Our pass rate is high to 98.9% and the similarity percentage between our 101 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the F5 Networks 101 exam in just one try? I am currently studying for the F5 Networks 101 exam. Latest F5 Networks 101 Test exam practice questions and answers, Try F5 Networks 101 Brain Dumps First.

Q1. The current status of a given pool is offline (red). Which condition could explain that state? 

Assume thedescriptions below include all monitors assigned for each scenario. 

A. No monitors are currently assigned to any pool, member or node. 

B. The pool has a monitor assigned to it, and none of the pool members passed the test. 

C. The pool has a monitor assigned to it, and only some of the pool's members passed the test. 

D. A monitor is assigned to all nodes and all nodes have passed the test. The pool's members have no specificmonitor assigned to them. 

Answer:


Q2. A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it: whenCLIENT_ACCEPTED { if {[TCP::local_port] equals 80 } { pool pool1 } elseif{[TCP::local_port] equals 443 }{ pool pool2 } If a user connects to 10.10.1.100 and port 22,which pool will receive the request? 

A. pool1. 

B. pool2. 

C. None. The request will be dropped. 

D. Unknown. The pool cannot be determined from the information provided. 

Answer:


Q3. What does the bigip_add script do? 

A. Add BIG-IP servers to the wideip.conf file. 

B. Add an existing GTM System to a sync group. 

C. Synchronize configuration files between BIG-IP Systems. 

D. Exchange web certificates and keys between BIG-IP Systems. 

Answer:


Q4. Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used too often. 

A. The IP address of the server must be added to the wideip.conf file. 

B. The IP address of the server must be added to the syslog-ng.conf file. 

C. The IP address of the server and valid userid/password combination must be added to thehosts.allow file. 

D. The IP address of the server and valid userid/password combination must be added to the syslog-ng.conf file. 

Answer:


Q5. A site has six members in a pool. Three of the servers are new and have more memory and a faster processorthan the others. Assuming all other factors are equal and traffic should be sent to all members, which two loadbalancingmethods are most appropriate? (Choose two.) 

A. Ratio 

B. Priority 

C. Observed 

D. Round Robin 

Answer: A,C


Q6. What is the difference between primary and secondary DNS servers? 

A. Only primary servers can issue authoritative responses. 

B. Primary servers host the original copy of the zone database file. 

C. Primary servers resolve names more efficiently than secondary servers. 

D. Secondary servers act as back-ups and will respond only if the primary fails. 

Answer:


Q7. Which method of protection is not provided by the Rapid Deployment policy template? 

A. Data leakage 

B. Buffer overflow 

C. HTTP protocol compliance 

D. Dynamic parameter validation 

Answer:


Q8. Adivinar (?) 

A. Any text string within a cookie. 

B. Any bytes within the initial client request packet. 

C. An IP address. 

D. The value in the tcp acknowledgement field. 

Answer: A,C 


Q9. What is the purpose of the GTM Systems Address Exclusion List concerning local DNSservers? 

A. To prevent probing of specific local DNSs 

B. To prevent name resolution to specific Virtual Servers 

C. To prevent name resolution for requests from specific local DNSs 

D. To prevent probing of any local DNS servers by specific F5 devices 

Answer:


Q10. Which of the following methods of protection is not available within the Protocol SecurityManager for FTP protection? 

A. Session timeout 

B. Command length 

C. Allowed commands 

D. Anonymous FTP restriction 

Answer:


Q11. Assume a virtual server is configured with a ClientSSL profile. What would the result be if the virtual server'sdestination port were not 443? 

A. SSL termination could not be performed if the virtual server's port was not port 443. 

B. Virtual servers with a ClientSSL profile are always configured with a destination port of 443. 

C. As long as client traffic was directed to the alternate port, the virtual server would work as intended. 

D. Since the virtual server is associated with a ClientSSL profile, it will always process traffic sent to port 443. 

Answer:


Q12. Which parameters are set to the same value when a pair of BIG-IP devices are synchronized? 

A. host names 

B. system clocks 

C. profile definitions 

D. VLAN fail-safe settings 

E. MAC masquerade addresses 

Answer:


Q13. A site has six members in a pool. All of the servers have been designed, built, and configuredwith the sameapplications. It is known that each client's interactions vary significantly and can affect the performance of theservers. If traffic should be sent to all members on a regular basis, which load-balancing mode is mosteffective if the goal is to maintain a relatively even load across all servers? 

A. Ratio 

B. Priority 

C. Observed 

D. Round Robin 

Answer:


Q14. Assuming that systems are synchronized, which action could take place if the fail-over cable is connectedcorrectly and working properly, but the systems cannot communicate over the network due to external networkproblems? 

A. If network fail-over is enabled, the standby system will assume the active mode. 

B. Whether or not network fail-over is enabled, the standby system will stay in standby mode. 

C. Whether or not network fail-over is enabled, the standby system will assume the active mode. 

D. If network fail-over is enabled, the standby system will go into active mode but only until the networkrecovers. 

Answer:


Q15. When choosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the following components? (Choose 2) 

A. Attack signatures 

B. Global parameters 

C. HTTP protocol compliance 

D. URLs and meta characters 

Answer: A,C