New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

201 Questions and Answers

Question # 6

DNS queries from two internal DNS servers are being load balanced to external DNS Servers via a Virtual

Server on a BIG-P device. The DNS queries originate from 192.168.101.100 and 192.168.101.200 and

target 192.168.21.50

All DNS queries destined for the external DNS Servers fail

Which property change should the BIG-IP Administrator make in the Virtual Server to resolve this issue?

A.

Protocol Profile (Client) to DNS-OPTIMZED

B.

Type to Performance (HTTP)

C.

Protocol to UDP

D.

Source Address to 192.168.101.0/24

Full Access
Question # 7

A configuration change is made on the standby member of a device group.

What is displayed as "Recommended Action" on the Device Management Overview screen?

A.

Force active member of device group to standby

B.

Activate device with the most recent configuration

C.

Synchronize the active member configuration to the group.

D.

Synchronize the standby member configuration to the group

Full Access
Question # 8

Which statement is true concerning cookie persistence?

A.

Cookie persistence allows persistence independent of IP addresses.

B.

Cookie persistence allows persistence even if the data are encrypted from client to pool member.

C.

Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.

D.

If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system.

Full Access
Question # 9

A BIG-IP Administrator needs to remove a pool specific health monitor. There is a pool named Best Pool with two members, one named Best pool member and one named Best pool member2. In the Local Traffic section of the administrative GUI, which stops should the BIG-IP Administrator take to remove a pool level monitor?

A.

Pool > Pool List > Best Pool > Members > Health Monitors

B.

Nodes > Node List> Best _pool_memberl > Heath Monitors

C.

Monitors > Monitor Name> Instances

D.

Pool > Pool List> Best Pool > Health Monitors

Full Access
Question # 10

A BIG-IP Administrator plans to upgrade a BIG-IP device to the latest TMOS version.

Which two tools could the administrator leverage to verify known issues for the target versions?

(Choose two.)

A.

F5 University

B.

F5 Downloads

C.

F5 End User Diagnostics (EUD)

D.

FSiHealth

E.

F5 Bug Tracker

Full Access
Question # 11

A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?

A.

A SNAT for all addresses could be defined, and then disable the SNAT processing for select VLANs.

B.

Some virtual servers could be associated with SNAT pools and others not associated with SNAT pools.

C.

The decision to perform source address translation is always based on VLAN. Thus, the goal cannot be achieved.

D.

The decision to perform source address translation is always based on a client's address (or network). Thus, this goal cannot be achieved.

Full Access
Question # 12

A BIG-IP Administrator uses backend servers to host multiple services per server. There are multiple virtual servers and pools defined, referencing the same backend servers.

Which load balancing algorithm is most appropriate to have an equal number of connections on each backend server?

A.

Least Connections (member)

B.

Least Connections (node)

C.

Predictive (member)

D.

Predictive (node)

Full Access
Question # 13

Refer to the exhibit.

An organization is reporting slow performance accessing their Intranet website, hosted in a public cloud. All employees use a single Proxy Server with the public IP of 104.219.110.168 to connect to the Internet. What should the BIG-IP Administrator of the Intranet website do to fix this issue?

A.

Change Source Address to 104.219.110.168/32

B.

Change Load Balancing Method to Least Connection

C.

Change Fallback Persistence Profile to source_addr

D.

Change Default Persistence Profile to cookie

Full Access
Question # 14

Users report that traffic is negatively affected every time a BIG-IP device fails over. The traffic becomes

stabilized after a few minutes.

What should the BIG-IP Administrator do to reduce the impact of future failovers?

A.

Enable Failover Multicast Configuration

B.

Set up Failover Method to HA Order

C.

Configure MAC Masquerade

D.

Configure a global SNAT Listener

Full Access
Question # 15

A BIG-IP Administrator configures a Virtual Server. Users report that they always receive a TCP RST packet to the BIG-IP system when attempting to connect to it. What is the possible reason for this issue?

A.

The virtual server Type is set to Internal

B.

The virtual server Type is set to Reject

C.

The virtual server Type is set to Drop

D.

The virtual server Type is set to Stateless

Full Access
Question # 16

A BIG-IP Administrator upgrades the BIG-IP LTM to a newer software version. After the administrator reboots into the new volume, the Configuration fails to load. Why is the Configuration failing to load?

A.

The license needs to be reactivated before the upgrade.

B.

The upgrade was performed on the standby unit.

C.

A minimum of at least two reboots is required.

D.

Connectivity to the DNS server failed to be established.

Full Access
Question # 17

During a high-demand traffic event, the BIG-IP Administrator needs to limit the number of new

connections per second allowed to a Virtual Server.

What should the administrator apply to accomplish this task?

A.

An HTTP Compression profile to the Virtual Server

B.

A connection rate limit to the Virtual Server

C.

A connection limit to the Virtual Server

D.

A OneConnect profile to the Virtual Server

Full Access
Question # 18

A BIG-IP Administrator is informed that traffic on Interface 1.1 is expected to increase over the maximum bandwidth capacity on the link. There is a single VLAN on the Interface. What should the 8IG-IP Administrator do to increase the total available bandwidth?

A.

Assign two Interfaces to the VLAN

B.

Set the media speed of Interface 1.1 manually

C.

Create a trunk object with two Interfaces

D.

Increase the MTU on the VLAN using Interface 1.1

Full Access
Question # 19

A BIG-IP Administrator wants to add a new Self IP to the BIG-IP device. Which item should be assigned to the new Self IP being configured?

A.

Interface

B.

Route

C.

VLAN

D.

Trunk

Full Access
Question # 20

A BIG-IP Administrator applied the latest hotfix to an inactive boot location by mistake, and needs to downgrade back to the previous hotfix.

What should the BIG-IP Administrator do to change the boot location to the previous hotfix?

A.

Uninstall the newest hotfix and reinstall the previous hotfix

B.

Reinstall the base version and install the previous hotfix

C.

Reinstall the previous hotfix and re-activate the license

D.

Uninstall the base version and restore the UCS

Full Access
Question # 21

A 8IG-IP device is replaced with an RMA device. The BIG-IP Administrator renews the license and tries to restore the configuration from a previously generated UCS archive on the RMA device. The device configuration is NOT fully loading. What is causing the configuration load to fail?

A.

The Device Group is NOT configured for Full Sync.

B.

The US does NOT contain the full config

C.

The clock is NOT set correctly

D.

The Master Key is NOT restored

Full Access
Question # 22

Refer to the exhibit.

During maintenance, the BIG-IP Administrator manually disables a pool member as shown.

What is the result?

A.

All pool members continue to process persistent connections

B.

All pool members stop accepting new connections.

C.

The disabled pool member stops processing persistent connections.

D.

The disabled pool member stops processing existing connections

Full Access
Question # 23

A user needs to determine known security vulnerabilities on an existing BIG-IP appliance and how to

remediate these vulnerabilities.

Which action should the BIG-IP Administrator recommend?

A.

Verify the TMOS version and review the release notes

B.

Create a UCS archive and upload to Health

C.

Create a UCS archive and open an F5 Support request

D.

Generate a view and upload to Heath

Full Access
Question # 24

Which two can be a part of a virtual server's definition? (Choose two.)

A.

rule(s)

B.

pool(s)

C.

monitor(s)

D.

node address(es)

E.

loadbalancing method(s)

Full Access
Question # 25

Given that VLAN failsafe is enabled on the external VLAN and the network that the active BIG-IP's external VLAN is connected to has failed, which statement is always true about the results?

A.

The active system will note the failure in the HA table.

B.

The active system will reboot and the standby system will go into active mode.

C.

The active system will failover and the standby system will go into active mode.

D.

The active system will restart the traffic management module to eliminate the possibility that BIG-IP is the

cause for the network failure.

Full Access
Question # 26

A site has six members in a pool. All of the servers have been designed, built, and configured with the same applications. It is known that each client's interactions vary significantly and can affect the performance of the

servers. If traffic should be sent to all members on a regular basis, which loadbalancing mode is most effective if the goal is to maintain a relatively even load across all servers?

A.

Ratio

B.

Priority

C.

Observed

D.

Round Robin

Full Access
Question # 27

A standard virtual server is defined with a pool and a SNAT using automap. All other settings for the virtual server are at defaults. When client traffic is processed by the BIG-IP, what will occur to the IP addresses?

A.

Traffic initiated by the pool members will have the source address translated to a self-IP address but the destination address will not be changed.

B.

Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address translated to a self-IP address.

C.

Traffic initiated by selected clients, based on their IP address, will have the source address translated to a self-IP address but the destination will only be translated if the traffic is destined to the virtual server.

D.

Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address translated to a self-IP address. Traffic arriving destined to other destinations will have

the source translated to a self-IP address only.

Full Access
Question # 28

Active connections to pool members are unevenly distributed. The load balancing method is Least Connections (member) Priority Group Activation is disabled. What is a potential cause of the event distribution?

A.

Priority Group Activation is disabled

B.

SSL Profile Server is applied

C.

Persistence profile is applied

D.

incorrect load balancing method

Full Access
Question # 29

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the

management interface.

Where should this be accomplished?

A.

System > Configuration

B.

Network > Interfaces

C.

Network > Self IPs

D.

System > Platform

Full Access
Question # 30

What is the purpose of MAC masquerading?

A.

to prevent ARP cache errors

B.

to minimize ARP entries on routers

C.

to minimize connection loss due to ARP cache refresh delays

D.

to allow both BIGIP devices to simultaneously use the same MAC address

Full Access
Question # 31

What is required for a virtual server to support clients whose traffic arrives on the internal VLAN and pool members whose traffic arrives on the external VLAN?

A.

That support is never available.

B.

The virtual server must be enabled for both VLANs.

C.

The virtual server must be enabled on the internal VLAN.

D.

The virtual server must be enabled on the external VLAN.

Full Access
Question # 32

A 8IG-IP Administrator configures a Virtual Server to load balance traffic between 50 webservers for an

ecommerce website Traffic is being load balanced using the Least Connections (node) method.

The webserver administrators report that customers are losing the contents from their shopping carts

and are unable to complete their orders.

What should the BIG-IP Administrator do to resolve the issue?

A.

Change Default Persistence Profile setting to cookie

B.

Change Load Balancing method to Ratio (member)

C.

Change Default Persistence Profile setting to sipjnfo

D.

Change Load Balancing method to Ratio (node)

Full Access
Question # 33

Assuming that systems are synchronized, which action could take place if the fail over cable is connected correctly and working properly, but the systems cannot communicate over the network due to external network

problems?

A.

If network failover is enabled, the standby system will assume the active mode.

B.

Whether or not network failover is enabled, the standby system will stay in standby mode.

C.

Whether or not network failover is enabled, the standby system will assume the active mode.

D.

If network failover is enabled, the standby system will go into active mode but only until the network recovers.

Full Access
Question # 34

A BIG-IP device is configured with both an internal external and two Corporate VLANs. The virtual server

has SNAT enabled and is set to listen on all VLANs Auto Last Hop is disabled. The Corporate users are on

10.0.0.0./24 and 172.16.0.0/12. The BIG-IP has a Self-IP on the 1.0.0.0.0./24 subnet.

Internet users are able to access the virtual server. Only some of the Corporate users are able to connect

to the virtual server A BIG-IP Administrator performs a tcpdump on the BIG-IP and verifies that traffic is

arriving from users in 10.0.0.0/24.

What should the BIG-IP Administrator do to correct this behaviour?

A.

Disable the server on the internal VLAN

B.

Add a static route for the 172.16.0.0/12 subnet

C.

Change the default route to point to the extra firewall

D.

Modify the default route of the servers to point to the BIG-IP device

Full Access
Question # 35

What is the purpose of floating self-IP addresses?

A.

to define an address that grants administrative access to either system at any time

B.

to define an address that allows either system to initiate communication at any time

C.

to define an address that allows network devices to route traffic via a single IP address

D.

to define an address that gives network devices greater flexibility in choosing a path to forward traffic

Full Access
Question # 36

Which is an advantage of terminating SSL communication at the BIGIP rather than the ultimate web server?

A.

Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.

B.

Terminating SSL at IP the eliminates BIG all unencrypted traffic from the internal network.

C.

Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.

D.

Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.

Full Access
Question # 37

On the VCMP system, a BIG-IP host administrator imports a new ISO image into the host's /shared/images folder. The new ISO images that reside on the vCMP host are available for installation on the guest. How should the BIG-IP Administrator install one image from within the guest?

A.

Install the new software on the host and wait for it to automatically be installed on all guests.

B.

Run the following command on guest

tmsh install sys software block-device-image image_name volume < volume_name>

C.

Run the following command on guest

tmsh install sys software image image_name volume < volume_name>

D.

Run the following command on host

tmsh install sys software block-device-image image_name volume < volume_name>

Full Access
Question # 38

A BIG-IP Administrator needs to apply a health monitor for a pool of database servers named DB_Pool

that uses TCP port 1521.

Where should the BIG-IP Administrator apply this monitor?

A.

Local Traffic > Profiles ยป Protocol > TCP

B.

Local Traffic > Nodes > Default Monitor

C.

Local Traffic > Pools > De Pool > Members

D.

Local Traffic > Pools > DB Pool > Properties

Full Access