F5 101 Practice Test - Questions Answers, Page 18

List of questions
Question 171

An administrator configures secure remote access to a server's shell Given the netstal output, what did the administrator configure?
Question 172

An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?
Question 173

An administrator needs to lower .he amount of new TCP connections to help with network congest?
How should the administrator accomplish this?
Question 174

Which two OSI layers map lo IP subnetting and TCP window sizing functions? (Choose two)
Question 175

User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?
Question 176

What command sends an 'Echo Request' message and expects an 'Echo Reply' message?
Question 177

Which IP subnet mask can be used to send traffic to all network nodes?
Question 178

The BIG IP device is connected to the same network as a server.
Which communication protocol will the BIG IP device use to discover the link layer address of the server?
Question 179

Which protocol Authenticates network traffic between hosts end without encryption?
Question 180

A certificate chain can be used for which purpose?
Question