ExamGecko
Home Home / F5 / 301a

F5 301a Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











An LTM Specialist needs to deploy a virtual server that will load balance traffic targeting https://register.example.com to a set of three web servers. Persistence needs to be ensured. No persistence mirroring is allowed SSL offloading is required.

https://register.example.comvrobots.txt A fourth web server with fewer resources will be used to handle requests from engine bots to https://register.example.comvrobots.txt by an iRule. The (Rule will use the HTTP_REQUEST event.

What are the required profile and persistence settings to implement this?

A.
tcp. dientssl, hup, source address persistence
A.
tcp. dientssl, hup, source address persistence
Answers
B.
tcp, clientssl, http. cookie persistence
B.
tcp, clientssl, http. cookie persistence
Answers
C.
tcp, clientssl, serverssl, ssl persistence
C.
tcp, clientssl, serverssl, ssl persistence
Answers
D.
tcp, clientssl, http, serverssl cookie persistence
D.
tcp, clientssl, http, serverssl cookie persistence
Answers
Suggested answer: B

Explanation:

The option is wrong, it should be clientssl and serverssl. If the title requires ssl offload instead of encryption, you need clientssl instead of serverssl. irule needs HTTP profile to enable HTTP_REQUST. If the session cannot be mirrored, the cookie session remains to meet the demand.

An LTM device receives a response string containing 'error'

Which monitor type and parameter will mark the HTTP server as down?

A.
HTTP monitor, Receive String 'error', and set the Reverse option to Yes
A.
HTTP monitor, Receive String 'error', and set the Reverse option to Yes
Answers
B.
HTTP monitor and Receive String 'error'' ... flag is up
B.
HTTP monitor and Receive String 'error'' ... flag is up
Answers
C.
HTTP monitor. Receive String 'down', and set the Reverse option to Yes .... flag is
C.
HTTP monitor. Receive String 'down', and set the Reverse option to Yes .... flag is
Answers
D.
HTTP monitor and Receive Disable String 'error'' .... flag is disable
D.
HTTP monitor and Receive Disable String 'error'' .... flag is disable
Answers
Suggested answer: A

A custom TCP application using a single server is being migrated to the LTM device. A server is being added to the pool. The application is known to violate the TCP protocol RFC. The application currently works without error from a user perspective.

Which virtual server type is appropriate in this situation?

A.
Stateless TCP protocol is not applicable
A.
Stateless TCP protocol is not applicable
Answers
B.
Performance (Layer 4)-pure layer A forwarding
B.
Performance (Layer 4)-pure layer A forwarding
Answers
C.
forwarding (Layer 2) pure routing forwarding, pool cannot be specified
C.
forwarding (Layer 2) pure routing forwarding, pool cannot be specified
Answers
D.
Standard-tcp profile exists, RFC verification will be performed
D.
Standard-tcp profile exists, RFC verification will be performed
Answers
Suggested answer: B

Four members in a server pool have similar hardware platforms. An LTM Specialist needs the load balancing method that can select the server with the fewest entries in the persistence table.

Which load balancing method should the LTM Specialist use?

A.
Observed
A.
Observed
Answers
B.
Dynamic Ratio
B.
Dynamic Ratio
Answers
C.
Least Sessions
C.
Least Sessions
Answers
D.
Leas Connections
D.
Leas Connections
Answers
Suggested answer: C

Explanation:

Pay attention to the examination questions, the stem is to ask the session to keep the minimum entries in the table.

Refer to the exhibit.

The http monitor is applied to a pool. All members are enabled. One server responds as follows.

What is the resulting status of this poo! member?

A.
Offline (Disabled)
A.
Offline (Disabled)
Answers
B.
Offline (Enabled)
B.
Offline (Enabled)
Answers
C.
Unavailable (Disabled)
C.
Unavailable (Disabled)
Answers
D.
Available (Enabled)
D.
Available (Enabled)
Answers
Suggested answer: B

Explanation:

The first picture 'Send String' and 'Receive String' are not clear. Send String should be 'GOOD', the response packet does not contain this keyword. Receive Disable String is completely unclear. If the response packet contains the content of Receive Disable String at this time, it will be Available (Disabled), If the content of Receive Disable String is not included, then Offline (Enabled).

An application is making heavy use of a large, high-quality JPEG image file. An LTM Specialist needs to enhance page load times without increasing server load.

Which profile should be applied to the virtual server to perform this task?

A.
Response Adapt
A.
Response Adapt
Answers
B.
OneConnect
B.
OneConnect
Answers
C.
FastHTTP
C.
FastHTTP
Answers
D.
Web Acceleration
D.
Web Acceleration
Answers
Suggested answer: D

The picture belongs to static content, you can configure static content cache in FS to meet this demand

An LTM Specialist must configure session persistence for a highly available, highly utilized web-based application.

* The following requirements are provided:

* http proxy setup for security persistence information available to the HA peer in case of failover

The LTM Specialist needs to minimize additional burden on the LTM device to the greatest extent possible.

Which persistence profile should be used?

A.
Cookie insert
A.
Cookie insert
Answers
B.
Universal
B.
Universal
Answers
C.
Source Address Affinity
C.
Source Address Affinity
Answers
D.
Destination Address Affinity
D.
Destination Address Affinity
Answers
Suggested answer: A

An LTM specialist needs to create a new account with the admin role called 'newadmin' and access to all partitions.

Which tmsh command should be executed?

A.
create /auth user newadmin partition-access add {all-partitions {role admin }} prompt for-password.
A.
create /auth user newadmin partition-access add {all-partitions {role admin }} prompt for-password.
Answers
B.
create /users newadmin partition-access add {all-partitions {role admin JJ prompt for-password.
B.
create /users newadmin partition-access add {all-partitions {role admin JJ prompt for-password.
Answers
C.
create /user newadmin partition-access add (all-partitions {role admin }} prompt- for-password.
C.
create /user newadmin partition-access add (all-partitions {role admin }} prompt- for-password.
Answers
D.
create / sys user newadmin partition-access add (all-partitions {role admin )} prompt-for-password.
D.
create / sys user newadmin partition-access add (all-partitions {role admin )} prompt-for-password.
Answers
Suggested answer: A

Explanation:

Examining the use of commands, the creation of user is subordinate to auth

Refer to the exhibit.

The LTM devices LTM3 and LTM2 have four Traffic Groups defined with approximately the sar of failover objects defined in each group.

- Traffic Groups A and C have Default Device set to LTM1

- Traffic Groups Band D have Default Device set to LTM2.

- Traffic Groups B and C do NOT have Auto Failback enabled. Traffic Groups A and D have Auto Failback enabled with a timeout value of 60 seconds.

- Traffic Groups A and D have Auto Fallback enabled with a timeout value of 60 seconds.

Both LTM devices are healthy and able to pass traffic for any Traffic Group.

LTM1 loses connectivity on interface 1.4. The LTM Specialists notified 60 seconds after the interface goes down.

What is the state of the Traffic Groups on each LTM device?

A.
LTM1: Traffic Group C LTM2: Traffic Groups A, B, and 0
A.
LTM1: Traffic Group C LTM2: Traffic Groups A, B, and 0
Answers
B.
LTM1: No Traffic Groups LTM2: Traffic Groups A, B. C, and D
B.
LTM1: No Traffic Groups LTM2: Traffic Groups A, B. C, and D
Answers
C.
LTM1: Traffic Groups A, B, C, and D LTM2: No Traffic Groups
C.
LTM1: Traffic Groups A, B, C, and D LTM2: No Traffic Groups
Answers
D.
LTM1: Traffic Groups B and C LTM2: Traffic Groups A and 0
D.
LTM1: Traffic Groups B and C LTM2: Traffic Groups A and 0
Answers
Suggested answer: B

Explanation:

If the 1.4 port is down and failsafe is triggered, the whole machine will become a standby, and all Traffic Groups will be cut away, and no Traffic Group will remain.

An LTM Specialist has detected that a brute force login attack is occurring against the SSH service via a BIG-IP management interface. Login attempts are occurring from many IPs within the internal company network. BIG-IP SSH access restrictions are in place as follows:

The LTM Specialist has determined that SSH access should only occur from the 192.168.1.0/24 and 172.16.254.0/23 networks.

Which tmsh command should the LTM Specialist use to permit access from the desired networks only?

A.
modify.sys sshd allow add {''192.168. 10/24 , '' ''172. 16 2540/23'')
A.
modify.sys sshd allow add {''192.168. 10/24 , '' ''172. 16 2540/23'')
Answers
B.
modify /sys sshd login disable (''10.0.00/8'', ''172 16.0 0/12'', ''192. 168.0.0/16'')
B.
modify /sys sshd login disable (''10.0.00/8'', ''172 16.0 0/12'', ''192. 168.0.0/16'')
Answers
C.
modify/sys allow replace-all-with {''192.168.1.00/24'', ''192.16.254.0/23''}
C.
modify/sys allow replace-all-with {''192.168.1.00/24'', ''192.16.254.0/23''}
Answers
D.
modify/sys sshd login enable {''192.166.10/24'''' ''172.16 254 0/23
D.
modify/sys sshd login enable {''192.166.10/24'''' ''172.16 254 0/23
Answers
Suggested answer: C

Explanation:

Select C to overwrite the existing network's allow configuration over the specified network segment.

Total 147 questions
Go to page: of 15