we provide Certified F5 Networks 101 practice exam which are the best for clearing 101 test, and to get certified by F5 Networks Application Delivery Fundamentals. The 101 Questions & Answers covers all the knowledge points of the real 101 exam. Crack your F5 Networks 101 Exam with latest dumps, guaranteed!

Q61. When configuring monitors for individual pool members, which three options can beselected? (Choose three.) 

A. Inherit the pool’s monitor. 

B. Choose a default monitor. 

C. Inherit the Wide-IP’s monitor. 

D. Assign a monitor to the specific pool member. 

E. Do not assign any monitor to the specific pool member. 

Answer: A,D,E 


Q62. When configuring the BIG-IP ASM System in redundant pairs, which of the following 

aresynchronized? (Choose 2) 

A. License file 

B. Security policies 

C. Web applications 

D. Request information 

E. Traffic learning information 

Answer: B,C 


Q63. What is the primary benefit of associating Servers with Data Centers? 

A. The primary benefit is in assigning a single IP address to identify a Data Center. 

B. The primary benefit is in combining probing metrics. Load balancing decisions can bemade more intelligently. 

C. The primary benefit is administrative. It is easier to remember to add servers when theyare categorized by a physical location. 

D. The primary benefit is in load balancing. Clients will not be directed to Data Centers thatare separated from them by great distances. 

Answer:


Q64. Which of the following violations cannot be learned by Traffic Learning? 

A. RFC violations 

B. File type length violations 

C. Attack signature violations 

D. Meta character violations on a specific parameter. 

Answer:


Q65. Which statement is true concerning the default communication between a redundant pair of BIG-IP devices? 

A. Communication between the systems cannot be effected by port lockdown settings. 

B. Data for both connection and persistence mirroring are shared through the same TCP connection. 

C. Regardless of the configuration, some data is communicated between the systems at regular intervals. 

D. Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled. 

Answer:


Q66. iQuery is a proprietary protocol that distributes metrics gathered from which three sources?(Choose three.) 

A. SNMP 

B. DNS root servers 

C. Path probes such as ICMP 

D. Monitors from LTM Systems 

E. Monitors from Generic Host Servers 

Answer: A,C,D 


Q67. Logging profiles are assigned to? 

A. HTTP class 

B. Security policies 

C. Web applications 

D. Attack signatures 

Answer:


Q68. Which of the following methods of protection is not available within the Protocol SecurityManager for HTTP traffic? 

A. Data guard 

B. Attack signatures 

C. Evasion techniques 

D. File type enforcement 

Answer:


Q69. Assuming other fail-over settings are at their default state, what would occur if the fail-over cable were to bedisconnected for five seconds and then reconnected? 

A. As long as network communication is not lost, no change will occur. 

B. Nothing. Fail-over due to loss of voltage will not occur if the voltage is lost for less than ten seconds. 

C. When the cable is disconnected, both systems will become active. When the voltage is restored, unit twowill revert to standby mode. 

D. When the cable is disconnected, both systems will become active. When the voltage is restored, bothsystems will maintain active mode. 

Answer:


Q70. Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose 2) 

A. Monitors mouse and keyboard events 

B. Detects excessive failures to authenticate 

C. Injects JavaScript code on the server side 

D. Verifies the client supports JavaScript and cookies 

Answer: A,D 


Q71. Which of the following is correct regarding static parameters? 

A. A static parameter is stored in a frame cookie. 

B. A static parameter is pre-defined by the web application logic. 

C. A static parameter is learned only by using the Deployment Wizard. 

D. A static parameter is mapped once when creating the application flow model. 

Answer:


Q72. What will likely happen if you were to define a LTM System in the wrong Data Center? 

A. There would be no effect if the LTM System is defined in the wrong Data Center. 

B. The GTM System would not be able to communicate with that LTM System loadbalancing decisions. 

C. Data from probes from that LTM System might result in inaccurate path metrics and 

D. The GTM System would not be able to resolve Wide-IPs to the addresses associatedwith that LTM System’s Virtual Servers. 

Answer:


Q73. How is traffic flow through transparent virtual servers different from typical virtual servers? 

A. Traffic flow through transparent virtual servers must be forwarded through a single routingdevice. 

B. Traffic flow through transparent virtual servers does not have IP address translationperformed. 

C. Traffic flow through transparent virtual severs is not load balabced. 

D. Traffic flow through transparent virtual servers is bridged ( leave IP and lMAC.addressesintact) rather than routed (leave IP address intact but change the MAC.addresses). 

Answer:


Q74. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.) 

A. LB_FAILED 

B. DNS_REQUEST 

C. HTTP REQUEST 

D. CLIENT_ACCEPTED 

Answer: A,B 


Q75. Assume the bigd daemon fails on the active system. Which three are possible results? (Choose three.) 

A. The active system will restart the bigd daemon and continue in active mode. 

B. The active system will restart the tmm daemon and continue in active mode. 

C. The active system will reboot and the standby system will go into active mode. 

D. The active system will fail-over and the standby system will go into active mode. 

E. The active system will continue in active mode but gather member and node state information from thestandby system. 

Answer: A,C,D