Join the discussion
Question 1/200
Which two must be included in a Wide-IP definition for the Wide-IP to resolve a DNS query? (Choose two.)
Correct Answer: B,D
Add Comments
- Other Question (200q)
- Q1. Which two must be included in a Wide-IP definition for the Wide-IP to resolve a DNS query?...
- Q2. In the current version of BIG-IP, what happens if the GTM does not find a wide IP that mat...
- Q3. Which tool is used on BIG-IP systems to capture data packets?...
- Q4. Brute force protection will:
- Q5. Which of the following statements best describes the ARX architecture?...
- Q6. The SNMP monitor can collect data based on which three metrics? (Choose three.)...
- Q7. A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192....
- Q8. A client receives all of the expected data from a server and sends a FIN packet signaling ...
- Q9. ARX will detect any modification to a file on the second tier because all clients are bein...
- Q10. Which of the following methods of protection is not available within the Protocol Security...
- Q11. A GTM System performs a name resolution that is not a Wide-IP. The name is in a domain for...
- Q12. Which two of the following statements about how TMOS typically manages traffic between a c...
- Q13. Which item is NOT a function of a properly deployed and configured ASM?...
- Q14. What is the purpose of Zonerunner?
- Q15. The LTM "Manager" authentication role can create iRules....
- Q16. A BIG IP Administrator need to perform a packet capture and identify the source IP that is...
- Q17. You need to terminate client SSL traffic at the BIG-IP and also to persist client traffic ...
- Q18. A standard virtual server has been associated with a pool with multiple members. Assuming ...
- Q19. With standard DNS, assuming no DNS request failures, which process describes the normal re...
- Q20. Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Cho...
- Q21. Which of the following is not a configurable parameter data type?...
- Q22. Drag and Drop Question Match the security-related term with the correct definition. 1. Dem...
- Q23. A site wishes to use an external monitor. Other than what is coded in the monitor script, ...
- Q24. What technology does ARX use to create a logical abstraction of the physical storage envir...
- Q25. CSRF is difficult to detect because:
- Q26. ________% of F5 products are sent through thorough software testing before being sold to c...
- Q27. How many events can be referenced in a given iRule?...
- Q28. AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH ...
- Q29. An administrator deploys a site in which the load balancer only sees the ingress traffic f...
- Q30. An administrator needs to connect a new device to a switched network. The interconnect mus...
- Q31. Which of the following is NOT a benefit of using SSL offload?...
- Q32. What are some changes that must be made on the GTM System so that log messages are sent to...
- Q33. Which four of the monitoring methods listed below can GTM use to determine the status and ...
- Q34. Place the following items in the order that the BIG-IP device uses when processing a packe...
- Q35. Which four of the monitoring methods listed below can GTM use to determine the status and ...
- Q36. APM provides access control lists at which two OSI layers? (Choose two.)...
- Q37. A BIG-IP has the following objects configured: A SNAT pool with 2 members: (Exhibit) A vir...
- Q38. Which level of parameter assumes the highest precedence in BIG-IP ASM System processing lo...
- Q39. On a standalone BIG-IP ASM system, which of the following configuration is valid?...
- Q40. Which is NOT an ASM protection method for cross site scripting?...
- Q41. Which three of these scenarios should you identify as being an APM opportunity?...
- Q42. Match each persistence method with the correct statement describing it:...
- Q43. An HTTP class is available
- Q44. Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?...
- Q45. Which programming language is the basis for F5 iRules?...
- Q46. Which IP subnet mask can be used to send traffic to all network nodes?...
- Q47. Poor Web application performance contributes to which four of these issues for businesses?...
- Q48. SIMULATION A _______ object maps a FQDN to virtual servers. (Fill in)...
- Q49. Which two of the following options can LTM use when all of the pool members are not availa...
- Q50. A virtual server is listening at 10.10.1.100:any and has the following iRule associated wi...
- Q51. An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks...
- Q52. It is common for free storage space to exist somewhere in a business network that is not e...
- Q53. in which scenario is a full proxy TCP connection required?...
- Q54. Using file virtualization, what can the ARX do for customers?...
- Q55. Learning suggestions in the Policy Building pages allow for which of the following? (Choos...
- Q56. use a proprietary syntax language. must contain at least one event declaration. must conta...
- Q57. User A and User B's workload are on the same VLAN, but connected through a transparent lay...
- Q58. Which high availability feature allows two different BIG-IP devices to use the MAC address...
- Q59. ASM's Web Scraping protection:
- Q60. To make complex access policies easier to manage, an administrator can create a policy con...
- Q61. Monitors can be assigned to which three resources. (Choose three.)...
- Q62. In the next few years, 75% of new storage capacity will shift to unstructured data (also k...
- Q63. What are two advantages of the Quality of Service (QoS) load balancing method? (Choose two...
- Q64. Which of the following is a benefit of using iRules?...
- Q65. Which of the following is not a feature of a standalone BIG-IP ASM System?...
- Q66. Which three of these are the potential ending options for branches in the Visual Policy Ed...
- Q67. After editing and saving changes to the configuration file containing virtual servers, wha...
- Q68. A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) c...
- Q69. Pool A has three members. Why is the pool up?
- Q70. Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?...
- Q71. Which two of the following are costs businesses may face in dealing with unstructured data...
- Q72. Which of the following is a client-side action in the Visual Policy Editor that prevents e...
- Q73. LTM can only load balance outbound traffic by using iRules...
- Q74. The current status of a given pool is offline (red). Which condition could explain that st...
- Q75. Click the Exhibit Button an LTM has the 3 virtual servers, a SNAT defined, four self IP ad...
- Q76. Assume a virtual server is configured with a ClientSSL profile. What would the result be i...
- Q77. A company recently opened a new branch site. The site needs to access the internet through...
- Q78. A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to ano...
- Q79. Requests that do not meet the ASM security policies can:...
- Q80. DRAG DROP Place the following items in the order that the BIG-IP device uses when processi...
- Q81. Which of the following is correct regarding User-defined Attack signatures?...
- Q82. GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers...
- Q83. Which two F5 platforms include specialized compression hardware?...
- Q84. Which statement describes advanced shell access correctly?...
- Q85. Which of the following is correct regarding User-defined Attack signatures?...
- Q86. The LTM "Manager" authentication role can create iRules....
- Q87. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the...
- Q88. What does the insert XForwarded option in an HTTP profile do?...
- Q89. A user's access to resources can change based on the computer they connect from....
- Q90. When configuring the BIG-IP ASM System in redundant pairs, which of the following are sync...
- Q91. Which statement is true concerning the default communication between a redundant pair of B...
- Q92. Which persistence method will always recognize a client when the client returns to the sam...
- Q93. Assuming there are open connections through an active system's NAT and a fail-over occurs,...
- Q94. If the config tool is complete, which two access methods are available by default for GTM ...
- Q95. A virtual server is defined per the charts. The last five client connections were to membe...
- Q96. A user is building a security policy using the Deployment Wizard and the Rapid Deployment ...
- Q97. Which statement is true concerning packet filters?...
- Q98. A user is building a security policy using the Deployment Wizard and the Rapid Deployment ...
- Q99. Which statement is true concerning iRules?
- Q100. TCP Express enables LTM to use different TCP settings for the connection between the clien...
- Q101. in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?...
- Q102. The APM Dashboard enables administrators to monitor which two of these metrics?...
- Q103. A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unen...
- Q104. A standard virtual server is defined with a pool and a SNAT using automap. All other setti...
- Q105. Which statement is true concerning cookie persistence....
- Q106. How is persistence configured? (Exhibit)
- Q107. What is a benefit of configuring BIG-IP devices in active-active high availability mode?...
- Q108. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)...
- Q109. What is the purpose of MAC masquerading?
- Q110. Poor Web application performance contributes to which four of these issues for businesses?...
- Q111. When using a single BIG-IP with APM, an organization can support up to 60,000 concurrent r...
- Q112. Network Security personnel are entirely responsible for web application security....
- Q113. Which of the following are correct regarding Wildcard entities? (Choose 2)...
- Q114. Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabil...
- Q115. The partial configuration below includes an iRule, a virtual server, and pools. When traff...
- Q116. BIG-IP ASM is requesting automatic signature updates from the F5 update service Who is con...
- Q117. Which are immediate results of entering the following command: b pool PoolA . { lb method ...
- Q118. Which of the following is NOT a benefit of using SSL offload?...
- Q119. Which two statements are true about NATs. (Choose two.)...
- Q120. A site would like to ensure that a given web server's default page is being served correct...
- Q121. To make complex access policies easier to manage, an administrator can create a policy con...
- Q122. Which four F5 products are on the TMOS platform? (Choose four.)...
- Q123. Why does deploying LTM into an existing network immediately improve security?...
- Q124. The ARX is like a mini network manager. It is able to check the health of the environment ...
- Q125. The production version of BIG-IP Virtual Edition is limited to 200 Mbps throughput....
- Q126. A pool is using Round Trip Time as its load balancing method (Alternate: Round Robin; Fall...
- Q127. When using a routed configuration, the real server mustpoint to the LTM as the _________....
- Q128. Administrators can configure which three of the following load balancing options in GTM? (...
- Q129. Which three of these file types work well with HTTP compression? (Choose three.)...
- Q130. Sensitive parameter is a feature used to hide sensitive information from being displayed i...
- Q131. Which of the following can be accomplished using iRules?...
- Q132. A virtual server is defined per the charts. The last five client connections were to membe...
- Q133. Select the two best questions you would use to ask your customer about their current web a...
- Q134. Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server proc...
- Q135. Which two of the following are costs businesses may face in dealing with unstructured data...
- Q136. What is the purpose of floating self-IP addresses?...
- Q137. A virtual server is listening at 10.10.1.100:80 and has the following iRule associated wit...
- Q138. Basic F5 IP Geolocation provides which four types of client information?...
- Q139. A virtual server at 10.10.1.100:80 has the rule listed below applied. when HTTP_REQUEST { ...
- Q140. Which tool is used on BIG-IP systems to capture data packets?...
- Q141. To make complex access policies easier to manage, an administrator can create a containing...
- Q142. Which of the following is NOT included on the F5 DevCentral site?...
- Q143. Which three of these software modules can you layer on top of LTM on a BIG-IP device?...
- Q144. The Web Application Security Administrator user role can perform which of the following fu...
- Q145. How is persistence configured. (Exhibit)
- Q146. An LTM has the 3 virtual servers, four self IP addresses defined and the networks shown in...
- Q147. Adding more RAM to a GTM device drastically improves query performance....
- Q148. An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.25...
- Q149. Which is NOT a function of ASM?
- Q150. Administrators can configure which three of the following load balancing options in GTM? (...
- Q151. A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connectio...
- Q152. What we two advantages of using SSL offloading? (Choose two)...
- Q153. In a routed configuration, what does LTM do with the packet before sending it to the pool ...
- Q154. The drawback to having BIG-IP act as a full application proxy is the decrease in applicati...
- Q155. Learning suggestions can be the result of:
- Q156. Which action CANNOT be performed by an iRule?
- Q157. When initially configuring the BIG-IP system using the config utility, which two parameter...
- Q158. CORRECT TEXT Match the security-related term with the correct definition. 1.OWASP Top 10 2...
- Q159. Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server proc...
- Q160. The LTM "Manager" authentication role can create iRules....
- Q161. Even though F5 is an application delivery controller, it can also effectively mitigate att...
- Q162. FastCache will NOT work with compressed objects....
- Q163. Organizations are moving towards a cloud solution are good candidates for F5 WOM solutions...
- Q164. Which cookie persistence method requires the fewest configuration changes on the web serve...
- Q165. Which three of the following must be done in order for GTM to properly communicate LTM?...
- Q166. What is the main cause of high latency in a Web application?...
- Q167. Select F5 platforms have which three certifications?...
- Q168. Which of the following statements about cookie persistence is NOT true?...
- Q169. A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of ...
- Q170. If a client's browser does not accept cookies, what occurs when the client connects to a v...
- Q171. Another name for the F5 OneConnect feature is TCP multiplexing....
- Q172. As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What ...
- Q173. The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned...
- Q174. An F5 customer must install WebAccelerator on top of LTM:...
- Q175. When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Acti...
- Q176. In order to improve GTM performance, administrators should use multiple complex monitors t...
- Q177. GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM device...
- Q178. The administrator must specify APM access control entries as either L4 or L7....
- Q179. How does the ARX eliminate the disruption caused by re-provisioning storage?...
- Q180. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the...
- Q181. Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing int...
- Q182. What happens when the data center that GTM recommends for a client is unavailable?...
- Q183. The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy...
- Q184. A BIG IP Administrator observes that the pool member status is a blue square What does thi...
- Q185. When using LDAP for authentication, what is the purpose of the base ON?...
- Q186. Administrators can specify an APM access profile when defining a virtual server in LTM....
- Q187. A pool is using Global Availability as its load balancing method (Alternate: Round Robin; ...
- Q188. Which of the following methods of protection are used by the BIG-IP ASM System to mitigate...
- Q189. A user's access to resources can change based on the computer they connect from....
- Q190. As a full TCP proxy, LTM acts as the termination point for both requests from the client a...
- Q191. Which three of the metrics listed below can GTM use when making load balancing decisions f...
- Q192. After editing and saving changes to the configuration file containing virtual servers, wha...
- Q193. What does HTTP status code 500 mean?
- Q194. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)...
- Q195. Which of the following are default settings when using the Policy Builder to build a secur...
- Q196. The ARX saves customers time, money and frustration through a stub-based system that makes...
- Q197. What are some changes that must be made on the GTM System so that log messages are sent to...
- Q198. Which protocol data unit (PDU) is associated with the OSI model Network layer?...
- Q199. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
- Q200. Where is the load balancing mode specified?
