101 Dumps

101 Braindumps

101 Real Questions

101 Practice Test

101 Actual Questions


killexams.com F5-Networks 101


Application Delivery Fundamentals 2025


https://killexams.com/pass4sure/exam-detail/101


Question #435


What occurs when a load command is issued?


  1. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}

  2. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}

  3. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }


    nswer: A


    #436


    hree files/data items are included in a BIG-IP UCS backup file? (Choose three.) IG-IP administrative addresses

    IG-IP license IG-IP log files

    IG-IP default traps

    IG-IP host name Correct Answer: ABE


    #437


    an iRule perform persistence based on a cookie?


    n iRule could be designed to persist based on the contents of a cookie. Rules cannot affect persistence.

    n iRule could be designed to persist based on the contents of a cookie. ookie persistence is only is based on a cookie persistence profile.


    nswer: C


    #438


    has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the exhib

    rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}


Correct A


Question Which t

  1. the B

  2. the B

  3. the B

  4. the B

  5. the B


Question Could

  1. Yes a

  2. No. i

  3. Yes. A

  4. No. C


Correct A


Question


An LTM it.

Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached.



ection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 102:443.When the request is processed, what will be the source and destination IP addresses?


ce IP: 10.10.2.103; Destination IP: pool member in the 192.168/16 network ce IP: 10.10.201; Destination IP: pool member in the 192.168/16 network G ce IP: 10.10.2.103; Destination IP: 10.10.2.102

equest will be dropped.

ce IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network ce IP: 10.10.201; Destination IP: 10.102.102


nswer: C

A conn 10.10.2.


  1. Sour

  2. Sour

  3. Sour

  4. The r

  5. Sour

  6. Sour


Correct A


Question #439


How is traffic flow through transparent virtual servers different from typical virtual servers?


  1. Traffic flow through transparent virtual servers must be forwarded through a single routing device.

  2. Traffic flow through transparent virtual servers does not have IP address translation performed.

  3. Traffic flow through transparent virtual severs is not load balanced.

  4. Traffic flow through transparent virtual servers is bridged (leave IP and MAC.addresses intact) rather than routed (leave IP address intact but change the MAC.addresses).


Correct Answer: B

Question #440


How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)


  1. any text string within a cookie

  2. any bytes within the initial client request packet

  3. an IP address

  4. the value in the tcp acknowledgement field


    Correct Answer: AC


    Question #441


    tor has been defined with an alias port of 443. All other options are left at their defaults. The administrat to assign it to a pool of members where the members' ports vary. Which is the result?


    For each member, if the member port is not 443, the member will be marked down. For each member, ember port is not 443, the member will be marked down.

    For each member, the monitor will test member node at port 443. For each member, the monitor will t ember node at port 443.

    For each member. If it is running an SSL service at the member port, the monitor may work. Otherwis onitor will fail and the member for each member, if it is running an SSL service at the member port, the onitor may work. Otherwise, the monitor will fail and the member will be marked down.

    This assignment is not allowed since the port do not match.


    B


    #442

    wo processes are involved when BIG-IP systems issue traps? (Choose two.) bigd

    alertd smtpd syslogng


    BD


    #443

    diting and saving changes to the configuration file containing virtual servers, what is the immediate resul The new configuration is verified and loaded.

    A moni or

    wishes


  5. if the

    m

    est the

    m

    e, the

m m D.


Answer: Question Which t

A.

B.

C.

D.


Answer:


Question


After e t?


A.

  • The new configuration is verified not loaded.

    The new configuration is verified.

    The new configuration is loaded but not verified.

    The new configuration is neither verified not loaded.

    The new configuration is verified and loaded if is it syntactically correct.


  • Answer: E Question #444

    In the following configuration, a virtual server has the following HTTP class configuration:

    A request arriving for WWW.F5.COM will be matched by which class(es)?


  • Class 1

    Class 2

    Both Class 1 and Class 2

    The request will be dropped


    suggestions in the Policy Building pages allow for which of the following? (Choose two.)


    XML-based parameters and associated schema are automatically learned. Blocking response pages can be automatically generated from web site content.

    Flow level parameters are displayed when found and can be accepted into the current policy.

    The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected olations.

    Maximum acceptable values for length violations are calculated and can be accepted into the security p the administrator.


    CE


    #446


    hat condition must an appliance license be reactivated?


    Licenses only have to be reactivated for RMAs no other situations. Licenses generally have to be reactivated during system software upgrades.

    Licenses only have to be reactivated when new features are added (IPv6, Routing Modules, etc.) no oth tuations.

    Never. Licenses are permanent for the platform regardless the version of software installed.


    B


    #447

    hree methods can be used for initial access to a BIG-IP system. (Choose three.) CLI access to the serial console port

    SSH access to the management port SSH access to any of the switch ports

    Answer: B Question #445 Learning

    A.

    B.

    C.

    D.

    vi

    olicy by


  • Answer: Question Under w

    A.

    B.

  • er

    si D.


    Answer: Question Which t

    A.

    B.

    C.

    HTTP access to the management port

    HTTP access to any of the switch ports

    HTTPS access to the management port

    HTTPS access to any of the switch ports


  • Answer: ABF Question #448

    When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.)


  • All client requests

    All server responses

    Specific client requests

    Specific server responses


  • Answer: BD Question #449

    A web client accesses a web application using what protocol?


  • TCP

    XML

    HTML

    HTTP


  • #450

    ollowing request, which portion represents a parameter name? Yes

    User Week1 Financials


    B


    #451

    of the following is not a method of protection for user-input parameters? Value extraction

    Attack signatures Length restriction

    Meta character enforcement


    A


    #452

    ult, BIG-IP ASM allows which of the following HTTP methods in a client request? (Choose three.) PUT

    GET POST HEAD TRACE

    Answer: D Question In the f

    A.

    B.

    C.

    D.


    Answer: Question Which

    A.

    B.

    C.

    D.


    Answer: Question By defa

    A.

    B.

    C.

    D.

    E.


    Answer: BCD Question #453

    The Flow Login feature prevents which web vulnerability from occurring?


  • Buffer overflow

    Cookie poisoning

    Forceful browsing

    Cross site scripting


  • Answer: C

    Question #454


    On a standalone BIG-IP ASM system, which of the following configuration is valid?


  • Pool named http_pool with 1 pool member, no persistence, and no load balancing method

    Pool named http_pool with 3 pool members, cookie persistence, and ratio load balancing method

    Pool named http_pool with 2 pool members, source IP persistence, and least connections load balancing method

    Pool named http_pool with 3 pool members, cookie persistence, and least connections load balancing method


  • Answer: A Question #455

    Which of the following violations cannot be learned by Traffic Learning?



    RFC violations

    File type length violations Attack signature violations

    Meta character violations on a specific parameter.


    A


    #456

    the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder? Incoming requests with these IP addresses will never get blocked by BIG-IP ASM.

    Incoming requests with these IP addresses will not be taken into account as part of the learning process ill be allowed to do anything.

    Incoming requests with these IP addresses will automatically be accepted into the security ww.braindumps.com 87 F5 101 Exam policy, Policy Builder will validate that future requests with this t ill not create a violation.

    Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more a ecurity policy, this additional policy will not be enabled unless forced by the administrator.


    C


    #457

    of the following protocols can be protected by Protocol Security Manager? (Choose three.) FTP

    SSH HTTP

    A.

    B.

    C.

    D.


    Answer: Question What is

    A.

    B. , they

    w C.

    w raffic

    w

    D. dvanced

    s


    Answer: Question Which

    A.

    B.

    C.

  • SMTP

    Telnet


  • Answer: D Question #458

    Which of the following user roles have access to make changes to security policies? (Choose two.)


  • Guest

    Operator

    Administrator

    Web Application Security Editor

  • Answer: CD Question #459

    Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose two.)


  • Monitors mouse and keyboard events

    Detects excessive failures to authenticate

    Injects JavaScript code on the server side

    Verifies the client supports JavaScript and cookies


  • Answer: AD Question #460

    hoosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the

    ng components? (Choose two.)


    Attack signatures Global parameters

    HTTP protocol compliance URLs and meta characters


    AC


    #461


    of the following is a benefit of using iRules?


    They can be used as templates for creating new applications They provide an automated way to create LTM objects

    They can use Active Directory to authenticate and authorize users They provide a secure connection between a client and LTM They enable granular control of traffic


    E


    #462


    of the following is NOT a benefit of using SSL offload?


    It enables iRules to be used on traffic arriving to LTM that is encrypted The CPU processing led on backend servers is reduced

    It enables LTM to decrypt traffic, examine the payload, and the re-encrypt before sending it to a pool m The organization requires far less SSL certificates

    It increases the bandwidth between the client and LTM

    When c followi


    A.

    B.

    C.

    D.


    Answer: Question Which

    A.

    B.

    C.

    D.

    E.


    Answer: Question Which

    A.

    B.

    C. ember

    D.

    E.


    Answer: E Question #463

    When using a routed configuration, the real server must point to the LTM as the .


  • Default gateway

    Virtual IP

    DNS server

    NTP server

    WINS server


  • Answer: A

    Question #464


    Which three of these software modules can you layer on top of LTM on a BIG-IP device?


  • Enterprise Manage

    ARX

    APM

    FirePass

    Web Accelerator

    GTM


  • celerator uses three tiers to improve performance. What are the three tiers? Web server offload

    Network offload

    Client offload Protocol offload Application offload Bandwidth offload


    ABE


    #466

    hree of the following must be done in order for GTM to properly communicate LTM? Ensure that GTM and LTM use the same floating IP address

    Exchange SSL certificates between the two

    Configure the GTM and LTM to use MAC masquerading Connect the GTM and LTM with a network crossover cable Synchronize the big3d versions between GTM and LTM Add the LTM object to the GTM configuration


    BEF

    ing LTMsystems with GTM systems on a network


    the bigip_add utility -

    ne the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM. bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates sothat each system isauthoriz nicate with the other.

    Answer: CEF Question #465 WebAc

    A.

    B.

    C.

    D.

    E.

    F.


    Answer: Question Which t

    A.

    B.

    C.

    D.

    E.

    F.


    Answer:

    Integrat


    Running Determi

    Run the ed to

    commu

    When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility toauthorize communications between the systems. http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm- implementations11-3-0/7.html

    Note:

    The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.