ExamGecko
Home Home / F5 / 101

F5 101 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











What should a BIGIP Administrator configure to provide remote access and ensure data privacy?

A.
Security policy
A.
Security policy
Answers
B.
Packet filter
B.
Packet filter
Answers
C.
VPN
C.
VPN
Answers
D.
GRE
D.
GRE
Answers
Suggested answer: C

An administrator needs to allow secure access to application within the corporate data center for remote office, branch office and mobile employees.

Which F5 product provides this functionally?

A.
APM
A.
APM
Answers
B.
ASM
B.
ASM
Answers
C.
GTM
C.
GTM
Answers
D.
AFM
D.
AFM
Answers
Suggested answer: A

What should a BIG-IP Administrator configure to minimize impact during a failure?

A.
MAC masquerading
A.
MAC masquerading
Answers
B.
Clone pool
B.
Clone pool
Answers
C.
External monitors
C.
External monitors
Answers
D.
One Connect profile
D.
One Connect profile
Answers
Suggested answer: A

What describes the third ''A'' in the common authentication acronym AAA?

A.
provides redundancy
A.
provides redundancy
Answers
B.
measures usage against an identity
B.
measures usage against an identity
Answers
C.
provides user filtered access
C.
provides user filtered access
Answers
D.
ensures the correct identity
D.
ensures the correct identity
Answers
Suggested answer: C

Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?

A.
context-based access control mode!
A.
context-based access control mode!
Answers
B.
role-based access control mode!
B.
role-based access control mode!
Answers
C.
negative security model
C.
negative security model
Answers
D.
positive security model
D.
positive security model
Answers
Suggested answer: D

In 200 db8 IPv6 address block is allocated to a load balancer for use as virtual server addresses. The address block balancer set ip address using a static route. What is the representation for the last address in the address block that a virtual server can use?

A.
2001 db8 :: ffff, ffff, ffff, ffff
A.
2001 db8 :: ffff, ffff, ffff, ffff
Answers
B.
2001 db8::
B.
2001 db8::
Answers
C.
2001 db8 :: 255
C.
2001 db8 :: 255
Answers
D.
2001 db8 ffff, ffff, ffff, ffff
D.
2001 db8 ffff, ffff, ffff, ffff
Answers
Suggested answer: D

Which of the following would happen?

A.
The PC sends a DNS query for 172. 17. 10. 1
A.
The PC sends a DNS query for 172. 17. 10. 1
Answers
B.
The PC sends an ARP looking for the MAC address of 172. 17. 10. 4
B.
The PC sends an ARP looking for the MAC address of 172. 17. 10. 4
Answers
C.
The PC sends an ARP looking for the MAC address of 172. 17. 10. 1
C.
The PC sends an ARP looking for the MAC address of 172. 17. 10. 1
Answers
D.
The PC sends a DNS query for 172.17.10 4
D.
The PC sends a DNS query for 172.17.10 4
Answers
Suggested answer: B

A device needs to decrypt traffic and send unencrypted traffic to the web server. Which method should the BIG-IP Administrator use?

A.
SSL Optimization
A.
SSL Optimization
Answers
B.
SSL Caching
B.
SSL Caching
Answers
C.
SSL Termination
C.
SSL Termination
Answers
D.
SSL Bridging
D.
SSL Bridging
Answers
Suggested answer: C

A company deploys F5 load balancers to manage number of secure applications. The company needs to centrally manage certificates.

Which F5 product provides this functionality?

A.
BIG IQ
A.
BIG IQ
Answers
B.
GTW
B.
GTW
Answers
C.
iHeath
C.
iHeath
Answers
D.
LTM
D.
LTM
Answers
Suggested answer: A

Which service should be configured to allow BIG-IP devices to be externally monitored?

A.
SSHD
A.
SSHD
Answers
B.
TMSH
B.
TMSH
Answers
C.
SMTP
C.
SMTP
Answers
D.
SNMP
D.
SNMP
Answers
Suggested answer: D
Total 238 questions
Go to page: of 24