ExamGecko
Home Home / F5 / 101

F5 101 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











An administrator needs to load balance connections to the application server with the lowest number of...

Which load balancing method meets these requirements?

A.
Least Sessions
A.
Least Sessions
Answers
B.
Ratio Least Connections (member)
B.
Ratio Least Connections (member)
Answers
C.
Least Connections (member)
C.
Least Connections (member)
Answers
D.
Least Connections (node)
D.
Least Connections (node)
Answers
Suggested answer: D

Explanation:

https:/support f5 com/csp/article/K9573

If there are multiple applications authenticated against a single identity store, which technology solution will simplify access to all applications?

A.
RADIUS
A.
RADIUS
Answers
B.
single sign on
B.
single sign on
Answers
C.
multifactor authentication
C.
multifactor authentication
Answers
D.
LDAP
D.
LDAP
Answers
Suggested answer: B

What is the correct procedure to comply with the recommendation?

A.
Download the product version image from ihealth f5 com
A.
Download the product version image from ihealth f5 com
Answers
B.
Download the product version image from support 6 com
B.
Download the product version image from support 6 com
Answers
C.
Download the product version image from dovcentral f5.com
C.
Download the product version image from dovcentral f5.com
Answers
D.
Download the product version image from downloads f5.com
D.
Download the product version image from downloads f5.com
Answers
Suggested answer: D

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

A.
ASM
A.
ASM
Answers
B.
APM
B.
APM
Answers
C.
AFM
C.
AFM
Answers
D.
GTM
D.
GTM
Answers
Suggested answer: A

Explanation:

https //devcentral f5.com/articIes/the-big-ip-application-security-managef-part-1-what-is-the-asm

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

A.
Positive
A.
Positive
Answers
B.
Context-based
B.
Context-based
Answers
C.
Negative
C.
Negative
Answers
D.
Role-based
D.
Role-based
Answers
Suggested answer: C

Explanation:

https //www.dosarrpst.com'ddos-blog/the-difference-between-positive-s-negatto-wafi

in which scenario is a full proxy TCP connection required?

A.
when compression is actuated
A.
when compression is actuated
Answers
B.
When Source NAT configured
B.
When Source NAT configured
Answers
C.
when a virtual server is configured
C.
when a virtual server is configured
Answers
D.
When Source IP persistence is required
D.
When Source IP persistence is required
Answers
Suggested answer: A

Explanation:

https//devcentral f5 com/articles/the-full-proxy-data-center-architecture

A Network Administrator needs a new networking device can perform NAT to connect several devices on a computer network.

What is the most appropriate device for this requirement?

A.
Switch
A.
Switch
Answers
B.
Router
B.
Router
Answers
C.
Bridges
C.
Bridges
Answers
D.
Hub
D.
Hub
Answers
Suggested answer: B

Which protocol data unit (PDU) is associated with the OSI model's Transport layer?

A.
Segment
A.
Segment
Answers
B.
Datagram
B.
Datagram
Answers
C.
Packet
C.
Packet
Answers
D.
Bit
D.
Bit
Answers
Suggested answer: A

Explanation:

https://en.wikjpedia.org/wiki/Protocol_data_unit

What is used to establish trust relationships between BIG-IP devices?

A.
trust ID
A.
trust ID
Answers
B.
device group identification
B.
device group identification
Answers
C.
certificate-based authentication
C.
certificate-based authentication
Answers
D.
unit IDs
D.
unit IDs
Answers
Suggested answer: C

An administrator needs a data a format that is support authentication against an external security domain. The data format must format support SSO. Which data format should the administrator choose?

A.
AAA
A.
AAA
Answers
B.
Kerberos
B.
Kerberos
Answers
C.
SAML
C.
SAML
Answers
D.
EAP
D.
EAP
Answers
Suggested answer: C
Total 238 questions
Go to page: of 24