ExamGecko
Home Home / F5 / 201

F5 201 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











The interface 1.1 of the BIG-IP device has been connected to a link dedicated to traffic on VLAN 120. What should the BIG-IP Administrator do to receive traffic from the VLAN?

A.
Create a new VLAN object and set Customer Tag to 120
A.
Create a new VLAN object and set Customer Tag to 120
Answers
B.
Create a new VLAN object and assign the interface 1.1 untagged
B.
Create a new VLAN object and assign the interface 1.1 untagged
Answers
C.
Create a new trunk object with interface 1.1 assigned
C.
Create a new trunk object with interface 1.1 assigned
Answers
D.
Create a new trunk object and assign it to the VLAN
D.
Create a new trunk object and assign it to the VLAN
Answers
Suggested answer: B

A BIG-IP Administrator needs to determine which pool members in a pool have been manually forced offline and are NOT accepting any new traffic. Which status icon indicates this?

A)

B)

C)

D)

A.
Option
A.
Option
Answers
B.
Option
B.
Option
Answers
C.
Option
C.
Option
Answers
D.
Option
D.
Option
Answers
Suggested answer: A

Refer to the exhibit.

The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into.

What should the BIG-IP Administrator do to verify if the iRule works correctly?

A.
Push configuration from this device to the group and start to monitor traffic on this device
A.
Push configuration from this device to the group and start to monitor traffic on this device
Answers
B.
Pull configuration to this device to the cluster and start to monitor traffic on this device
B.
Pull configuration to this device to the cluster and start to monitor traffic on this device
Answers
C.
Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device
C.
Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device
Answers
D.
Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device
D.
Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device
Answers
Suggested answer: D

Explanation:

The device in the picture is a standby machine, of course there is no traffic, you need to log in to the host, and then pull the configuration to the host.

A configuration change is made on the standby member of a device group.

What is displayed as 'Recommended Action' on the Device Management Overview screen?

A.
Force active member of device group to standby
A.
Force active member of device group to standby
Answers
B.
Activate device with the most recent configuration
B.
Activate device with the most recent configuration
Answers
C.
Synchronize the active member configuration to the group.
C.
Synchronize the active member configuration to the group.
Answers
D.
Synchronize the standby member configuration to the group
D.
Synchronize the standby member configuration to the group
Answers
Suggested answer: D

What should the 816-IP Administrator provide when opening a new ticket with F5 Support?

A.
bigip.license file
A.
bigip.license file
Answers
B.
QKViewfile
B.
QKViewfile
Answers
C.
Device root password
C.
Device root password
Answers
D.
SSL private keys
D.
SSL private keys
Answers
Suggested answer: B

Refer to the exhibit.

<a target='_blank' href='http://remote'>A user notifies the BIG-IP Administrator that http://remote company.com is NOT accessible. Remote</a>

access to company resources must be encrypted.

What should the BIG-IP Administrator do to fix the issue?

A.
Change the Listening Port on remote.company.com_vs to Port 80
A.
Change the Listening Port on remote.company.com_vs to Port 80
Answers
B.
Add a Pool to the Virtual Server remote.company.com_VS
B.
Add a Pool to the Virtual Server remote.company.com_VS
Answers
C.
Add an iRule to remote.company.com_vs to redirect Traffic to HTTPS
C.
Add an iRule to remote.company.com_vs to redirect Traffic to HTTPS
Answers
D.
Change the Type of the Virtual Server remote.company.com_vs to Forwarding Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.
D.
Change the Type of the Virtual Server remote.company.com_vs to Forwarding Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.
Answers
Suggested answer: C

A node is a member of various pools and hosts different web applications. If a web application is unavailable, the BIG-IP appliance needs to mark the pool member down for that application pool. What should a BIG-IP Administrator deploy at the pool level to accomplish this?

A.
A UDP monitor with a custom interval/timeout
A.
A UDP monitor with a custom interval/timeout
Answers
B.
A combination of ICMP + TCP monitor
B.
A combination of ICMP + TCP monitor
Answers
C.
An HTTP monitor with custom send/receive strings
C.
An HTTP monitor with custom send/receive strings
Answers
D.
A TCP monitor with a custom interval/timeout
D.
A TCP monitor with a custom interval/timeout
Answers
Suggested answer: C

Explanation:

Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.

A Standard Virtual Server configured for an application reports poor network performance. This application is accessed mainly from computers on the Internet.

What should the BIG-IP Administrator configure on the Virtual Server to achieve better network performance?

A.
Protocol Profile (Client) with f5-tcp-wan and Protocol Profile (Server) with f5-tcp-lan
A.
Protocol Profile (Client) with f5-tcp-wan and Protocol Profile (Server) with f5-tcp-lan
Answers
B.
Protocol Profile (Client) with f5-tcp-lan
B.
Protocol Profile (Client) with f5-tcp-lan
Answers
C.
Protocol Profile (Client) with fS-tcp-lan and Protocol Profile (Server) with f5-tcp-wan
C.
Protocol Profile (Client) with fS-tcp-lan and Protocol Profile (Server) with f5-tcp-wan
Answers
D.
Protocol Profile (Client) with f5-tcp-optimized
D.
Protocol Profile (Client) with f5-tcp-optimized
Answers
Suggested answer: A

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface.

Where should this be accomplished?

A.
System > Configuration
A.
System > Configuration
Answers
B.
Network > Interfaces
B.
Network > Interfaces
Answers
C.
Network > Self IPs
C.
Network > Self IPs
Answers
D.
System > Platform
D.
System > Platform
Answers
Suggested answer: D

A BIG-IP Administrator is creating a new Trunk on the BIG-IP device. What objects should be added to the new Trunk being created?

A.
Interfaces
A.
Interfaces
Answers
B.
Network routes
B.
Network routes
Answers
C.
VLANS
C.
VLANS
Answers
D.
IP addresses
D.
IP addresses
Answers
Suggested answer: A

Explanation:

trunk is a portchannel, you need to add a physical interface.

Total 254 questions
Go to page: of 26