Sunteți pe pagina 1din 12

Application Delivery Fundamentals

F5 101
Version Demo

Total Demo Questions: 20

Total Premium Questions: 460


Buy Premium PDF

https://dumpsarena.com

sales@dumpsarena.com
QUESTION NO: 1

Which tool is used on BIG-IP systems to capture data packets?

A. tcpdump

B. snoop

C. ethereal

D. qkview

ANSWER: A

Explanation:

QUESTION NO: 2

An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the graphic below.
Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not
been reached.

A connection attempt is made with a source IP and port of 10.20.10.50:2222 and a destination IP and port of 10.10.2.102:80.
When the request is processed, what will be the source and destination IP addresses?

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
A. Source IP: 10.20.10.50; Destination IP: pool member in the 172.16/16 network

B. Source IP: 172316.20.50; Destination IP: pool member in the 182.16/16 network

C. Source IP: 192.168.1.1; Destination IP: pool member in the 192.168/16 network

D. The request will be dropped.

E. Source IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network

F. Source IP: 182.16.1.1; Destination IP: pool member in the 172316/16 network

G. Source IP: 192.168.10.50; Destination IP: pool member in the 192.168/16 network

H. Source IP:192.168.10.50; Destination IP: pool member in the 192.168./16 network

ANSWER: F

Explanation:

QUESTION NO: 3

There are many user roles configurable on the BIG-IP ASM System. Which of the following user roles have access to make
changes to ASM policies? (Choose three.)

A. Guest

B. Operator

C. Administrator

D. Web Application Security Editor

E. Web Application Security Administrator

ANSWER: C D E

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
Explanation:

QUESTION NO: 4

The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this
capability. Select the features that the VPE provides. Select two.

A. Determines antivirus patch levels

B. Customizes landing or login page

C. Provides vulnerability scanning

D. Checks operating system patch levels

E. Assigns a lease pool address

ANSWER: A D

Explanation:

QUESTION NO: 5

A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default,
which settings will be applied to the security policy? (Choose three.)

A. Data Guard will be enabled.

B. The enforcement mode will be set to transparent.

C. The encoding language will be set to auto detect.

D. Wildcard tightening will be enabled on file types and parameters.

E. The Attack signature set applied will be Generic Detection Signatures.

ANSWER: A B E

Explanation:

QUESTION NO: 6

What is the purpose of MAC masquerading?

A. to prevent ARP cache errors

B. to minimize ARP entries on routers

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
C. to minimize connection loss due to ARP cache refresh delays

D. to allow both BIG-IP devices to simultaneously use the same MAC address

ANSWER: C

Explanation:

QUESTION NO: 7

Which are immediate results of entering the following command:

A. Requests sent to this BIG-IP system with a destination port of 80 are load balanced between the members of PoolA.

B. No changes will take place since the command is missing the monitor component for PoolA.

C. The /config/BIG-IP.cinf file is updated to include a definition for the pool named PoolA.

D. A new pool is available for association with any iRule or virtual server.

ANSWER: D

Explanation:

QUESTION NO: 8

Which of the following statements are correct regarding positive and negative security models? (Choose two.)

A. Positive security model allows all transactions by default.

B. Negative security model denies all transactions by default.

C. Negative security model allows all transactions by default and rejects only transactions that contain attacks.

D. Positive security mode l denies all transactions by default and uses rules that allow only those transactions that are
considered safe and valid.

ANSWER: C D

Explanation:

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
QUESTION NO: 9

A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types
that must be associated with such a virtual server? (Choose two.)

A. TCP

B. HTTP

C. HTTPS

D. ClientSSL

E. ServerSSL

ANSWER: A D

Explanation:

QUESTION NO: 10 - (DRAG DROP)

DRAG DROP

Place the following items in the order that the BIG-IP device uses when processing a packet.

Select and Place:

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
ANSWER:

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
Explanation:

QUESTION NO: 11

Which programming language is the basis for F5 iRules?

A. Lisp

B. C++

C. Java

D. TCL

E. AWK

ANSWER: D

Explanation:

QUESTION NO: 12

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
A security audit has determined that your web application is vulnerable to a cross site scripting attack. Which of the following
measures are appropriate when building a security policy? (Choose two.)

A. Cookie length must be restricted to 1024 bytes.

B. Attack signature sets must be applied to any user input parameters.

C. Parameter data entered for explicit objects must be checked for minimum and maximum values.

D. Parameter data entered for flow level parameters must allow some metacharacters but not others.

ANSWER: B D

Explanation:

QUESTION NO: 13

The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What
security benefit does this provide to customers?

A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which
may experience performance degradation when inspecting DNS queries and responses.

B. provides enhanced support for DNS servers.

C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of
authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch
levels.

D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge
to security because it knows how an application behaves at any point in the reply request process

ANSWER: D

Explanation:

QUESTION NO: 14

FastCache will NOT work with compressed objects.

A. True

B. False

ANSWER: A

Explanation:

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
QUESTION NO: 15

Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)

A. An organization using Novell Netware for authentication.

B. An organization that has been recently fined for failing security compliance.

C. An organization with a traveling sales force.

D. An organization with a single location and no remote employees.

E. An organization that needs to ensure users are using Symantec antivirus software.

F. An organization sharing a public Web site for all Internet users.

ANSWER: B C E

Explanation:

QUESTION NO: 16

What technology does ARX use to create a logical abstraction of the physical storage environment?

A. Data de-duplication

B. File virtualization

C. Server virtualization

D. SSL encryption

ANSWER: B

Explanation:

QUESTION NO: 17

APM provides access control lists at which two OSI layers? (Choose two.)

A. Layer 5

B. Layer 4

C. Layer 7

D. Layer 6

E. Layer 2

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
ANSWER: B C

Explanation:

QUESTION NO: 18

If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?

A. A

B. C

C. D

D. B

ANSWER: D

Explanation:

LTM uses the round robin load balancing method so after A will be B.

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com
QUESTION NO: 19

Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)

A. VLANs

B. Load-balancing pools

C. Secure remote access

D. TMOS

E. OneConnect

F. iRules

ANSWER: D E F

Explanation:

QUESTION NO: 20

The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each
file in order to more efficiently sort and store end user data.

A. True

B. False

ANSWER: B

Explanation:

DumpsArena - Pass Your Next Certification Exam Fast!


dumpsarena.com

S-ar putea să vă placă și