Act now and download your F5 Networks 101 test today! Do not waste time for the worthless F5 Networks 101 tutorials. Download Improved F5 Networks Application Delivery Fundamentals exam with real questions and answers and begin to learn F5 Networks 101 with a classic professional.
Q106. Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server?
A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
B. Terminating SSL at the BIG-IP eliminates all un-encrypted traffic from the Internal network.
C. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.
D. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in thenetwork.
Answer: A
Q107. When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
Answer: B
Q108. A BIG-IP has two SNATs, a pool of DNS servers and a virtual server configured to loabalanceUDP traffic to the DNS servers. One SNAT's address is 64.100.130.10; this SNATis defined for all addresses. The second SNAT's address is 64.100.130.20; this SNAT isdefined for three specific addresses, 172.16.3.54, 172.16.3.55, and 172.16.3.56. The virtualserver's destination is 64.100.130.30:53. The SNATs and virtual server have default VLANassociations. If a client with IP address 172.16.3.55 initiates a request to the virtual server,
What is the source IP address of the packet as it reaches the chosen DNS server?
A. 64.100.130.30
B. 172.16.3.55
C. 64.100.130.20
D. 64.100.130.10
Answer: C
Q109. Which of the following statements are correct regarding positive and negative securitymodels? (Choose 2)
A. Positive security model allows all transactions by default.
B. Negative security model denies all transactions by default.
C. Negative security model allows all transactions by default and rejects only transactionsthat contain attacks.
D. Positive security model denies all transactions by default and uses rules that allow onlythose transactions that are considered safe and valid.
Answer: C,D
Q110. Which event is always triggered when a client initially connects to a virtual server configured with an HTTPprofile?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. CLIENT_ACCEPTED
Answer: D
Q111. If a client's browser does not accept cookies, what occurs when the client connects to a virtual server usingcookie persistence?
A. The connection request is not processed.
B. The connection request is sent to a server.
C. The connection request is load-balanced to an available pool member.
D. The connection request is refused and the client is sent a "server not available" message.
Answer: C
Q112. If the GTM System receives a packet destined for one of its Listener addresses the GTM willprocess the request ...
A. either through Wide-IP processing or BIND processing
B. through Wide-IP processing and may process it through BIND processing
C. through BIND processing and may process it through Wide-IP processing
D. through Wide-IP processing and BIND processing and choose the best answer betweenthe two
Answer: B
Q113. Which three must be done so that Generic Host Servers can be monitored using SNMP?(Choose three.)
A. The SNMP monitor must be added to all BIG-IP Systems.
B. The Generic Host Server must be running the big3d agent.
C. The GTM System must be configured for the appropriate MIB .
D. The Generic Host Server must be added to the GTM Configuration.
E. The Generic Host Server must be enabled to answer SNMP queries.
Answer: C,D,E
Q114. Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention.
B. Cross-site request forgery prevention.
C. Web scraping attack prevention.
D. Parameter tampering prevention.
Answer: A,C
Q115. Which of the following storage type combinations are configurable in an ASM loggingprofile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server
Answer: B
Q116. Which of the following can be associated with an XML profile?
A. Flow
B. Method
C. Parameter
D. File type
Answer: C
Q117. You have a pool of servers that need to be tested. All of the servers but one should be tested every 10seconds, but one is slower and should only be tested every 20 seconds. How do you proceed?
A. It cannot be done. All monitors test every five seconds.
B. It can be done, but will require assigning monitors to each pool member.
C. It cannot be done. All of the members of a pool must be tested at the same frequency.
D. It can be done by assigning one monitor to the pool and a different monitor to the slower pool member.
Answer: D
Q118. Which of the following are correct regarding Wildcard entities? (Choose 2)
A. Wildcard entities are the basis for positive security logic.
B. Wildcard entities are the basis for negative security logic.
C. Wildcard entities require the need to learn only from violations.
D. Wildcard entities can be applied to file types, URLs, cookies and parameters.
Answer: A,D
Q119. A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two areprofile types that must be associated with such a virtual server? (Choose two.)
A. TCP
B. HTTP
C. HTTPS
D. ClientSSL
E. ServerSSL
Answer: A,D
Q120. What is the purpose of MAC masquerading?
A. to prevent ARP cache errors
B. to minimize ARP entries on routers
C. to minimize connection loss due to ARP cache refresh delays
D. to allow both BIG-IP devices to simultaneously use the same MAC address
Answer: C