F5.101.v2018-07-18.q231

Exam Code:101
Exam Name:Application Delivery Fundamentals Exam
Certification Provider:F5
Free Question Number:231
Version:v2018-07-18
Rating:
# of views:1423
# of Questions views:58693
Start Practice Test

Valid 101 Dumps shared by PrepAwayExam.com for Helping Passing 101 Exam! PrepAwayExam.com now offer the newest 101 exam dumps, the PrepAwayExam.com 101 exam questions have been updated and answers have been corrected get the newest PrepAwayExam.com 101 dumps with Test Engine here:

Access Premium Version
(457 Q&As Dumps, 40%OFF Special Discount: freecram)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
709 viewsF5.101.v2018-03-11.q213
Exam Question List
Question 1: The F5 Application Delivery Firewall has the ability to outp...
Question 2: If the config tool is complete, which two access methods are...
Question 3: What are two advantages of the Quality of Service (QoS) load...
Question 4: ARX will detect any modification to a file on the second tie...
Question 5: If LTM uses the round robin load balancing method, which poo...
Question 6: What is the difference between primary and secondary DNS ser...
Question 7: Brute force protection will:
Question 8: The production version of BIG-IP Virtual Edition is limited ...
Question 9: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 10: When installing LTM on different VIPRION performance blades,...
Question 11: Without creating a user defined region, what is the most spe...
Question 12: Which of the following statements best describes the ARX arc...
Question 13: iQuery is a proprietary protocol that distributes metrics ga...
Question 14: Which two are events that can be used to trigger GTM iRule d...
Question 15: DRAG DROP Match the five elements of the intelligent file vi...
Question 16: How is persistence configured?
Question 17: Which of the following is correct concerning HTTP classes?...
Question 18: Which two can be a part of a virtual server's definition? (C...
Question 19: Which statement is true concerning SSL termination....
Question 20: Which statement is correct if a TOP-based monitor is assigne...
Question 21: In order to ensure that a specific file type is never moved ...
Question 22: Which two of the following are costs businesses may face in ...
Question 23: To function properly, an Enterprise Manager device is requir...
Question 24: Which of the following statements is true about ARX's capaci...
Question 25: Assume the bigd daemon fails on the active system. Which thr...
Question 26: Which two of the following statements are accurate descripti...
Question 27: The Protected Workspace client-side action provides more cli...
Question 28: Which IP address will the client address be changed to when ...
Question 29: What is the purpose of MAC masquerading?...
Question 30: The ARX saves customers time, money and frustration through ...
Question 31: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 32: A virtual server is listening at 10.10.1.100:any and has the...
Question 33: What is the purpose of floating self-IP addresses?...
Question 34: For a typical business, what percentage of data does the ARX...
Question 35: As a part of the Setup Utility, the administrator sets the h...
Question 36: The current status of a given pool member is unknown. Which ...
Question 37: Using Fast Cache with ASM will:...
Question 38: Which statement is true concerning SNATs using automap?...
Question 39: Basic F5 IP Geo location provides which four types of client...
Question 40: Identifying users by their IP address is a sufficient method...
Question 41: What will likely happen if you were to define a LTM System i...
Question 42: The incoming client IP address is 195.64.45.52 and the last ...
Question 43: How does the ARX eliminate the disruption caused by re-provi...
Question 44: Which of the following statements are correct regarding posi...
Question 45: What feature of the F5 Exchange solution helps administrator...
Question 46: Which is an advantage of terminating SSL communication at th...
Question 47: What is the advantage of specifying three load balancing met...
Question 48: APM can verify which four of the following details before gr...
Question 49: There are multiple HTTP class profiles assigned to a virtual...
Question 50: The SNMP monitor can collect data based on which three metri...
Question 51: A pool is using Global Availability as its load balancing me...
Question 52: Which facility logs messages concerning GTM System parameter...
Question 53: Which three can be a part of a pool's definition? (Choose th...
Question 54: A security audit has determined that your web application is...
Question 55: Which of the following is NOT a logging option within an APM...
Question 56: Where is persistence mirroring configured?...
Question 57: Which of the following statements are incorrect regarding pr...
Question 58: Select the two best questions you would use to ask your cust...
Question 59: Generally speaking, should the monitor templates be used as ...
Question 60: You have a pool of servers that need to be tested. All of th...
Question 61: A GTM System would like to ensure that a given LTM System is...
Question 62: What is the expected difference between two source address p...
Question 63: When probing LDNSs, which protocol is used by default?...
Question 64: When is a Virtual Server hosted by an LTM System defined wit...
Question 65: Which statement accurately describes the difference between ...
Question 66: A client sends a request to a virtual server http://www.foo....
Question 67: In most cases, F5 recommends using round robin load balancin...
Question 68: A virtual server is defined per the charts. The last five cl...
Question 69: A BIG-IP has two SNATs, a pool of DNS servers and a virtual ...
Question 70: When configuring a pool member's monitor, which three associ...
Question 71: ARX can classify data based on all of the following EXCEPT:...
Question 72: All members of a pool must share the same service port?...
Question 73: Which of the following are default settings when using the P...
Question 74: The BIG-IP ASM System sets two types of cookies to enforce e...
Question 75: What are some changes that must be made on the GTM System so...
Question 76: A virtual server is listening at 10.10.1.100:any and has the...
Question 77: A BIG-IP has two load balancing virtual servers at 150.150.1...
Question 78: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 79: The Protected Workspace client-side action provides more cli...
Question 80: Which aspect of F5's Intelligent Services Platform helps you...
Question 81: What is the purpose of provisioning?...
Question 82: ASM provides antivirus protection by:...
Question 83: Which four of these statements regarding object size and Web...
Question 84: An F5 customer must install WebAccelerator on top of LTM:...
Question 85: Which VLANs must be enabled for a SNAT to perform as desired...
Question 86: Which statement describes a typical purpose of iRules?...
Question 87: Which of the following statements are correct regarding Atta...
Question 88: What is a characteristic of iQuery?...
Question 89: A site wishes to delegate the name .wmysite.com to a GTM Sys...
Question 90: Which process or system can be monitored by the BIG-IP syste...
Question 91: Which of the following methods of protection is not availabl...
Question 92: Logging profiles are assigned to?...
Question 93: An inline ASM configuration requires:...
Question 94: DRAG DROP Match these terms with their description. Select a...
Question 95: Which of the following methods of protection operates on ser...
Question 96: Assuming there are open connections through an active system...
Question 97: What percentage of storage in a typical environment is activ...
Question 98: Although not all modules run on all platforms, each F5 hardw...
Question 99: A monitor has been defined using the HTTP monitor template. ...
Question 100: Administrators can specify an APM access profile when defini...
Question 101: When configuring the BIG-IP ASM System in redundant pairs, w...
Question 102: DRAG DROP Match the security-related term with the correct d...
Question 103: Which two F5 platforms include specialized compression hardw...
Question 104: Assume a client's traffic is being processed only by a NAT; ...
Question 105: Which four are GTM server static load balancing modes? (Choo...
Question 106: Replicating a large database between sites could take severa...
Question 107: Which of the following is correct regarding static parameter...
Question 108: Why does the F5 Application Delivery Firewall solution mitig...
Question 109: Select F5 platforms have which three certifications? (Choose...
Question 110: Which statement is true concerning iRule events....
Question 111: Which is NOT a function of ASM?...
Question 112: When we have a * wildcard entity configured in the File Type...
Question 113: The partial configuration below includes an iRule, a virtual...
Question 114: Select the question you would ask your customer related to D...
Question 115: An age-based policy is set up on the ARX that retains only d...
Question 116: Which two ports must be enabled to establish communication b...
Question 117: A customer says his business wouldn't benefit from buying AR...
Question 118: A pool is using Round Trip Time as its load balancing method...
Question 119: Which three iRule events are likely to be seen in iRules des...
Question 120: Which four of the following items are physical objects used ...
Question 121: The ARX is like a mini network manager. It is able to check ...
Question 122: ________% of F5 products are sent through thorough software ...
Question 123: Monitors can be assigned to which three resources? (Choose t...
Question 124: Which three of the following are some of the methods that F5...
Question 125: With standard DNS, assuming no DNS request failures, which p...
Question 126: Which of the following does NOT describe network performance...
Question 127: Complete the statement below by choosing the correct word or...
Question 128: Assume a virtual server is configured with a ClientSSL profi...
Question 129: Which statement is correct concerning differences between BI...
Question 130: A customer wants the best possible throughput but only has a...
Question 131: Which of the following is not a configurable parameter data ...
Question 132: An administrator is planning on solving latency issues by pl...
Question 133: When initially configuring the GTM System using the config t...
Question 134: Which of the following business benefits does storage tierin...
Question 135: Use a proprietary syntax language. Must contain at least one...
Question 136: True or False, WOM speeds up large file data transfer across...
Question 137: Which three of the following statements describe a data cent...
Question 138: DRAG DROP Place the following items in the order that the BI...
Question 139: If your customer has a policy requirement that cannot be han...
Question 140: Which of the following is correct regarding User-defined Att...
Question 141: Select the key question you would use to ask your customer r...
Question 142: When using a single BIG-IP with APM, an organization can sup...
Question 143: A request is sent to the BIG-IP ASM System that generates a ...
Question 144: Which three of these are the potential ending options for br...
Question 145: Which WOM feature replaces a long byte pattern, such as "100...
Question 146: Where is the load balancing mode specified?...
Question 147: The default staging-tightening period for attack signatures ...
Question 148: Which three are GTM server dynamic load balancing modes? (Ch...
Question 149: Where is connection mirroring configured?...
Question 150: The Device Inventory option in Enterprise Manager can replac...
Question 151: DRAG DROP Match the security-related term with the correct d...
Question 152: Which statement is true regarding failover?...
Question 153: Which item is NOT a function of ASM?...
Question 154: There are many user roles configurable on the BIG-IP ASM Sys...
Question 155: Using IP Geolocation, an organization can always direct a cl...
Question 156: Which is NOT an ASM protection method for cross site scripti...
Question 157: Tightening is a feature of which type of entity?...
Question 158: In the next few years, 75% of new storage capacity will shif...
Question 159: What is the main business driver for bringing Enterprise Man...
Question 160: Which four of these scenarios will benefit from F5's WAN Opt...
Question 161: You have created a custom profile named TEST2. The parent pr...
Question 162: Which two must be included in a Wide-IP definition for the W...
Question 163: A BIG-IP has a virtual server at 150.150.10.10:80 with SNAT ...
Question 164: Using file virtualization, what can the ARX do for customers...
Question 165: When DNS_REV is used as the probe protocol by the GTM System...
Question 166: An HTTP class is available
Question 167: Assume a BIG-IP has no NATs or SNATs configured. Which two s...
Question 168: Which of these statements about a stream profile is false?...
Question 169: A site needs a virtual server that will use an iRule to pars...
Question 170: A site wishes to perform source address translation on packe...
Question 171: When a business is hacked, they often lose more than money. ...
Question 172: Which of the following does not pertain to protecting the Re...
Question 173: A GTM System performs a name resolution that is not a Wide-I...
Question 174: Assume a client's traffic is being processed only by a NAT; ...
Question 175: A standard virtual server is defined with a pool and a SNAT ...
Question 176: Which events are valid iRule events triggered by BIG-IP ASM ...
Question 177: Even though F5 is an application delivery controller, it can...
Question 178: A user's access to resources can change based on the compute...
Question 179: Which event is always triggered when a client initially conn...
Question 180: Which three must be done so that Generic Host Servers can be...
Question 181: To share device information with F5 technical support, a cus...
Question 182: A site wishes to perform source address translation on packe...
Question 183: Which statement about root DNS servers is true?...
Question 184: In the current version of BIG-IP, what happens if the GTM do...
Question 185: Which of the following is a language used for content provid...
Question 186: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 187: If a client's browser does not accept cookies, what occurs w...
Question 188: When using SNAT, which additional IP addresses will the BIG-...
Question 189: ASM Geolocation reporting provides information regarding:...
Question 190: Which of the following platforms support both standalone and...
Question 191: Which of the following methods of protection is not availabl...
Question 192: Network Security personnel are entirely responsible for web ...
Question 193: What is the primary benefit of associating Servers with Data...
Question 194: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 195: Which of the following mitigation techniques is based on ano...
Question 196: Which three properties can be assigned to nodes? (Choose thr...
Question 197: Which two statements are true about SNATs? (Choose two.)...
Question 198: Which event is always triggered when the client sends data t...
Question 199: What is the main cause of high latency in a Web application?...
Question 200: How is persistence configured? (Exhibit)...
Question 201: Which two statements are true about NATs? (Choose two.)...
Question 202: Which two methods can be used to determine which BIG-IP is c...
Question 203: The BIG-IP ASM System is configured with a virtual server th...
Question 204: Which parameters are set to the same value when a pair of BI...
Question 205: Which four of these benefits does APM provide? (Choose four....
Question 206: When users are created, which three access levels can be gra...
Question 207: Select the best word or phrase to complete the following sen...
Question 208: The ARX can see ________ when a data modification takes plac...
Question 209: Which cookie persistence method requires the fewest configur...
Question 210: Which item is NOT a function of a properly deployed and conf...
Question 211: How do you support non intelligent DNS resolution in an envi...
Question 212: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 213: Which two of the following statements about how TMOS typical...
Question 214: A, steaming profile will do which of the following?...
Question 215: Which of the following can be associated with an XML profile...
Question 216: It is common for free storage space to exist somewhere in a ...
Question 217: When can a single virtual server be associated with multiple...
Question 218: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 219: Which statement is true concerning cookie persistence....
Question 220: Which of the following protocol protections is not provided ...
Question 221: Learning suggestions can be the result of:...
Question 222: What technology does ARX use to create a logical abstraction...
Question 223: Listeners that correspond to nonfloating self IP addresses a...
Question 224: Data centers often rely on either traditional firewalls or n...
Question 225: What is the purpose of the GTM Systems Address Exclusion Lis...
Question 226: The VIPRION provides hot-pluggable capabilities for which fo...
Question 227: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 228: When network failover is enabled, which of the following is ...
Question 229: Sensitive parameter is a feature used to hide sensitive info...
Question 230: Which two statements are true concerning the default communi...
Question 231: Which of the following methods are used by the BIG-IP ASM Sy...