Pass4sure 101 Questions are updated and all 101 answers are verified by experts. Once you have completely prepared with our 101 exam prep kits you will be ready for the real 101 exam without a problem. We have Renovate F5 Networks 101 dumps study guide. PASSED 101 First attempt! Here What I Did.

Q121. Which two ports must be enabled to establish communication between GTM Systems andother BIG-IP Systems? (Choose two.) 

A. 22 

B. 53 

C. 443 

D. 4353 

E. 4354 

Answer: A,D 


Q122. How do you support non-intelligent DNS resolution in an environment with GTM Systemsand standard DNS servers? (Choose two.) 

A. The GTM System must be a secondary server in all of your zones. 

B. Your GTM System must delegate some DNS names to the DNS Servers. 

C. Your DNS servers may delegate some DNS names to the GTM Systems. 

D. The GTM System may have a Listener set for your DNS server’s address. 

E. The GTM System may have a Listener set for the GTM’s loopback address. 

Answer: C,D 


Q123. Assuming there are open connections through an active system's NAT and a fail-over occurs, by default, whathappens to those connections? 

A. All open connections will be lost. 

B. All open connections will be maintained. 

C. The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the connectionestablishment. 

D. Long-lived connections such as Telnet and FTP will be maintained while short-lived connections such asHTTP will be lost. 

E. All open connections are lost, but new connections are initiated by the newly active BIG-IP, resulting inminimal client downtime. 

Answer:


Q124. Monitors can be assigned to which three resources? (Choose three.) 

A. Pools 

B. Servers 

C. Wide IPs 

D. Data Centers 

E. Pool Members 

Answer: A,B,E 


Q125. Which statement is true concerning SSL termination? 

A. A virtual server that has both ClientSSL and ServerSSL profiles can still support cookie persistence. 

B. Decrypting traffic at the BIG-IP allows the use of iRules for traffic management, but increases the load onthe pool member. 

C. When any virtual server uses a ClientSSL profile, all SSL traffic sent to the BIG-IP is decrypted before it isforwarded to servers. 

D. If a virtual server has both a ClientSSL and ServerSSL profile, the pool members have less SSL processingthan if the virtual server had only a ClientSSL profile. 

Answer:


Q126. The BIG-IP ASM System is configured with a virtual server that contains an HTTP classprofile and the protected pool members are associated within the HTTP class profile pooldefinition. Thestatus of this virtual server is unknown (Blue). Which of the followingconditions will make this virtual server become available (Green)? 

A. Assign a successful monitor to the virtual server 

B. Assign a successful monitor to the members of the HTTP class profile pool 

C. Associate a fallback host to the virtual server and assign a successful monitor to thefallback host 

D. Associate a default pool to the virtual server and assign a successful monitor to the poolmembers 

Answer:


Q127. When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose2) 

A. All client requests 

B. All server responses 

C. Specific client requests 

D. Specific server responses 

Answer: B,D 


Q128. A security audit has determined that your web application is vulnerable to a cross-sitescripting attack. Which of the following measures are appropriate when building a securitypolicy?(Choose 2) 

A. Cookie length must be restricted to 1024 bytes. 

B. Attack signature sets must be applied to any user input parameters. 

C. Parameter data entered for explicit objects must be checked for minimum and maximumvalues. 

D. Parameter data entered for flow-level parameters must allow some meta-characters butnot others. 

Answer: B,D 


Q129. Which three can be a part of a pool’s definition? (Choose three.) 

A. Link 

B. Monitors 

C. Wide IPs 

D. Persistence 

E. Data Centers 

F. Virtual Servers 

Answer: B,D,F 


Q130. A steaming profile will do which of the following? 

A. Search and replace all occurrences of a specified string only is responses processed by avirtual server. 

B. Search and replace all occurrences of a specified string only in request processed by avirtual server. 

C. Search and replace all occurrences of a specified string in requests and responsesprocessed by a virtual server. 

D. Search and replace the first occurrence of a specified of a specified string in either arequest or response processed by a virtual server. 

Answer:


Q131. Which two methods can be used to determine which BIG-IP is currently active? (Choose two.) 

A. The bigtop command displays the status. 

B. Only the active system's configuration screens are active. 

C. The status (Active/Standby) is embedded in the command prompt. 

D. The ifconfig -a command displays the floating addresses on the active system. 

Answer: A,C 


Q132. Which persistence method will always recognize a client when the client returns to the same virtual server? 

A. SSL 

B. MSRDP 

C. Expression [universal] 

D. No persistence method work in all situations. 

E. Source address 

Answer:


Q133. Which two daemons only run after the entire license process has been completed? (Choosetwo.) 

A. zrd 

B. tmm 

C. ntpd 

D. gtmd 

Answer: A,D 


Q134. Which facility logs messages concerning GTM System parameters? 

A. local0 

B. local1 

C. local2 

D. local3 

Answer:


Q135. Flow login allows for more granular protection of login and logout URLs within webapplications. Which of the following are components of flow login? (Choose 3) 

A. Schema 

B. Login URLs 

C. Login pages 

D. Attack signatures 

E. Access validation 

Answer: B,C,E