New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

101 Questions and Answers

Question # 6

Which Datalink sublayer has the primary funcl.cn of proving node lo node flow and error control?

A.

LLC

B.

ARP

C.

MAC

D.

UDP

Full Access
Question # 7

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG IP device, Multiple other VLANs exist on LACP01.Which TMSH command should the BIG IP Administrator issue to add the new VLAN lo the existing LAC?

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named IACP01) connected to the BIG IP device Multiple other VLANs exist on LACP01. Which TMSH command should the BIG IP Administrator issue to add the new VLAN to the existing LAC?

A.

create net vlan VIAN40 (interfaces replace all with {LACP01 (untagged } } lag 40 )

B.

create net vian VLAN40 (interfaces add { LACP01 {tagged} tag JO J

C.

create net vian VLAN40 {interfaces add ( LACP01 {untagged)) tag 40}

D.

create net wan VLAN40 {interfaces replace all with {LACP01 {tagged ]} lag 40 }

Full Access
Question # 8

Which HTTP response code indicates an OK status?

A.

302

B.

404

C.

200

D.

100

Full Access
Question # 9

What is an advantage of a packet forwarding architecture?

A.

allows for manipulation of HTTP headers

B.

allows for SSL offload

C.

reduces latency

D.

handles larger packet sizes

Full Access
Question # 10

Layer 2 mapping information is announced by an interface without receiving a request for the mapping first.

Which term describes this event?

A.

ICMP

B.

STP

C.

gratuitous ARP

D.

ARP

Full Access
Question # 11

Cryptographic hash functions can be used to provide which service?

A.

data modification

B.

data encryption

C.

data validation

D.

data decryption

Full Access
Question # 12

Which method should an administrator of the BIG-IP use to sync the configuration to only certain other BIG-IPs?

A.

synchronize only certain folders

B.

exclude devices from certain Traffic Groups

C.

exclude devices from certain Sync Groups

D.

exclude devices from certain Device Groups

Full Access
Question # 13

Ping and Traceroute outputs are provided for a connectivity issue.

What is the cause of these results?

A.

routing loop

B.

packets that are routed with a high metric

C.

multiple paths toward the destination

Full Access
Question # 14

Which high availability feature allows two different BIG-IP devices to use the MAC address for the same server IP?

A.

HSRP virtual MAC address

B.

Device group

C.

Sync- failover

D.

MAC masquerade

Full Access
Question # 15

A BIG-IP administrator is interested in using some of the vCMP

What should impact the administrator's decision?

A.

vCMP is available on all F5 hardware platforms.

B.

vCMP is only available on the virtual edition

C.

vCMP is hardware independent

D.

vCMP is only available on certain F5 platforms

Full Access
Question # 16

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Full Access
Question # 17

A Network Administrator needs a new networking device can perform NAT to connect several devices on a computer network.

What is the most appropriate device for this requirement?

A.

Switch

B.

Router

C.

Bridges

D.

Hub

Full Access
Question # 18

An Administrator enables HTTP keep alive.

How does this affect the network?

A.

HTTP connections will remain open longer

B.

Fewer TCP connections will need to be opened

C.

HTTP connections will close when the keep-alive times out

D.

More TCP connections will need to be opened

Full Access
Question # 19

in which scenario is a full proxy TCP connection required?

A.

when SSL offloading is used

B.

when Traffic is routed

C.

when administrators manage the servers directly

D.

when 3 server responds directly to the client

Full Access
Question # 20

Which device group type allows a BIG IP system to automatically become active in the event that the current active system fails?

A.

Sync-active

B.

sync-failover

C.

sync-standby

D.

sync-only

Full Access
Question # 21

What we two advantages of using SSL offloading? (Choose two)

A.

Offloads the client to SSL processing

B.

provides single point of management for private keys

C.

reduces server load significantly

D.

encrypts all communications and to end

E.

allows secure remote access to internal server resources

Full Access
Question # 22

in which scenario is a full proxy TCP connection required?

A.

when SIP UP P load balancing is defined

B.

when DNS load balancing is configured

C.

when compression is enabled

D.

when layer 3 load balancing is configured

Full Access
Question # 23

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

Full Access
Question # 24

An administrator is given the IP Address of 192.168.100.124 and needs 64 subnets.

How many hosts per network are allowed?

A.

4

B.

8

C.

6

D.

2

Full Access
Question # 25

An administrator needs to selectively compress HTTP traffic based on geographical location Which FS Feature should the administrator use?

A.

One Connect

B.

iRules

C.

SPDY profile

D.

iSessions

Full Access
Question # 26

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.

What is the F5-recommended persistence method in this situation?

A.

SSL session ID persistence

B.

source address persistence

C.

SIP persistence

D.

destination address persistence

Full Access
Question # 27

A)

B)

C)

A.

Option

B.

Option

C.

Option

Full Access
Question # 28

What is used to provide mutual authentication for TLS/SSL?

A.

X 509 Certificate

B.

Access List

C.

Shared Secret key

D.

Mutually Trusted issuer

Full Access
Question # 29

In which FTP mode is the serve, responsible for initiating the data correction back to the client?

A.

Protected FTP

B.

Active FTP

C.

Secure FTP

D.

Passive FTP

Full Access
Question # 30

A load balancing decision needs to be made based on custom a What is the most appropriate F5 feature (or this purpose?

A.

iApps

B.

Scale

C.

iControl

D.

iRules

Full Access
Question # 31

In which scenario is a packet forwarding architecture required?

A.

when HTTP header must be modified

B.

when cookie persistency is demanded

C.

when the server responds directly to the client

D.

when the number of TCP connections on the server should be reduced

Full Access
Question # 32

An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer.

Which type of solution is this?

A.

packet forwarding architecture

B.

delayed binding

C.

switching

D.

Full proxy architecture

Full Access
Question # 33

An administrator configures a default gateway for the host. What is the purpose of a default gateway?

A.

to replace the destination IP address with the default gateway

B.

to pass all traffic to the default gateway

C.

to forward packets to remote networks

D.

to populate the ARP table

Full Access
Question # 34

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Full Access
Question # 35

What should the administrator investigate first to address this traffic slownes

A.

The virtual server indicates 14 slow connections killed

B.

The pool member is unchecked

C.

Interface 1.2 shows 9.2K errors

D.

The pool shows no current connections.

Full Access
Question # 36

An administrator needs to rapidly deter e newly discovered security threat to a remote desktop application.

Which F5 feature provides this functionality?

A.

iRules

B.

SSL profiles

C.

Proxy SSL

D.

SPDY

Full Access