Join the discussion
Question 1/212
When an optimized TCP connection exists between LTM and the pool member, LTM can accept serverresponses faster than the client. What is the name of this feature?
Correct Answer: B
Add Comments
- Other Question (212q)
- Q1. When an optimized TCP connection exists between LTM and the pool member, LTM can accept se...
- Q2. A customer wants the best possible throughput but only has a maximum of 3RU rack space. Wh...
- Q3. A site wishes to perform source address translation on packets from some clients but not o...
- Q4. What are two examples of network layer protocols? (Choose two)...
- Q5. Which of the following is NOT a benefit of using SSL offload?...
- Q6. When using the setup utility to configure a redundant pair, you are asked to provide a "Fa...
- Q7. Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing int...
- Q8. Administrators can customize APM to resemble other internal Web applications in the organi...
- Q9. The least connections load balancing method functions best when all pool members sharesimi...
- Q10. When initially configuring the BIG-IP System using the config tool, which of the following...
- Q11. Which three must be done so that Generic Host Servers can be monitored using SNMP? (Choose...
- Q12. Which of the following is NOT included on the F5 DevCentral site?...
- Q13. The SNMP monitor can collect data based on which three metrics? (Choose three.)...
- Q14. If a workstation is configured with an address of 224 0.0.1 which functionality will it al...
- Q15. Which of the following mitigation techniques is based on anomaly detection? (Choose two)...
- Q16. How is traffic flow through transparent virtual servers different from typical virtual ser...
- Q17. The BIG-IP full proxy architecture has full visibility from the client to the server and f...
- Q18. When DNS_REV is used as the probe protocol by the GTM System, which information is expecte...
- Q19. A load balancer receives a TCP SYN packet from a client and immediately sends the packet o...
- Q20. Which of the following are properties of an ASM logging profile? (Choose 2)...
- Q21. A user's access to resources can change based on the computer they connect from....
- Q22. Which of the following statements best describes the ARX architecture?...
- Q23. As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What ...
- Q24. Basic F5 IP Geo location provides which four types of client information?...
- Q25. Which statement about Generic Host Servers is true?...
- Q26. A certificate chain can be used for which purpose?...
- Q27. Complete the statement below by choosing the correct word or phrase to complete the senten...
- Q28. When upgrading a BIG-IP redundant pair, what happens when one system has been updated but ...
- Q29. Select the key reasons F5 is able to handle DNS DDoS attacks so effectively?Select two....
- Q30. Which protocol data unit (PDU) is associated with the OSI model's Physical layer?...
- Q31. How is traffic flow through transparent virtual servers different from typical virtual ser...
- Q32. The APM Dashboard enables administrators to monitor which two of these metrics? (Choose tw...
- Q33. If LTM uses the round robin load balancing method, which pool member in the diagram above ...
- Q34. Which programming language is the basis for F5 iRules?...
- Q35. Which of the following protocol protections is not provided by the Protocol Security Manag...
- Q36. When is the server also a client?
- Q37. What is the purpose of Zonerunner?
- Q38. Which of the following methods of protection is not available within the Protocol Security...
- Q39. Ethernet frame FCS errors occur when which calculation fails?...
- Q40. The drawback to having BIG-IP act as a full application proxy is the decrease in applicati...
- Q41. A BIG-IP has a virtual server at 150.150.10.10:80 with SNAT automap configured. This BIG-I...
- Q42. Which two statements are true about NATs. (Choose two.)...
- Q43. After all expected HTTP data has been sent from a server to a client, the client does not ...
- Q44. When defining a loadbalancing pool using the command line, if the loadbalancing method is ...
- Q45. What does response code HTTP 302 represent?
- Q46. The following request is sent to the BIG-IP ASM System: GET http://www.example.local/finan...
- Q47. LTM runs on______F5's proprietary product platform. (Fill in the correct answer)...
- Q48. Another name for the F5 OneConnect feature is TCP multiplexing....
- Q49. When users are created, which three access levels can be granted through the GTM Configura...
- Q50. A virtual server is listening at 10.10.1.100:any and has the following iRule associated wi...
- Q51. The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access m...
- Q52. An administrator needs to prepare change control documents for operations staff To reduce ...
- Q53. Generally speaking, should the monitor templates be used as production monitors or should ...
- Q54. Which statement is true regarding fail-over?
- Q55. The least connections load balancing method functions best when all pool members share sim...
- Q56. A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is...
- Q57. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)...
- Q58. Which of the following statements is true about ARX's capacity balancing ability?...
- Q59. Which three of the following are unique differentiators for F5 in the marketplace? (Choose...
- Q60. Using IP Geolocation, an organization can always direct a client request from France to a ...
- Q61. A company deploys F5 load balancers to manage a large number of secure applications. The c...
- Q62. Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value....
- Q63. When using a routed configuration, the real server must point to the LTM as the ________....
- Q64. Where is the MAC masquerade address configured?...
- Q65. A BIG-IP has two load balancing virtual servers at 150.150.10.10:80 and 150.150.10.10:443....
- Q66. DRAG DROP Match the security-related term with the correct definition. 1. OWASP Top 10 2. ...
- Q67. Could an iRule perform persistence based on a cookie?...
- Q68. Assuming there are open connections through an active system's NAT and a failover occurs, ...
- Q69. An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.25...
- Q70. What is the purpose of provisioning?
- Q71. ASM Geolocation reporting provides information regarding:...
- Q72. Which of the following is a language used for content provided by a web server to a web cl...
- Q73. Which programming language is the basis for F5 iRules?...
- Q74. Which statement is true concerning packet filters?...
- Q75. When we have a * wildcard entity configured in the File Type section with tightening enabl...
- Q76. FastCache will NOT work with compressed objects....
- Q77. How is persistence configured. (Exhibit)
- Q78. Refer ex (Exhibit)
- Q79. What is NOT a benefit of using a SNAT?
- Q80. Which of the following protocols can be protected by Protocol Security Manager? (Choose th...
- Q81. Which three of these scenarios should you identify as being an APM opportunity? (Choose th...
- Q82. An administrator is planning on solving latency issues by placing the backup data center i...
- Q83. A virtual server is defined per the charts. The last five client connections were to membe...
- Q84. ASM offers the most extensive, effective, and simplest to configure CSRF protection in the...
- Q85. Which of the following statements are incorrect regarding protection of web services? (Cho...
- Q86. Which must be sent to the license server to generate a new license?...
- Q87. Select the best word or phrase to complete the following sentence. Using the_________featu...
- Q88. Which is NOT an ASM protection method for cross site scripting?...
- Q89. Which statement describes a typical purpose of iRules?...
- Q90. Which two must be included in a Wide-IP definition for the Wide-IP to resolve a DNS query?...
- Q91. Using IP Geolocation, an organization can always direct a client request from France to a ...
- Q92. When configuring a pool member's monitor, which three association options are available? (...
- Q93. Which two of these statements about OneConnect are true?...
- Q94. How many events can be referenced in a given iRule?...
- Q95. What is an advantage of a packet forwarding architecture?...
- Q96. Which of the following is a benefit of using iRules?...
- Q97. If the BIG-IP device is NOT always located between the client and the server, it will NOT ...
- Q98. Learning suggestions in the Policy Building pages allow for which of the following? (Choos...
- Q99. LTM runs on______F5's proprietary product platform. (Fill in the correct answer)...
- Q100. Which of the following is a client-side action in the Visual Policy Editor that prevents e...
- Q101. You can use an HTTP class profile to forward traffic that matches which three of these typ...
- Q102. A virtual server is listening at 10.10.1.100:any and has the following iRule associated wi...
- Q103. You can use an HTTP class profile to forward traffic that matches which three of these typ...
- Q104. An administrator needs to load balance connections to the application server with the lowe...
- Q105. A site has six members in a pool. Three of the servers are new and have more memory and a ...
- Q106. A new VLAN segment has been added to the network. Only the existing connected interface ma...
- Q107. To share device information with F5 technical support, a customer must either verbally sha...
- Q108. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
- Q109. Which of the following is a client-side action in the Visual Policy Editor that prevents e...
- Q110. Information leakage is a major obstacle to achieving PCI DSS compliance....
- Q111. Which of the following statements about cookie persistence is NOT true?...
- Q112. DRAG DROP Match the five elements of the intelligent file virtualization with the appropri...
- Q113. ASM offers the most extensive, effective, and simplest to configure CSRF protection in the...
- Q114. The APM Dashboard enables administrators to monitor which two of these metrics?...
- Q115. A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unen...
- Q116. What is NOT a benefit of using a SNAT?
- Q117. A site wishes to perform source address translation on packets arriving from the Internet ...
- Q118. Assume the bigd daemon fails on the active system. Which three are possible results. (Choo...
- Q119. The Rapid Deployment Policy is used to:
- Q120. An administrator connects two devices using an Ethernet cable. The link fails to come up o...
- Q121. Which of the following can be accomplished using iRules?...
- Q122. When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Acti...
- Q123. Without creating a user-defined region, what is the most specific group a topology record ...
- Q124. Which is NOT a function of ASM?
- Q125. Which two statements are true concerning capabilities of current BIG-IP platforms? (Choose...
- Q126. The Policy Builder benefits include:
- Q127. Which three properties can be assigned to nodes? (Choose three.)...
- Q128. Why does deploying LTM into an existing network immediately improve security?...
- Q129. What describes the third ''A'' in the common authentication acronym AAA?...
- Q130. A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of ...
- Q131. A GTM System performs a name resolution that is not a Wide-IP. The name is in a domain for...
- Q132. A site wishes to use an external monitor. Other than what is coded in the monitor script, ...
- Q133. Sensitive parameter is a feature used to hide sensitive information from being displayed i...
- Q134. GTM solves which three of these standard DNS limitations?...
- Q135. A pool is using Global Availability as its load balancing method (Alternate: Round Robin; ...
- Q136. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the...
- Q137. Administrators can specify an APM access profile when defining a virtual server in LTM....
- Q138. An administrator is given the IP Address of 192.168.100.124 and needs 64 subnets. How many...
- Q139. A BIG-IP has two load balancing virtual servers at 150.150.10.10:80 and 150.150.10.10:443....
- Q140. What occurs when a load?command is issued?What occurs when a ? load?command is issued?...
- Q141. Which four of the following items are physical objects used by GTM?...
- Q142. Which is a potential result when a trunk is configured on a BIG-IP?...
- Q143. The incoming client IP address is 195.64.45.52 and the last five connections have been sen...
- Q144. In the context of load balancing, what does the term persistence" refer to?...
- Q145. Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effective...
- Q146. An LTM object represents a downstream server that hosts a secure Web site and contains the...
- Q147. DNSSEC is a GTM add-on licensing feature.
- Q148. Which statement describes a typical purpose of iRules....
- Q149. An LTM object that represents a downstream server contains the IP address 192.168.9.250 an...
- Q150. Which HTTP response code ranges indicate an error condition? (Choose two.)...
- Q151. TCP Express enables LTM to use different TCP settings for the connection between the clien...
- Q152. What does the BIG-IP_add script do?
- Q153. Which two F5 platforms include specialized compression hardware? (Choose two.)...
- Q154. Assuming there are open connections through an active system's virtual servers and a failo...
- Q155. Which two can be a part of a virtual server's definition. (Choose two.)...
- Q156. A BIG-IP has the following objects configured: A SNAT pool with 2 members: 150.10.33.33 an...
- Q157. Which two processes are involved when BIG-IP systems issue traps? (Choose two.)...
- Q158. Which statement concerning virtual servers is true?...
- Q159. What will likely happen if you were to define a LTM System in the wrong Data Center?...
- Q160. What technology does ARX use to create a logical abstraction of the physical storage envir...
- Q161. An administrator needs a data a format that is support authentication against an external ...
- Q162. APM provides access control lists at which two OSI layers,...
- Q163. Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two....
- Q164. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
- Q165. What is the main business driver for bringing Enterprise Manager into the network infrastr...
- Q166. Drag and Drop Question Match the security-related term with the correct definition. 1. Dem...
- Q167. A BIG-IP administrator is interested in using some of the vCMP What should impact the admi...
- Q168. The Policy Builder benefits include:
- Q169. On a standalone BIG-IP ASM system, which of the following configuration is valid?...
- Q170. A virtual server at 10.10.1.100:80 has the rule listed below applied. when HTTP_REQUEST { ...
- Q171. A standard virtual server is defined with a pool and a SNAT using automap. All other setti...
- Q172. TMOS is an F5 software module that runs on the BIG-IP platform....
- Q173. Which is a potential result when a trunk is configured on a BIG-IP?...
- Q174. Which three of these file types work well with HTTP compression? (Choose three.)...
- Q175. You need to terminate client SSL traffic at the BIGElIP and also to persist client traffic...
- Q176. What is NOT a benefit of using a SNAT?
- Q177. Even though F5 is an application delivery controller, it can also effectively mitigate att...
- Q178. Tl SISSL prides which functionary when a web browser connects to web site using the HTTPS ...
- Q179. LTM runs on________F5's proprietary product platform. (Fill in the correct answer)...
- Q180. Which of the following is NOT included on the F5 DevCentral site?...
- Q181. What occurs when a save-config command is issued?...
- Q182. Which of the following is NOT a profile type on the BIG-IP?...
- Q183. Assuming there are open connections through an active system's NAT and a failover occurs, ...
- Q184. An administrator suspects that a BIG IP appliance is experiencing performing issue due to ...
- Q185. The main drawback to using an APM Deployment Wizard is that it is not possible to edit the...
- Q186. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
- Q187. The Protected Workspace client-side action provides more client-side security than the Cac...
- Q188. Which four of the following statements about LDNS probes are true? (Choose four.)...
- Q189. An administrator is planning on solving latency issues by placing the backup data center i...
- Q190. Which of the following statements are correct regarding Attack signatures? (Choose 2)...
- Q191. in which scenario is a full proxy TCP connection required?...
- Q192. An inline ASM configuration requires:
- Q193. LTM can only load balance outbound traffic by using iRules...
- Q194. Which HTTP response code ranges indicate an error condition? (Choose 2)...
- Q195. What is a primary reason to choose hardware over virtual devices?...
- Q196. An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined, and the network...
- Q197. What occurs when a save? command is issued? What occurs when a ? save? Command is issued?...
- Q198. GTM can load balance to LTM in addition to non-BIG-IP hosts....
- Q199. When upgrading a BIG-IP redundant pair, what happens when one system has been updated but ...
- Q200. If a customer has an application that uses a customized protocol, what LTM feature can hel...
- Q201. The least connections load balancing method functions best when all pool members share sim...
- Q202. Which two of the following are costs businesses may face in dealing with unstructured data...
- Q203. Which of the following are four of the benefits of the TMOS architecture?...
- Q204. Poor Web application performance contributes to which four of these issues for businesses?...
- Q205. In the next few years, 75% of new storage capacity will shift to unstructured data (also k...
- Q206. What feature of the F5 Exchange solution helps administrators to streamline implementation...
- Q207. The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access m...
- Q208. There are multiple HTTP class profiles assigned to a virtual server. Each profile has Appl...
- Q209. Which three of these are the potential ending options for branches in the Visual Policy Ed...
- Q210. Which two must be included in a Wide-lP definition for the Wide-lP to resolve a DNS query?...
- Q211. To share device information with F5 technical support, a customer must either verbally sha...
- Q212. Which four of these statements regarding object size and WebAccelerator performance are tr...
