Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > F5 > LTM Specialist > 301a

301a BIG-IP LTM Specialist: Architect Set-Up & Deploy Question and Answers

Question # 4

An LTM Specialist needs to create two virtual servers.

The application has links for both HTTP and HTTPS version of application. The client must be persistence to a pool member, no matter which virtual server is accessed.

What must be selected in the Source Address Affinity persistence profile?

A.

Match across Virtual Servers

B.

Match across Pool Members

C.

Match across Services

D.

Match across Polls

Full Access
Question # 5

Refer to the exhibit

Given the bigip conf extract shown where the servers only talk http on port 80, which node will receive the next user request?

A.

72.10.1.1

B.

10.1.1.1

C.

10.1.1.2 0

D.

10.1.1.3

Full Access
Question # 6

A new iRule needs to be tested. The LTM Specialist needs to measure page load times and monitor potential changes in memory usage A load test is scheduled.

Which two features should the LTM Specialist use to monitor these requirements? (Choose two.)

A.

Tmsh show memory

B.

Analytics

C.

Tmsh show sys proc-info

D.

Tmsh show sys provision

Full Access
Question # 7

An LTM specialist needs to upgrade a VCMP quest in an HA Setup with minimum interruption for all VCMP guest instances.

In which should the LTM Specialist perform this upgrade?

A.

Relicense the host. Failover all guest’s active traffic-groups to the other host, copy image to gest, create guest UCS install and set boot location to new volume, reboot

B.

Failover this specific guest’s active traffic-group to the other Host, Relicense the guest, copy image to guest , create guest UCS, install and set boot location to new volume, reboot

C.

Failover all guests’ active traffic-group to the other Host, Relicense the host, copy image to guest, create guest UCS, install and set boot location to new volume , reboot

D.

Failover all guests’ active traffic-group to the other host, copy image to guest, create guest UCS install and set boot location to new volume, reboot, Relicense the host

Full Access
Question # 8

An LTM Specialist is configuring a new virtual server on an LTM device and assigning a SNAT pool that is already is use another virtual server. Both virtual servers use the same pool members to load balance traffic. A maximum of 35,000 users needs to be able to access each virtual server ta any time. The network architecture does NOT allow the backend servers to use the LTM device as a default gateway.

What is the minimum number of SNAT addresses required in the SNAT pool to meet the needs of the virtual servers?

A.

2

B.

3

C.

4

D.

1

Full Access
Question # 9

An LTM Specialist needs to load balance an application using an LTM device to meet the requirements:

The application servers do NOT Support SSL, but client access to the application should be secured.

Multiple requests from the same client should be sent to the same pool member.

All pool members will have roughly the same processing power, and traffic should be distributed evenly.

The LTM device is NOT the pool members' default gateway.

which configuration should the LTM Specialist.

A.

a performance 14 virtual server with a SNAT and cookie persistence

B.

a performance L4 virtual server with a Client SSL profile and Source Address persistence

C.

A performance L4 virtual server with a SNAT, HTTP profile. Server SSL profile, and cookie persistence

D.

A standard virtual server with a SNAT, HTTP profile Server SSL profile, and cookie persistence

E.

A standard virtual server with a SNAT, HTTP profile, Client profile, andd cookie persistance.

Full Access
Question # 10

A design requires the LTM device to become HA standby when the one of the two physical interface on the External trunk is down the External trunk is an interface on the External VLAN

Which TMOS command enables this behavior?

A.

tmsh modify net van External failsafe enabled

B.

tmsh create sys ha-group External trunks add Externally

C.

tmsh create sys ha-group External trunks add External threshold 2 weight 101)

D.

tmsh create sys ha-group External trunks add ( External( attribute percent up-members 100))

Full Access
Question # 11

An LTM Specialist regularly provides analytics reports that show that traffic generated by different subnets within the organization. The LTM Specialist needs show the associate department names next the IP addresses in the reports.

Which step should the LTM Specialist take to meet this requirement?

A.

use an iRule to change the output of the report

B.

export the report and add the department names manually

C.

create VLANs for each subnet and set the name accordingly

D.

define active subnets and assign a name to certain subnets

Full Access
Question # 12

An LTM Specialist has trouble with SNMP traps in the management network The ITM Specialist takes the network capture shown to troubleshoot:

What should the UM Specialist change to capture packets related to this workflow?

A.

the interface

B.

the tcpdump filter expression

C.

the verbose level

D.

the port

Full Access
Question # 13

Exhibit.

An LTM Specialist needs to configure VS^HTTP and VS_DB for an online shopping site. The VS HTTP passes the client requests to the webservers. The webservers query the database servers through the VS_DB. Initially, the LTM Specialist finds the database servers directly return the packets to the webservers.

which setting must be enabled for the configuration to function correctly?

A.

VS_HTTP snat auto map

B.

VS.HTTP auto last hop

C.

VS DB auto last hop

D.

VS_DB snat auto map

Full Access
Question # 14

Exhibit.

The three VLANS shown provide connectivity to backend servers. The backend servers are being moved to unmanaged switches and require separate interfaces.

How should the F5 device interfaces be configured?

A.

Create a Trunk interface and combined interface 1.1.1.2 and 1.3.

B.

Create a Trunk interface and select VLAN„A, VLAN_B. and VLAN_C.

C.

Create VLAN named VLAN_A enter 100 under Tag and move interface 1.1 to tagged Create VLAN_B enter 200 and move interface 1.2 to tagged Create VLAN_C Center 300 and move interface 1.3 to tagged.

D.

Create VLAN_A move interface 1.1 to untagged. Create VLAN_B move interface 1.2 to untagged. Create VLAN_C move interface 1.3 to untagged.

Full Access
Question # 15

A VCMP guest has the following characteristics:

• Resources allocated for CPU memory, network interfaces, and disk space

• Virtual disk created

• The guest is NOT running

The guest is NOT running in which state is the VCMP guest

A.

Offline

B.

Deployed

C.

Provisioned

D.

Configured

Full Access
Question # 16

A new HITP server has been deployed on an LTM device. The application running on the server must be monitored by the LIM device. The following is required:

A new HITP server has been deployed on an LTM device. The application running on the server must be monitored by the LIM device. The following is required:

When the server is unavailable, it will send an HTTP status code of 200 in response to a request for the status html page.

When the server is available. I will send and HTTP status code of 201 in response to a request for the status html page.

When the 200 status code is received, the pool member should receive No new connections.

Which configuration change should be made to meet these requirements?

A.

set the Send String to GET/ status html and the Receive String to 200 and Receive Disable String to 201.

B.

set the Send String to GET Arian and the Receive String to 200 and Receive Disable String to 201.

C.

set the Send String to GET Arian and the Receive Disable String to 200 and Receive String to 201.

D.

set the Send String to Get /status html and the Receive Disable String to 200 and Receive String to 201.

Full Access
Question # 17

RADIUS authentication has been configured on the LTM device. The default remote user access requirements are as shown:

  • Read only access to the configuration Utility
  • Access to TMOS shell

Which two items need to be configured in this situation? (Choose two)

A.

Console access is Advanced Shell

B.

Console access is Read Only

C.

Default remote user role is Guest

D.

In Console access is TMSH

E.

Default remote user role is Manager

F.

Default remote user role is Operator

Full Access
Question # 18

An TLM Specialist needs to configure a virtual server to terminate SSL connection on the LTM device.

Cryptographic information must be re-authorized for SSL sessions that remain open for longer than 30 seconds.

Which settings should the LTM Specialist configure in the client SSL profile?

A.

set the Handshake Timeout to 30 seconds

B.

enable Require Peer SN1 Support

C.

set the Renegotiate Period to 30 seconds

D.

set the Renegotiate Max Record Delay to 30

Full Access
Question # 19

The network team has recently added a new syslog server with IP address 10.1.1.1.

Which command adds the new syslog entry on the F5 LTM device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

An LTM Specialist needs to create an iRule that creates persistence records based on a JSESSIONID cookie. If a persistence record already exists, then the iRule must persist the client connection according to the existing record.

Which persistence profile enables the iRule to meet these requirements?

A.

Universal

B.

SSL

C.

Destination Address Affinity

D.

Cookie

E.

Source Address Affinity

Full Access
Question # 21

AN LIM Specialist must upgrade the VCMP Guest active/standby LTM pair from version 11.3 to 11.5.3 on two VCMP Hosts.

where should the LTM Specialist import the latest 11.5.3 ISO images?

A.

to the primary VCMP Host and the active Guest instance

B.

to both VCMP Hosts

C.

to the secondary vCMP Host and the standby Guest instance

D.

to the VCMP Guest instances

Full Access
Question # 22

AN LTM Specialist is deploying an iRule designed to determine the country of origin of an incoming client connection. The iRule needs to be used with an SSL-enabled web application.

Which profile required for the iRule to function properly?

A.

HTTP

B.

DNS

C.

TCP

D.

UDP

Full Access