ExamGecko
Home / F5 / 101 / List of questions
Ask Question

F5 101 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

An administrator configures secure remote access to a server's shell Given the netstal output, what did the administrator configure?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

Which two OSI layers map lo IP subnetting and TCP window sizing functions? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

What command sends an 'Echo Request' message and expects an 'Echo Reply' message?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

Which IP subnet mask can be used to send traffic to all network nodes?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

The BIG IP device is connected to the same network as a server.

Which communication protocol will the BIG IP device use to discover the link layer address of the server?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

Which protocol Authenticates network traffic between hosts end without encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

A certificate chain can be used for which purpose?

Become a Premium Member for full access
  Unlock Premium Member
Total 238 questions
Go to page: of 24