ExamGecko
Home Home / F5 / 101

F5 101 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Related questions











An administrator configures secure remote access to a server's shell Given the netstal output, what did the administrator configure?

A.
teinetd. allowing connections only from IP address 10 .1. 10.46
A.
teinetd. allowing connections only from IP address 10 .1. 10.46
Answers
B.
sshd. listening on IP address 10. 1. 10.46
B.
sshd. listening on IP address 10. 1. 10.46
Answers
C.
sshd. allowing connections only from IP address 10.1. 10. 46
C.
sshd. allowing connections only from IP address 10.1. 10. 46
Answers
D.
teinetd listening on IP address 10.1. 10. 46
D.
teinetd listening on IP address 10.1. 10. 46
Answers
Suggested answer: B

Explanation:

Although it appears telnet is configured in this example (!) it is listening on all IP addresses of the system while ssh (port 22) is only on the 10.1.10.46 address.

An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?

A.
System > Archives
A.
System > Archives
Answers
B.
System > Services > Backup
B.
System > Services > Backup
Answers
C.
System > Backup
C.
System > Backup
Answers
D.
System > File Management
D.
System > File Management
Answers
Suggested answer: A

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

A.
Use HTTP keep-alive
A.
Use HTTP keep-alive
Answers
B.
set a larger receive window
B.
set a larger receive window
Answers
C.
Enable delayed ACKs
C.
Enable delayed ACKs
Answers
D.
use an indefinite timeout
D.
use an indefinite timeout
Answers
Suggested answer: A

Which two OSI layers map lo IP subnetting and TCP window sizing functions? (Choose two)

A.
Application
A.
Application
Answers
B.
Data Link
B.
Data Link
Answers
C.
Transport
C.
Transport
Answers
D.
Network Session
D.
Network Session
Answers
Suggested answer: D

User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?

A.
The physical port MAC address on the bridge for user A's workstation
A.
The physical port MAC address on the bridge for user A's workstation
Answers
B.
The MAC address of the 12 bridge
B.
The MAC address of the 12 bridge
Answers
C.
The MAC address of User A's workstation
C.
The MAC address of User A's workstation
Answers
D.
The physical port MAC address on the bridge for user B*s workstation
D.
The physical port MAC address on the bridge for user B*s workstation
Answers
Suggested answer: D

What command sends an 'Echo Request' message and expects an 'Echo Reply' message?

A.
ping
A.
ping
Answers
B.
netstal
B.
netstal
Answers
C.
tcpdump
C.
tcpdump
Answers
D.
echo
D.
echo
Answers
Suggested answer: A

Which IP subnet mask can be used to send traffic to all network nodes?

A.
192 168.0. 255/23
A.
192 168.0. 255/23
Answers
B.
192. 168. 1. 11/31
B.
192. 168. 1. 11/31
Answers
C.
172. 16. 1255/22
C.
172. 16. 1255/22
Answers
D.
192. 168. 0. 11/30
D.
192. 168. 0. 11/30
Answers
Suggested answer: D

The BIG IP device is connected to the same network as a server.

Which communication protocol will the BIG IP device use to discover the link layer address of the server?

A.
Ping
A.
Ping
Answers
B.
ICMP
B.
ICMP
Answers
C.
RARP
C.
RARP
Answers
D.
ARP
D.
ARP
Answers
Suggested answer: D

Which protocol Authenticates network traffic between hosts end without encryption?

A.
PPTP
A.
PPTP
Answers
B.
GRE
B.
GRE
Answers
C.
IPSec AH
C.
IPSec AH
Answers
D.
iPSec ESP
D.
iPSec ESP
Answers
Suggested answer: C

Explanation:

https//developer.ibmxom/answers.questions/37253/what-is-the-difference-between-the-ah-and- esp-port/

A certificate chain can be used for which purpose?

A.
Creating anonymous connections on the internet
A.
Creating anonymous connections on the internet
Answers
B.
anchoring the geographic location of a client or server
B.
anchoring the geographic location of a client or server
Answers
C.
Ensuring multiple layers of decryption and encryption
C.
Ensuring multiple layers of decryption and encryption
Answers
D.
Determining a client or server should be trusted
D.
Determining a client or server should be trusted
Answers
Suggested answer: D
Total 238 questions
Go to page: of 24