ExamGecko
Home Home / F5 / 101

F5 101 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











In wh.ch layer of the OSI model is the data transported in the form of a packet?

A.
Transport
A.
Transport
Answers
B.
Session
B.
Session
Answers
C.
Network
C.
Network
Answers
D.
Presentation
D.
Presentation
Answers
Suggested answer: C

In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?

A.
FEBO::1
A.
FEBO::1
Answers
B.
FF8Q 0.0 : :1
B.
FF8Q 0.0 : :1
Answers
C.
2001 :: 127 : : 1
C.
2001 :: 127 : : 1
Answers
D.
: : 1
D.
: : 1
Answers
Suggested answer: D

An administrator encounter an error while working on eBiG.IP device and contacts F5 Support to open a case. While opening the case Support of the administrator that a BIO-IP version update is required.

Which F5 Support policy requires the administrator to upgrade the BIG-IP version.

A.
End of Software Support
A.
End of Software Support
Answers
B.
End of Support Contact Renewal
B.
End of Support Contact Renewal
Answers
C.
End of Technical Support
C.
End of Technical Support
Answers
D.
End of Return to Manufacturing
D.
End of Return to Manufacturing
Answers
Suggested answer: A

A client's operating system needs to make sure that data received from a server is mapped to the application that requested it.

How does it complete this mapping?

A.
using the TCP sequence number
A.
using the TCP sequence number
Answers
B.
using the client source port
B.
using the client source port
Answers
C.
using the TCP acknowledgement number
C.
using the TCP acknowledgement number
Answers
D.
using the server source port
D.
using the server source port
Answers
Suggested answer: B

Which function does the Presentation Layer provide?

A.
translation and encryption
A.
translation and encryption
Answers
B.
transmission over a medium
B.
transmission over a medium
Answers
C.
internetworking capabilities
C.
internetworking capabilities
Answers
D.
access to available resources
D.
access to available resources
Answers
Suggested answer: A

Which protocols is used for control and sess.on establishment for streaming media?

A.
RTP
A.
RTP
Answers
B.
RTSP
B.
RTSP
Answers
C.
OTLS
C.
OTLS
Answers
D.
SMB
D.
SMB
Answers
Suggested answer: A

Explanation:

https://enwikipedia org/wiki/Real_Time_Streaming_Protocol

A VoIP application requires that data payloads will NOT be fragmented. Which protocol controls network behavior in this situation?

A.
RTSP
A.
RTSP
Answers
B.
UDP
B.
UDP
Answers
C.
TCP
C.
TCP
Answers
D.
IP
D.
IP
Answers
Suggested answer: A

Which protocol data unit (POU) is associated with the OSI model's Network layer?

A.
Segment
A.
Segment
Answers
B.
Datagram
B.
Datagram
Answers
C.
Bit
C.
Bit
Answers
D.
Frame
D.
Frame
Answers
Suggested answer: B

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.

11. Times exceeded.

What does this mean?

A.
A faulty router on the network is unable to process the packet in a timely manner
A.
A faulty router on the network is unable to process the packet in a timely manner
Answers
B.
A switch on the network the frame due to an incorrect checksum
B.
A switch on the network the frame due to an incorrect checksum
Answers
C.
The TTL field of the IP header was set to 255. and this was consequently dropped by a router
C.
The TTL field of the IP header was set to 255. and this was consequently dropped by a router
Answers
D.
The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router
D.
The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router
Answers
Suggested answer: D

An administrator security policy defines allowed URLs, file types and parameter values. Which security model is the administrator using?

A.
negative security model
A.
negative security model
Answers
B.
Closed security model
B.
Closed security model
Answers
C.
positive Security model
C.
positive Security model
Answers
D.
ACL Security model
D.
ACL Security model
Answers
Suggested answer: C

Explanation:

https //www owasp.org/index.php/Positive_security_model

Total 238 questions
Go to page: of 24