DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. F5
  3. Application Delivery Fundamentals Exam
  4. F5.101.v2024-07-07.q200
  5. Question 1

Join the discussion

Question 1/200

Which two must be included in a Wide-IP definition for the Wide-IP to resolve a DNS query? (Choose two.)

Correct Answer: B,D

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (200q)
Q1. Which two must be included in a Wide-IP definition for the Wide-IP to resolve a DNS query?...
Q2. In the current version of BIG-IP, what happens if the GTM does not find a wide IP that mat...
Q3. Which tool is used on BIG-IP systems to capture data packets?...
Q4. Brute force protection will:
Q5. Which of the following statements best describes the ARX architecture?...
Q6. The SNMP monitor can collect data based on which three metrics? (Choose three.)...
Q7. A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192....
Q8. A client receives all of the expected data from a server and sends a FIN packet signaling ...
Q9. ARX will detect any modification to a file on the second tier because all clients are bein...
Q10. Which of the following methods of protection is not available within the Protocol Security...
Q11. A GTM System performs a name resolution that is not a Wide-IP. The name is in a domain for...
Q12. Which two of the following statements about how TMOS typically manages traffic between a c...
Q13. Which item is NOT a function of a properly deployed and configured ASM?...
Q14. What is the purpose of Zonerunner?
Q15. The LTM "Manager" authentication role can create iRules....
Q16. A BIG IP Administrator need to perform a packet capture and identify the source IP that is...
Q17. You need to terminate client SSL traffic at the BIG-IP and also to persist client traffic ...
Q18. A standard virtual server has been associated with a pool with multiple members. Assuming ...
Q19. With standard DNS, assuming no DNS request failures, which process describes the normal re...
Q20. Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Cho...
Q21. Which of the following is not a configurable parameter data type?...
Q22. Drag and Drop Question Match the security-related term with the correct definition. 1. Dem...
Q23. A site wishes to use an external monitor. Other than what is coded in the monitor script, ...
Q24. What technology does ARX use to create a logical abstraction of the physical storage envir...
Q25. CSRF is difficult to detect because:
Q26. ________% of F5 products are sent through thorough software testing before being sold to c...
Q27. How many events can be referenced in a given iRule?...
Q28. AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH ...
Q29. An administrator deploys a site in which the load balancer only sees the ingress traffic f...
Q30. An administrator needs to connect a new device to a switched network. The interconnect mus...
Q31. Which of the following is NOT a benefit of using SSL offload?...
Q32. What are some changes that must be made on the GTM System so that log messages are sent to...
Q33. Which four of the monitoring methods listed below can GTM use to determine the status and ...
Q34. Place the following items in the order that the BIG-IP device uses when processing a packe...
Q35. Which four of the monitoring methods listed below can GTM use to determine the status and ...
Q36. APM provides access control lists at which two OSI layers? (Choose two.)...
Q37. A BIG-IP has the following objects configured: A SNAT pool with 2 members: (Exhibit) A vir...
Q38. Which level of parameter assumes the highest precedence in BIG-IP ASM System processing lo...
Q39. On a standalone BIG-IP ASM system, which of the following configuration is valid?...
Q40. Which is NOT an ASM protection method for cross site scripting?...
Q41. Which three of these scenarios should you identify as being an APM opportunity?...
Q42. Match each persistence method with the correct statement describing it:...
Q43. An HTTP class is available
Q44. Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?...
Q45. Which programming language is the basis for F5 iRules?...
Q46. Which IP subnet mask can be used to send traffic to all network nodes?...
Q47. Poor Web application performance contributes to which four of these issues for businesses?...
Q48. SIMULATION A _______ object maps a FQDN to virtual servers. (Fill in)...
Q49. Which two of the following options can LTM use when all of the pool members are not availa...
Q50. A virtual server is listening at 10.10.1.100:any and has the following iRule associated wi...
Q51. An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks...
Q52. It is common for free storage space to exist somewhere in a business network that is not e...
Q53. in which scenario is a full proxy TCP connection required?...
Q54. Using file virtualization, what can the ARX do for customers?...
Q55. Learning suggestions in the Policy Building pages allow for which of the following? (Choos...
Q56. use a proprietary syntax language. must contain at least one event declaration. must conta...
Q57. User A and User B's workload are on the same VLAN, but connected through a transparent lay...
Q58. Which high availability feature allows two different BIG-IP devices to use the MAC address...
Q59. ASM's Web Scraping protection:
Q60. To make complex access policies easier to manage, an administrator can create a policy con...
Q61. Monitors can be assigned to which three resources. (Choose three.)...
Q62. In the next few years, 75% of new storage capacity will shift to unstructured data (also k...
Q63. What are two advantages of the Quality of Service (QoS) load balancing method? (Choose two...
Q64. Which of the following is a benefit of using iRules?...
Q65. Which of the following is not a feature of a standalone BIG-IP ASM System?...
Q66. Which three of these are the potential ending options for branches in the Visual Policy Ed...
Q67. After editing and saving changes to the configuration file containing virtual servers, wha...
Q68. A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) c...
Q69. Pool A has three members. Why is the pool up?
Q70. Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?...
Q71. Which two of the following are costs businesses may face in dealing with unstructured data...
Q72. Which of the following is a client-side action in the Visual Policy Editor that prevents e...
Q73. LTM can only load balance outbound traffic by using iRules...
Q74. The current status of a given pool is offline (red). Which condition could explain that st...
Q75. Click the Exhibit Button an LTM has the 3 virtual servers, a SNAT defined, four self IP ad...
Q76. Assume a virtual server is configured with a ClientSSL profile. What would the result be i...
Q77. A company recently opened a new branch site. The site needs to access the internet through...
Q78. A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to ano...
Q79. Requests that do not meet the ASM security policies can:...
Q80. DRAG DROP Place the following items in the order that the BIG-IP device uses when processi...
Q81. Which of the following is correct regarding User-defined Attack signatures?...
Q82. GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers...
Q83. Which two F5 platforms include specialized compression hardware?...
Q84. Which statement describes advanced shell access correctly?...
Q85. Which of the following is correct regarding User-defined Attack signatures?...
Q86. The LTM "Manager" authentication role can create iRules....
Q87. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the...
Q88. What does the insert XForwarded option in an HTTP profile do?...
Q89. A user's access to resources can change based on the computer they connect from....
Q90. When configuring the BIG-IP ASM System in redundant pairs, which of the following are sync...
Q91. Which statement is true concerning the default communication between a redundant pair of B...
Q92. Which persistence method will always recognize a client when the client returns to the sam...
Q93. Assuming there are open connections through an active system's NAT and a fail-over occurs,...
Q94. If the config tool is complete, which two access methods are available by default for GTM ...
Q95. A virtual server is defined per the charts. The last five client connections were to membe...
Q96. A user is building a security policy using the Deployment Wizard and the Rapid Deployment ...
Q97. Which statement is true concerning packet filters?...
Q98. A user is building a security policy using the Deployment Wizard and the Rapid Deployment ...
Q99. Which statement is true concerning iRules?
Q100. TCP Express enables LTM to use different TCP settings for the connection between the clien...
Q101. in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?...
Q102. The APM Dashboard enables administrators to monitor which two of these metrics?...
Q103. A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unen...
Q104. A standard virtual server is defined with a pool and a SNAT using automap. All other setti...
Q105. Which statement is true concerning cookie persistence....
Q106. How is persistence configured? (Exhibit)
Q107. What is a benefit of configuring BIG-IP devices in active-active high availability mode?...
Q108. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)...
Q109. What is the purpose of MAC masquerading?
Q110. Poor Web application performance contributes to which four of these issues for businesses?...
Q111. When using a single BIG-IP with APM, an organization can support up to 60,000 concurrent r...
Q112. Network Security personnel are entirely responsible for web application security....
Q113. Which of the following are correct regarding Wildcard entities? (Choose 2)...
Q114. Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabil...
Q115. The partial configuration below includes an iRule, a virtual server, and pools. When traff...
Q116. BIG-IP ASM is requesting automatic signature updates from the F5 update service Who is con...
Q117. Which are immediate results of entering the following command: b pool PoolA . { lb method ...
Q118. Which of the following is NOT a benefit of using SSL offload?...
Q119. Which two statements are true about NATs. (Choose two.)...
Q120. A site would like to ensure that a given web server's default page is being served correct...
Q121. To make complex access policies easier to manage, an administrator can create a policy con...
Q122. Which four F5 products are on the TMOS platform? (Choose four.)...
Q123. Why does deploying LTM into an existing network immediately improve security?...
Q124. The ARX is like a mini network manager. It is able to check the health of the environment ...
Q125. The production version of BIG-IP Virtual Edition is limited to 200 Mbps throughput....
Q126. A pool is using Round Trip Time as its load balancing method (Alternate: Round Robin; Fall...
Q127. When using a routed configuration, the real server mustpoint to the LTM as the _________....
Q128. Administrators can configure which three of the following load balancing options in GTM? (...
Q129. Which three of these file types work well with HTTP compression? (Choose three.)...
Q130. Sensitive parameter is a feature used to hide sensitive information from being displayed i...
Q131. Which of the following can be accomplished using iRules?...
Q132. A virtual server is defined per the charts. The last five client connections were to membe...
Q133. Select the two best questions you would use to ask your customer about their current web a...
Q134. Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server proc...
Q135. Which two of the following are costs businesses may face in dealing with unstructured data...
Q136. What is the purpose of floating self-IP addresses?...
Q137. A virtual server is listening at 10.10.1.100:80 and has the following iRule associated wit...
Q138. Basic F5 IP Geolocation provides which four types of client information?...
Q139. A virtual server at 10.10.1.100:80 has the rule listed below applied. when HTTP_REQUEST { ...
Q140. Which tool is used on BIG-IP systems to capture data packets?...
Q141. To make complex access policies easier to manage, an administrator can create a containing...
Q142. Which of the following is NOT included on the F5 DevCentral site?...
Q143. Which three of these software modules can you layer on top of LTM on a BIG-IP device?...
Q144. The Web Application Security Administrator user role can perform which of the following fu...
Q145. How is persistence configured. (Exhibit)
Q146. An LTM has the 3 virtual servers, four self IP addresses defined and the networks shown in...
Q147. Adding more RAM to a GTM device drastically improves query performance....
Q148. An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.25...
Q149. Which is NOT a function of ASM?
Q150. Administrators can configure which three of the following load balancing options in GTM? (...
Q151. A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connectio...
Q152. What we two advantages of using SSL offloading? (Choose two)...
Q153. In a routed configuration, what does LTM do with the packet before sending it to the pool ...
Q154. The drawback to having BIG-IP act as a full application proxy is the decrease in applicati...
Q155. Learning suggestions can be the result of:
Q156. Which action CANNOT be performed by an iRule?
Q157. When initially configuring the BIG-IP system using the config utility, which two parameter...
Q158. CORRECT TEXT Match the security-related term with the correct definition. 1.OWASP Top 10 2...
Q159. Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server proc...
Q160. The LTM "Manager" authentication role can create iRules....
Q161. Even though F5 is an application delivery controller, it can also effectively mitigate att...
Q162. FastCache will NOT work with compressed objects....
Q163. Organizations are moving towards a cloud solution are good candidates for F5 WOM solutions...
Q164. Which cookie persistence method requires the fewest configuration changes on the web serve...
Q165. Which three of the following must be done in order for GTM to properly communicate LTM?...
Q166. What is the main cause of high latency in a Web application?...
Q167. Select F5 platforms have which three certifications?...
Q168. Which of the following statements about cookie persistence is NOT true?...
Q169. A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of ...
Q170. If a client's browser does not accept cookies, what occurs when the client connects to a v...
Q171. Another name for the F5 OneConnect feature is TCP multiplexing....
Q172. As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What ...
Q173. The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned...
Q174. An F5 customer must install WebAccelerator on top of LTM:...
Q175. When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Acti...
Q176. In order to improve GTM performance, administrators should use multiple complex monitors t...
Q177. GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM device...
Q178. The administrator must specify APM access control entries as either L4 or L7....
Q179. How does the ARX eliminate the disruption caused by re-provisioning storage?...
Q180. Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the...
Q181. Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing int...
Q182. What happens when the data center that GTM recommends for a client is unavailable?...
Q183. The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy...
Q184. A BIG IP Administrator observes that the pool member status is a blue square What does thi...
Q185. When using LDAP for authentication, what is the purpose of the base ON?...
Q186. Administrators can specify an APM access profile when defining a virtual server in LTM....
Q187. A pool is using Global Availability as its load balancing method (Alternate: Round Robin; ...
Q188. Which of the following methods of protection are used by the BIG-IP ASM System to mitigate...
Q189. A user's access to resources can change based on the computer they connect from....
Q190. As a full TCP proxy, LTM acts as the termination point for both requests from the client a...
Q191. Which three of the metrics listed below can GTM use when making load balancing decisions f...
Q192. After editing and saving changes to the configuration file containing virtual servers, wha...
Q193. What does HTTP status code 500 mean?
Q194. Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)...
Q195. Which of the following are default settings when using the Policy Builder to build a secur...
Q196. The ARX saves customers time, money and frustration through a stub-based system that makes...
Q197. What are some changes that must be made on the GTM System so that log messages are sent to...
Q198. Which protocol data unit (PDU) is associated with the OSI model Network layer?...
Q199. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
Q200. Where is the load balancing mode specified?
[×]

Download PDF File

Enter your email address to download F5.101.v2024-07-07.q200.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.