ExamGecko
Home / F5 / 201 / List of questions
Ask Question

F5 201 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

The interface 1.1 of the BIG-IP device has been connected to a link dedicated to traffic on VLAN 120. What should the BIG-IP Administrator do to receive traffic from the VLAN?

Create a new VLAN object and set Customer Tag to 120
Create a new VLAN object and set Customer Tag to 120
Create a new VLAN object and assign the interface 1.1 untagged
Create a new VLAN object and assign the interface 1.1 untagged
Create a new trunk object with interface 1.1 assigned
Create a new trunk object with interface 1.1 assigned
Create a new trunk object and assign it to the VLAN
Create a new trunk object and assign it to the VLAN
Suggested answer: B
asked 24/09/2024
Diogo Vitor
44 questions

Question 42

Report Export Collapse

A BIG-IP Administrator needs to determine which pool members in a pool have been manually forced offline and are NOT accepting any new traffic. Which status icon indicates this?

A)

F5 201 image Question 42 82953 09242024194133000000

B)

F5 201 image Question 42 82953 09242024194133000000

C)

F5 201 image Question 42 82953 09242024194133000000

D)

F5 201 image Question 42 82953 09242024194133000000

Option
Option
Option
Option
Option
Option
Option
Option
Suggested answer: A
asked 24/09/2024
Chris Abunin
31 questions

Question 43

Report Export Collapse

Refer to the exhibit.

F5 201 image Question 43 82954 09242024194133000000

The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into.

What should the BIG-IP Administrator do to verify if the iRule works correctly?

Push configuration from this device to the group and start to monitor traffic on this device
Push configuration from this device to the group and start to monitor traffic on this device
Pull configuration to this device to the cluster and start to monitor traffic on this device
Pull configuration to this device to the cluster and start to monitor traffic on this device
Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device
Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device
Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device
Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device
Suggested answer: D
Explanation:

The device in the picture is a standby machine, of course there is no traffic, you need to log in to the host, and then pull the configuration to the host.

asked 24/09/2024
Eduardo Collado
35 questions

Question 44

Report Export Collapse

A configuration change is made on the standby member of a device group.

What is displayed as 'Recommended Action' on the Device Management Overview screen?

Force active member of device group to standby
Force active member of device group to standby
Activate device with the most recent configuration
Activate device with the most recent configuration
Synchronize the active member configuration to the group.
Synchronize the active member configuration to the group.
Synchronize the standby member configuration to the group
Synchronize the standby member configuration to the group
Suggested answer: D
asked 24/09/2024
Hany Mohammed
46 questions

Question 45

Report Export Collapse

What should the 816-IP Administrator provide when opening a new ticket with F5 Support?

bigip.license file
bigip.license file
QKViewfile
QKViewfile
Device root password
Device root password
SSL private keys
SSL private keys
Suggested answer: B
asked 24/09/2024
Alexandre BOUCHER
49 questions

Question 46

Report Export Collapse

Refer to the exhibit.

F5 201 image Question 46 82957 09242024194133000000

<a target='_blank' href='http://remote'>A user notifies the BIG-IP Administrator that http://remote company.com is NOT accessible. Remote</a>

access to company resources must be encrypted.

What should the BIG-IP Administrator do to fix the issue?

Change the Listening Port on remote.company.com_vs to Port 80
Change the Listening Port on remote.company.com_vs to Port 80
Add a Pool to the Virtual Server remote.company.com_VS
Add a Pool to the Virtual Server remote.company.com_VS
Add an iRule to remote.company.com_vs to redirect Traffic to HTTPS
Add an iRule to remote.company.com_vs to redirect Traffic to HTTPS
Change the Type of the Virtual Server remote.company.com_vs to Forwarding Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.
Change the Type of the Virtual Server remote.company.com_vs to Forwarding Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.
Suggested answer: C
asked 24/09/2024
Rick van der Slot
45 questions

Question 47

Report Export Collapse

A node is a member of various pools and hosts different web applications. If a web application is unavailable, the BIG-IP appliance needs to mark the pool member down for that application pool. What should a BIG-IP Administrator deploy at the pool level to accomplish this?

A UDP monitor with a custom interval/timeout
A UDP monitor with a custom interval/timeout
A combination of ICMP + TCP monitor
A combination of ICMP + TCP monitor
An HTTP monitor with custom send/receive strings
An HTTP monitor with custom send/receive strings
A TCP monitor with a custom interval/timeout
A TCP monitor with a custom interval/timeout
Suggested answer: C
Explanation:

Requiring all traffic to be HTTPS access requires HTTP requests to be redirected directly to HTTPS.

asked 24/09/2024
MANIVANNAN POOPALASINGHAM
39 questions

Question 48

Report Export Collapse

A Standard Virtual Server configured for an application reports poor network performance. This application is accessed mainly from computers on the Internet.

What should the BIG-IP Administrator configure on the Virtual Server to achieve better network performance?

Protocol Profile (Client) with f5-tcp-wan and Protocol Profile (Server) with f5-tcp-lan
Protocol Profile (Client) with f5-tcp-wan and Protocol Profile (Server) with f5-tcp-lan
Protocol Profile (Client) with f5-tcp-lan
Protocol Profile (Client) with f5-tcp-lan
Protocol Profile (Client) with fS-tcp-lan and Protocol Profile (Server) with f5-tcp-wan
Protocol Profile (Client) with fS-tcp-lan and Protocol Profile (Server) with f5-tcp-wan
Protocol Profile (Client) with f5-tcp-optimized
Protocol Profile (Client) with f5-tcp-optimized
Suggested answer: A
asked 24/09/2024
Paul Hackett
39 questions

Question 49

Report Export Collapse

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface.

Where should this be accomplished?

System > Configuration
System > Configuration
Network > Interfaces
Network > Interfaces
Network > Self IPs
Network > Self IPs
System > Platform
System > Platform
Suggested answer: D
asked 24/09/2024
Penny Chang
53 questions

Question 50

Report Export Collapse

A BIG-IP Administrator is creating a new Trunk on the BIG-IP device. What objects should be added to the new Trunk being created?

Become a Premium Member for full access
  Unlock Premium Member
Total 254 questions
Go to page: of 26
Search

Related questions