Verified of 101 brain dumps materials and cram for F5 Networks certification for IT candidates, Real Success Guaranteed with Updated 101 pdf dumps vce Materials. 100% PASS Application Delivery Fundamentals exam Today!
Q16. Which statement is true concerning cookie persistence?
A. Cookie persistence allows persistence independent of IP addresses.
B. Cookie persistence allows persistence even if the data are encrypted from client to pool member.
C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in cleartext.
D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to theclient's file system.
Answer: A
Q17. When we have a * wildcard entity configured in the File Type section with tighteningenabled, the following may occur when requests are passed through the policy. Which is themost accurate statement?
A. File type violations will not be triggered.
B. File type violations will be triggered and learning will be available based on theseviolations.
C. File type entities will automatically be added to the policy (policy will tighten).
D. File type violations will not be triggered and the entity learning section will be populatedwith file type recommendations.
Answer: B
Q18. Which statement is correct if a TOP-based monitor is assigned to an LTM System and anHTTP-based monitor is assigned to one of that LTM System’s Virtual Servers?
A. The Virtual Server status is based on the TCP monitor only.
B. The Virtual Server status is based on the HTTP monitor only.
C. GTM Systems do not allow monitors on both an LTM System and one of its VirtualServers.
D. The Virtual Server status is based on both the TOP and HTTP monitor; if either fails, theVirtual Server is unavailable.
E. The Virtual Server status is based on both the TOP and HTTP monitor; if either succeeds,the Virtual Server is available.
Answer: B
Q19. As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What would be the result ifthe two systems in a redundant pair were set to the same host name?
A. Host names do not matter in redundant pair communication.
B. In a redundant pair, the two systems will always have the same host name. The parameter is synchronizedbetween the systems.
C. The first time the systems are synchronized the receiving system will be assigned the same self-IPaddresses as the source system.
D. When the administrator attempts to access the configuration utility using the host name, they will alwaysconnect to the active system.
Answer: C
Q20. Under what condition must an appliance license be reactivated?
A. Licenses only have to be reactivated for RMAs - no other situations.
B. Licenses generally have to be reactivated during system software upgrades.
C. Licenses only have to be reactivated when new features are added (IPv6, Routing Modules, etc) - no othersituations.
D. Never. Licenses are permanent for the platform regardless the version of software installed.
Answer: B
Q21. A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it: whenHTTP_REQUEST { if { [HTTP::header User-Agent] contains "MSIE" } { pool MSIE_pool } else { poolMozilla_pool } If a user connects to http://10.10.1.100.html and their browser does not specify a User-Agent,which pool will receive the request?
A. MSIE_pool
B. Mozilla_pool
C. None. The request will be dropped.
D. Unknown. The pool cannot be determined from the information provided.
Answer: B
Q22. Which statement is true regarding fail-over?
A. Hardware fail-over is disabled by default.
B. Hardware fail-over can be used in conjunction with network failover.
C. If the hardware fail-over cable is disconnected, both BIG-IP devices will always assume the active role.
D. By default, hardware fail-over detects voltage across the fail-over cable and monitors traffic across theinternal VLAN.
Answer: B
Q23. When can a single virtual server be associated with multiple profiles?
A. Never. Each virtual server has a maximum of one profile.
B. Often. Profiles work on different layers and combining profiles is common.
C. Rarely. One combination, using both the TCP and HTTP profile does occur, but it is the exception.
D. Unlimited. Profiles can work together in any combination to ensure that all traffic types are supported in agiven virtual server.
Answer: B
Q24. A site wishes to perform source address translation on packets from some clients but not others.
Thedetermination is not based on the client's IP address, but on the virtual servers their packets arrive on. Whatcould best accomplish this goal?
A. A SNAT for all addresses could be defined, and then disable the SNAT processing for select VLANs.
B. Some virtual servers could be associated with SNAT pools and others not associated with SNAT pools.
C. The decision to perform source address translation is always based on VLAN. Thus, the goal cannot beachieved.
D. The decision to perform source address translation is always based on a client's address (or network).Thus, this goal cannot be achieved.
Answer: B
Q25. Sensitive parameter is a feature used to hide sensitive information from being displayed inwhich of the following?
A. Client request
B. Server response
C. GUI and logs of BIG-IP ASM System
D. Configuration file of BIG-IP ASM System
Answer: C
Q26. Which of the following is correct concerning HTTP classes?
A. A single web application can be used by several HTTP classes.
B. A virtual server can only have one HTTP class associated with it.
C. A single ASM enabled HTTP class can be used by multiple virtual servers.
D. Each ASM enabled HTTP class can have several active security policies associated with it.
Answer: C
Q27. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the BIG- IP?
A. No SSL certificates are required on the BIG-IP.
B. The BIG-IP's SSL certificates must only exist.
C. The BIG-IP's SSL certificates must be issued from a certificate authority.
D. The BIG-IP's SSL certificates must be created within the company hosting the BIG-IPs.
Answer: A
Q28. Where is persistence mirroring configured?
A. It is always enabled.
B. It is part of a pool definition.
C. It is part of a profile definition.
D. It is part of a virtual server definition.
Answer: C
90. A site would like to ensure that a given web server's default page is being served correctly prior to sending itclient traffic. Theye assigned the default HTTP monitor to the pool. What would the member status be if it sentan unexpected response to the GET request?
A. The pool member would be marked offline (red).
B. The pool member would be marked online (green).
C. The pool member would be marked unknown (blue).
D. The pool member would alternate between red and green.
Answer: B
Q29. How is MAC masquerading configured?
A. Specify the desired MAC address for each VLAN for which you want this feature enabled.
B. Specify the desired MAC address for each self-IP address for which you want this feature enabled.
C. Specify the desired MAC address for each VLAN on the active system and synchronize the systems.
D. Specify the desired MAC address for each floating self-IP address for which you want this feature enabled.
Answer: A
Q30. A standard virtual server has been associated with a pool with multiple members. Assuming all other settingsare left at their defaults, which statement is always true concerning traffic processed by the virtual server?
A. The client IP address is unchanged between the client-side connection and the server-side connection.
B. The server IP address is unchanged between the client-side connection and the server-side connection.
C. The TCP ports used in the client-side connection are the same as the TCP ports server-side connection.
D. The IP addresses used in the client-side connection are the same as the IP addresses used in the serversideconnection.
Answer: A