Join the discussion
Add Comments
- Other Question (99q)
- Q1. CSRF is difficult to detect because:
- Q2. ASM offers the most extensive, effective, and simplest to configure CSRF protection in the...
- Q3. The BIG-IP determines the lowest connection speed between the client and the server and th...
- Q4. What are the two most common methods of placing a BIG-IP device into a network environment...
- Q5. In the next few years, 75% of new storage capacity will shift to unstructured data (also k...
- Q6. In order to further accelerate applications, the external router can direct subsequent cli...
- Q7. If the BIG-IP device is NOT always located between the client and the server, it will NOT ...
- Q8. Even though F5 is an application delivery controller, it can also effectively mitigate att...
- Q9. Administrators can configure which three of the following load balancing options in GTM?...
- Q10. When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacit...
- Q11. Which three of the following are unique differentiators for F5 in the marketplace?...
- Q12. An administrator is adding GTM to the network infrastructure. Which of the following requi...
- Q13. Using IP Geolocation, an organization can always direct a client request from France to a ...
- Q14. Brute force protection will:
- Q15. Select the keyquestionyou would use to ask your customer related to DNS attacks?...
- Q16. GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers...
- Q17. When a business is hacked, they often lose more than money. What are the other consequence...
- Q18. Why does deploying LTM into an existing network immediately improve security?...
- Q19. The Device Inventory option in Enterprise Manager can replace an organization's static Exc...
- Q20. Which of the following are four of the benefits of the TMOS architecture?...
- Q21. Which three of these software modules can you layer on top of LTM on a BIG-IP device?...
- Q22. CORRECT TEXT LTM runs on________F5's proprietary product platform. (Fill in the correct an...
- Q23. Which of the following is NOT a profile type on the BIG-IP?...
- Q24. The Policy Builder benefits include:
- Q25. Another name for the F5 OneConnect feature is TCP multiplexing....
- Q26. CORRECT TEXT Match the security-related term with the correct definition. 1.Demilitarized ...
- Q27. The Policy Builder benefits include:
- Q28. What is the main business driver for bringing Enterprise Manager into the network infrastr...
- Q29. Over the years, F5 has led the industry in which of the four following areas?...
- Q30. Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value....
- Q31. Which of the following statements about Web server offload is NOT true?...
- Q32. ARX will detect any modification to a file on the second tier because all clients are bein...
- Q33. Which two of these statements about OneConnect are true?...
- Q34. CORRECT TEXT Match the security-related term with the correct definition. 1.OWASP Top 10 2...
- Q35. Which of the following is NOT a method that TMOS uses to improve the performance of applic...
- Q36. Adding more RAM to a GTM device drastically improves query performance....
- Q37. Using Fast Cache with ASM will:
- Q38. Which of the following is NOT a profile type on the BIG-IP?...
- Q39. LTM can only load balance outbound traffic by using iRules...
- Q40. Which WOM feature replaces a long byte pattern, such as "100000111000110101", with a short...
- Q41. When an optimized TCP connection exists between LTM and the pool member, LTM can accept se...
- Q42. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:...
- Q43. When using only LTM in redundant pairs, a customer can load balance to multiple data cente...
- Q44. In a routed configuration, what does LTM do with the packet before sending it to the pool ...
- Q45. The Rapid Deployment Policy is used to:
- Q46. Which three are GTM server dynamic load balancing modes?...
- Q47. When an administrator creates a new access policy in the Visual Policy Editor, which three...
- Q48. Which four are GTM server static load balancing modes?...
- Q49. Poor Web application performance contributes to which four of these issues for businesses?...
- Q50. WebAccelerator uses three tiers to improve performance. What are the three tiers?...
- Q51. An age-based policy is set up on the ARX that retains only data modified in the Iast 3 mon...
- Q52. Which three of the following must be done in order for GTM to properly communicate LTM?...
- Q53. FastCache will NOT work with compressed objects....
- Q54. As a full TCP proxy, LTM acts as the termination point for both requests from the client a...
- Q55. An F5 customer must install WebAccelerator on top of LTM:...
- Q56. The PCI compliance report is proof that a company is secure....
- Q57. ARX can classify data based on all of the following EXCEPT:...
- Q58. Select F5 platforms have which three certifications?...
- Q59. Very low administrative impact:
- Q60. If LTM uses the round robin load balancing method, which pool member in the diagram above ...
- Q61. Mobile device browsers typically display Web pages more slowly than PC browsers....
- Q62. Which three of these software modules can you layer on top of LTM on a BIG-IP device?...
- Q63. Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effective...
- Q64. Which three of these scenarios should you identify as being an APM opportunity?...
- Q65. The Protected Workspace client-side action provides more client-side security than the Cac...
- Q66. CORRECT TEXT The layer 3 security feature__________Cookies protects against SYN floods, Do...
- Q67. Which of the following is NOT included on the F5 DevCentral site?...
- Q68. CORRECT TEXT GTM uses the F5.............protocol to synchronize performance metrics betwe...
- Q69. CORRECT TEXT A_______object maps a FQDN to virtual servers. (Fill in)...
- Q70. Which item is NOT a function of a properly deployed and configured ASM?...
- Q71. Which aspect of F5's Intelligent Services Platform helps you extend your security conversa...
- Q72. A user's access to resources can change based on the computer they connect from....
- Q73. For a typical business, what percentage of data does the ARX usually move to a secondary t...
- Q74. Requests that do not meet the ASM security policies can:...
- Q75. If a customer has an application that uses a customized protocol, what LTM feature can hel...
- Q76. Which of the following business benefits does storage tiering offer to customers?...
- Q77. TMOS is an F5 software module that runs on the BIG-IP platform....
- Q78. Administrators can customize APM to resemble other internal Web applications in theorganiz...
- Q79. Which of the following can be accomplished using iRules?...
- Q80. ASM Geolocation reporting provides information regarding:...
- Q81. Customers can purchase LTM as a stand-alone product, or layer it with additional softwarem...
- Q82. WebAccelerator uses three tiers to improve performance. What are the three tiers?...
- Q83. Network Security personnel are entirely responsible for web application security....
- Q84. The Protected Workspace client-side action provides more client-side security than the Cac...
- Q85. Learning suggestions can be the result of:
- Q86. Which three of the metrics listed below can GTM use when making load balancing decisions f...
- Q87. What technology does ARX use to create a logical abstraction of the physical storage envir...
- Q88. Which two of the following factors are often responsible for poor Web application performa...
- Q89. Which of the following are the three main business drivers for placing LTM into a network?...
- Q90. When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Acti...
- Q91. The drawback to having BIG-IP act as a full application proxy is the decrease in applicati...
- Q92. The APM Dashboard enables administrators to monitor which two of these metrics?...
- Q93. Which of the following are the three main business drivers for placing LTM into a network?...
- Q94. Adding more RAM to a GTM device drastically improves query performance....
- Q95. The BIG-IP determines the lowest connection speed between the client and the server and th...
- Q96. APM provides access control lists at which two 051 layers...
- Q97. To make complex access policies easier to manage, an administrator can create a containing...
- Q98. ________% of F5 products are sent through thorough software testing before being sold to c...
- Q99. Which four of the following items are physical objects used by GTM?...
