-IP device has the following configured routes:

Which gateway will be chosen to send the packet to the destination 10 238 10 11?

A.

192. 168 10 20

B.

192. 168.10. 40

C.

192 168. 10. 30

D.

192. 168. 10. 10

Full Access
Question # 15

Which support service is required to synchrony the time stamps in system logs from these devices?

A.

SNMP

B.

Syslong

C.

SMTP

D.

DNS

Full Access
Question # 16

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

A.

Use HTTP keep-alive

B.

set a larger receive window

C.

Enable delayed ACKs

D.

use an indefinite timeout

Full Access
Question # 17

Which function does a caching profile provide on the BIG IP server?

A.

caches client IP addresses to improve response times

B.

caches HTTP headers lo improve server load times.

C.

caches selected pool members to improve load balancing times.

D.

caches data for reuse to cut down on transfer time for future requests

Full Access
Question # 18

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Full Access
Question # 19

In which scenario is a packet forwarding architecture required?

A.

when HTTP header must be modified

B.

when cookie persistency is demanded

C.

when the server responds directly to the client

D.

when the number of TCP connections on the server should be reduced

Full Access
Question # 20

In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic

What should be used for this task?

A.

Big-IP Global Traffic Manager appliance

B.

Big-lP standard virtual edition

C.

Big-IP Local Traffic Manager appliance

D.

Big-IP virtual edition with FIPS

Full Access
Question # 21

What describes the third ‘’A’’ in the common authentication acronym AAA?

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Full Access
Question # 22

Given the service list of a server shown, the administrator needs to determine why users are unable to resolve the IP addresswww.example.com .

What is the causing this issue?

A.

bigd is down

B.

named is down

Full Access
Question # 23

End users report widespread issues accessing multiple network resources

What tool should the BIG IP Administrator use to view the status of all virtual servers and associated resources in one place?

A.

Pool statistics

B.

Network Map

C.

System performance

D.

Virtual server statistics

Full Access
Question # 24

An Administrator enables HTTP keep alive.

How does this affect the network?

A.

HTTP connections will remain open longer

B.

Fewer TCP connections will need to be opened

C.

HTTP connections will close when the keep-alive times out

D.

More TCP connections will need to be opened

Full Access
Question # 25

in which scenario is a full proxy TCP connection required?

A.

when IP Anycastmg is enabled

B.

when routing is enabled

C.

when the number of TCP connections to the server must be optimized

D.

when the client TCP connections options must be sent to the server

Full Access
Question # 26

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

A.

ASM

B.

APM

C.

AFM

D.

GTM

Full Access
Question # 27

An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?

A.

The HTTP service only listens on localhost

B.

The users IP needs to be allowed to access

C.

The server needs to be restarted

D.

The HTTPS service Is not running

Full Access
Question # 28

An IPv4 client tries to access to http://www myserver com

Which type of DNS request should the client send to its configured DNS server?

A.

type NS

B.

type A

C.

type AAAA

D.

type MX

Full Access
Question # 29

An administrator suspects that a BIG IP appliance is experiencing performing issue due to spikes in CPU usage checks the performance issues does to spikes in CPU usage checks the performance report in the BIG-IP UI on CPU spikes are evident in the graphs. Which section in the BIG IP UI can the administrator check to troubleshoot the issue further?

A.

Statistics > Utilization

B.

System . Utilization

C.

Statics > Dashboard

D.

System > Services

Full Access
Question # 30

A BIG IP Administrator need to perform a packet capture and identify the source IP that is connecting to the Virtual Server.

Which utility should the administrator use on the BIG IP device?

A.

leinel

B.

traceroute

C.

ping

D.

tcpdump

Full Access
Question # 31

A client needs to learn if a web server supports POST

Which HTTP method is used?

A.

OPTIONS

B.

TRACE

C.

LIST

D.

GET

Full Access
Question # 32

How does file caching affect the web application?

A.

It reduces the load on the web application

B.

It speeds up traffic to the web application

C.

It slows traffic to the web application

D.

It increases the load on the web application

Full Access
Question # 33

What should a BIG-IP Administrator configure to minimize impact during a failure?

A.

MAC masquerading

B.

Clone pool

C.

External monitors

D.

One Connect profile

Full Access
Question # 34

At which layer of the OSJ model does the DNS resolution process occur?

A.

Layer 7

B.

Layer 4

C.

Layer 2

D.

Layer 3

Full Access
Question # 35

Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?

A.

context-based access control mode!

B.

role-based access control mode!

C.

negative security model

D.

positive security model

Full Access
Question # 36

The administrator wants client request to be directed to the same pool member through the session based on the client IP address.

Which persistence method should the administrator choose?

A.

SSL persistence

B.

destination address affinity persistence

C.

cookie persistence

D.

Source address affinity persistence

Full Access