Application Delivery Fundamentals: F5 101 Version Demo
Application Delivery Fundamentals: F5 101 Version Demo
F5 101
Version Demo
https://dumpsarena.com
sales@dumpsarena.com
QUESTION NO: 1
A. tcpdump
B. snoop
C. ethereal
D. qkview
ANSWER: A
Explanation:
QUESTION NO: 2
An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the graphic below.
Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not
been reached.
A connection attempt is made with a source IP and port of 10.20.10.50:2222 and a destination IP and port of 10.10.2.102:80.
When the request is processed, what will be the source and destination IP addresses?
B. Source IP: 172316.20.50; Destination IP: pool member in the 182.16/16 network
C. Source IP: 192.168.1.1; Destination IP: pool member in the 192.168/16 network
E. Source IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network
F. Source IP: 182.16.1.1; Destination IP: pool member in the 172316/16 network
G. Source IP: 192.168.10.50; Destination IP: pool member in the 192.168/16 network
ANSWER: F
Explanation:
QUESTION NO: 3
There are many user roles configurable on the BIG-IP ASM System. Which of the following user roles have access to make
changes to ASM policies? (Choose three.)
A. Guest
B. Operator
C. Administrator
ANSWER: C D E
QUESTION NO: 4
The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this
capability. Select the features that the VPE provides. Select two.
ANSWER: A D
Explanation:
QUESTION NO: 5
A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default,
which settings will be applied to the security policy? (Choose three.)
ANSWER: A B E
Explanation:
QUESTION NO: 6
D. to allow both BIG-IP devices to simultaneously use the same MAC address
ANSWER: C
Explanation:
QUESTION NO: 7
A. Requests sent to this BIG-IP system with a destination port of 80 are load balanced between the members of PoolA.
B. No changes will take place since the command is missing the monitor component for PoolA.
C. The /config/BIG-IP.cinf file is updated to include a definition for the pool named PoolA.
D. A new pool is available for association with any iRule or virtual server.
ANSWER: D
Explanation:
QUESTION NO: 8
Which of the following statements are correct regarding positive and negative security models? (Choose two.)
C. Negative security model allows all transactions by default and rejects only transactions that contain attacks.
D. Positive security mode l denies all transactions by default and uses rules that allow only those transactions that are
considered safe and valid.
ANSWER: C D
Explanation:
A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types
that must be associated with such a virtual server? (Choose two.)
A. TCP
B. HTTP
C. HTTPS
D. ClientSSL
E. ServerSSL
ANSWER: A D
Explanation:
DRAG DROP
Place the following items in the order that the BIG-IP device uses when processing a packet.
QUESTION NO: 11
A. Lisp
B. C++
C. Java
D. TCL
E. AWK
ANSWER: D
Explanation:
QUESTION NO: 12
C. Parameter data entered for explicit objects must be checked for minimum and maximum values.
D. Parameter data entered for flow level parameters must allow some metacharacters but not others.
ANSWER: B D
Explanation:
QUESTION NO: 13
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What
security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which
may experience performance degradation when inspecting DNS queries and responses.
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of
authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch
levels.
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge
to security because it knows how an application behaves at any point in the reply request process
ANSWER: D
Explanation:
QUESTION NO: 14
A. True
B. False
ANSWER: A
Explanation:
Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)
B. An organization that has been recently fined for failing security compliance.
E. An organization that needs to ensure users are using Symantec antivirus software.
ANSWER: B C E
Explanation:
QUESTION NO: 16
What technology does ARX use to create a logical abstraction of the physical storage environment?
A. Data de-duplication
B. File virtualization
C. Server virtualization
D. SSL encryption
ANSWER: B
Explanation:
QUESTION NO: 17
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
Explanation:
QUESTION NO: 18
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?
A. A
B. C
C. D
D. B
ANSWER: D
Explanation:
LTM uses the round robin load balancing method so after A will be B.
Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)
A. VLANs
B. Load-balancing pools
D. TMOS
E. OneConnect
F. iRules
ANSWER: D E F
Explanation:
QUESTION NO: 20
The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each
file in order to more efficiently sort and store end user data.
A. True
B. False
ANSWER: B
Explanation: