101 Dumps
101 Braindumps
101 Real Questions
101 Practice Test
101 Actual Questions
killexams.com F5-Networks 101
Application Delivery Fundamentals 2025
https://killexams.com/pass4sure/exam-detail/101
Question #435
What occurs when a load command is issued?
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }
nswer: A
#436
hree files/data items are included in a BIG-IP UCS backup file? (Choose three.) IG-IP administrative addresses
IG-IP license IG-IP log files
IG-IP default traps
IG-IP host name Correct Answer: ABE
#437
an iRule perform persistence based on a cookie?
n iRule could be designed to persist based on the contents of a cookie. Rules cannot affect persistence.
n iRule could be designed to persist based on the contents of a cookie. ookie persistence is only is based on a cookie persistence profile.
nswer: C
#438
has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the exhib
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}
Correct A
Question Which t
the B
the B
the B
the B
the B
Question Could
Yes a
No. i
Yes. A
No. C
Correct A
Question
An LTM it.
Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached.
ection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 102:443.When the request is processed, what will be the source and destination IP addresses?
ce IP: 10.10.2.103; Destination IP: pool member in the 192.168/16 network ce IP: 10.10.201; Destination IP: pool member in the 192.168/16 network G ce IP: 10.10.2.103; Destination IP: 10.10.2.102
equest will be dropped.
ce IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network ce IP: 10.10.201; Destination IP: 10.102.102
nswer: C
A conn 10.10.2.
Sour
Sour
Sour
The r
Sour
Sour
Correct A
How is traffic flow through transparent virtual servers different from typical virtual servers?
Traffic flow through transparent virtual servers must be forwarded through a single routing device.
Traffic flow through transparent virtual servers does not have IP address translation performed.
Traffic flow through transparent virtual severs is not load balanced.
Traffic flow through transparent virtual servers is bridged (leave IP and MAC.addresses intact) rather than routed (leave IP address intact but change the MAC.addresses).
Correct Answer: B
Question #440
How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)
any text string within a cookie
any bytes within the initial client request packet
an IP address
the value in the tcp acknowledgement field
Correct Answer: AC
Question #441
tor has been defined with an alias port of 443. All other options are left at their defaults. The administrat to assign it to a pool of members where the members' ports vary. Which is the result?
For each member, if the member port is not 443, the member will be marked down. For each member, ember port is not 443, the member will be marked down.
For each member, the monitor will test member node at port 443. For each member, the monitor will t ember node at port 443.
For each member. If it is running an SSL service at the member port, the monitor may work. Otherwis onitor will fail and the member for each member, if it is running an SSL service at the member port, the onitor may work. Otherwise, the monitor will fail and the member will be marked down.
This assignment is not allowed since the port do not match.
B
#442
wo processes are involved when BIG-IP systems issue traps? (Choose two.) bigd
alertd smtpd syslogng
BD
#443
diting and saving changes to the configuration file containing virtual servers, what is the immediate resul The new configuration is verified and loaded.
wishes
Question
After e t?
The new configuration is verified not loaded. The new configuration is verified. The new configuration is loaded but not verified. The new configuration is neither verified not loaded. The new configuration is verified and loaded if is it syntactically correct. In the following configuration, a virtual server has the following HTTP class configuration: A request arriving for WWW.F5.COM will be matched by which class(es)? Class 1 Class 2 Both Class 1 and Class 2 er HTTP access to the management port HTTP access to any of the switch ports When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.) All client requests A web client accesses a web application using what protocol? TCP #450 ollowing request, which portion represents a parameter name? Yes User Week1 Financials B #451 of the following is not a method of protection for user-input parameters? Value extraction Attack signatures Length restriction Meta character enforcement A #452 ult, BIG-IP ASM allows which of the following HTTP methods in a client request? (Choose three.) PUT GET POST HEAD TRACE Answer: D Question In the f The Flow Login feature prevents which web vulnerability from occurring? Buffer overflow Question #454 On a standalone BIG-IP ASM system, which of the following configuration is valid? Pool named http_pool with 1 pool member, no persistence, and no load balancing method Pool named http_pool with 3 pool members, cookie persistence, and ratio load balancing method Which of the following violations cannot be learned by Traffic Learning? RFC violations File type length violations Attack signature violations Meta character violations on a specific parameter. A #456 the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder? Incoming requests with these IP addresses will never get blocked by BIG-IP ASM. Incoming requests with these IP addresses will not be taken into account as part of the learning process ill be allowed to do anything. Incoming requests with these IP addresses will automatically be accepted into the security ww.braindumps.com 87 F5 101 Exam policy, Policy Builder will validate that future requests with this t ill not create a violation. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more a ecurity policy, this additional policy will not be enabled unless forced by the administrator. C #457 of the following protocols can be protected by Protocol Security Manager? (Choose three.) FTP SSH HTTP w raffic w s SMTP Which of the following user roles have access to make changes to security policies? (Choose two.) Guest Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose two.) Monitors mouse and keyboard events Detects excessive failures to authenticate hoosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the ng components? (Choose two.) Attack signatures Global parameters HTTP protocol compliance URLs and meta characters AC #461 of the following is a benefit of using iRules? They can be used as templates for creating new applications They provide an automated way to create LTM objects They can use Active Directory to authenticate and authorize users They provide a secure connection between a client and LTM They enable granular control of traffic E #462 of the following is NOT a benefit of using SSL offload? It enables iRules to be used on traffic arriving to LTM that is encrypted The CPU processing led on backend servers is reduced It enables LTM to decrypt traffic, examine the payload, and the re-encrypt before sending it to a pool m The organization requires far less SSL certificates It increases the bandwidth between the client and LTM When using a routed configuration, the real server must point to the LTM as the . Default gateway Question #464 Which three of these software modules can you layer on top of LTM on a BIG-IP device? Enterprise Manage celerator uses three tiers to improve performance. What are the three tiers? Web server offload Network offload Client offload Protocol offload Application offload Bandwidth offload ABE #466 hree of the following must be done in order for GTM to properly communicate LTM? Ensure that GTM and LTM use the same floating IP address Exchange SSL certificates between the two Configure the GTM and LTM to use MAC masquerading Connect the GTM and LTM with a network crossover cable Synchronize the big3d versions between GTM and LTM Add the LTM object to the GTM configuration BEF ing LTMsystems with GTM systems on a network the bigip_add utility - ne the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM. bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates sothat each system isauthoriz nicate with the other. Answer: CEF Question #465 WebAc Integrat Running Determi Run the ed to commu When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility toauthorize communications between the systems. http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm- implementations11-3-0/7.html Note: The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.Answer: E Question #444
Answer: Question Under w
Answer: Question Which t
Answer: ABF Question #448
Answer: BD Question #449
Answer: Question Which
Answer: Question By defa
Answer: BCD Question #453
Answer: C
Answer: A Question #455
Answer: Question What is
Answer: Question Which
Answer: D Question #458
Answer: CD Question #459
Answer: AD Question #460
Answer: Question Which
Answer: Question Which
Answer: E Question #463
Answer: A
Answer: Question Which t
Answer: