F5 201 Practice Test - Questions Answers, Page 5

List of questions
Question 41

The interface 1.1 of the BIG-IP device has been connected to a link dedicated to traffic on VLAN 120. What should the BIG-IP Administrator do to receive traffic from the VLAN?
Question 42

A BIG-IP Administrator needs to determine which pool members in a pool have been manually forced offline and are NOT accepting any new traffic. Which status icon indicates this?
A)
B)
C)
D)
Question 43

Refer to the exhibit.
The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into.
What should the BIG-IP Administrator do to verify if the iRule works correctly?
The device in the picture is a standby machine, of course there is no traffic, you need to log in to the host, and then pull the configuration to the host.
Question 44

A configuration change is made on the standby member of a device group.
What is displayed as 'Recommended Action' on the Device Management Overview screen?
Question 45

What should the 816-IP Administrator provide when opening a new ticket with F5 Support?
Question 46

Refer to the exhibit.
<a target='_blank' href='http://remote'>A user notifies the BIG-IP Administrator that http://remote company.com is NOT accessible. Remote</a>
access to company resources must be encrypted.
What should the BIG-IP Administrator do to fix the issue?
Question 47

A node is a member of various pools and hosts different web applications. If a web application is unavailable, the BIG-IP appliance needs to mark the pool member down for that application pool. What should a BIG-IP Administrator deploy at the pool level to accomplish this?
Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.
Question 48

A Standard Virtual Server configured for an application reports poor network performance. This application is accessed mainly from computers on the Internet.
What should the BIG-IP Administrator configure on the Virtual Server to achieve better network performance?
Question 49

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface.
Where should this be accomplished?
Question 50

A BIG-IP Administrator is creating a new Trunk on the BIG-IP device. What objects should be added to the new Trunk being created?
Question