ExamGecko
Home Home / F5 / 301b

F5 301b Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











An IT administrator wants to log which server is being load balanced to by a user with IP address 10.10.10.25.

Which iRule should the LTM Specialist use to fulfill the request?

A.
when SERVER_CONNECTED { if { [IP::addr [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
A.
when SERVER_CONNECTED { if { [IP::addr [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
Answers
B.
when CLIENT_ACCEPTED { if { [IP::addr [clientside [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
B.
when CLIENT_ACCEPTED { if { [IP::addr [clientside [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
Answers
C.
when SERVER_CONNECTED { if { [IP::addr [clientside [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
C.
when SERVER_CONNECTED { if { [IP::addr [clientside [IP::remote_addr]] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
Answers
D.
when CLIENT_ACCEPTED { if { [IP::addr [IP::remote_addr] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
D.
when CLIENT_ACCEPTED { if { [IP::addr [IP::remote_addr] equals 10.10.10.25]} { log local0. 'client 10.10.10.25 connected to pool member [IP::addr [LB::server addr]]' } }
Answers
Suggested answer: C

A customer needs to intercept all of the redirects its application is sending to clients. When a redirect is matched, the customer needs to log a message including the client IP address.

Which iRule should be used?

A.
when HTTP_RESPONSE { if { [HTTP::is_3xx] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
A.
when HTTP_RESPONSE { if { [HTTP::is_3xx] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
Answers
B.
when HTTP_REQUEST { if { [HTTP::is_301] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
B.
when HTTP_REQUEST { if { [HTTP::is_301] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
Answers
C.
when HTTP_REQUEST { if { [HTTP::is_redirect] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
C.
when HTTP_REQUEST { if { [HTTP::is_redirect] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
Answers
D.
when HTTP_RESPONSE { if { [HTTP::is_redirect] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
D.
when HTTP_RESPONSE { if { [HTTP::is_redirect] } { log local0. 'redirecting client ip address [IP::addr [IP::remote_addr]]' } }
Answers
Suggested answer: D

A web application requires knowledge of the client's true IP address for logging and analysis purposes. Instances of the application that can decode X-Forwarded-For HTTP headers reside in pool_a, while pool_b instances assume the source IP is the true address of the client.

Which iRule provides the proper functionality?

A.
when HTTP_DATA { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
A.
when HTTP_DATA { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
Answers
B.
when HTTP_RESPONSE { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
B.
when HTTP_RESPONSE { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
Answers
C.
when HTTP_REQUEST { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
C.
when HTTP_REQUEST { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
Answers
D.
when HTTP_OPEN { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
D.
when HTTP_OPEN { if {[HTTP::header exists X-Forwarded-For]}{ pool pool_a } else { pool pool_b } }
Answers
Suggested answer: C

Which iRule will reject any connection originating from a 10.0.0.0/8 network?

A.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::remote_addr] mask 8] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
A.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::remote_addr] mask 8] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
Answers
B.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::local_addr] mask 8] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
B.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::local_addr] mask 8] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
Answers
C.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::client_addr] mask 255.0.0.0] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
C.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::client_addr] mask 255.0.0.0] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
Answers
D.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::local_addr] mask 255.0.0.0] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
D.
when CLIENT_ACCEPTED { set remote_ip [IP::addr [IP::local_addr] mask 255.0.0.0] switch $remote_ip { '10.0.0.0' { reject } '11.0.0.0' { pool pool_http1} default { pool http_pool } } }
Answers
Suggested answer: C

There is a fault with an LTM device load balanced trading application that resides on directly connected VLAN vlan-301. The application virtual server is 10.0.0.1:80 with trading application backend servers on subnet 192.168.0.0/25. The LTM Specialist wants to save a packet capture with complete payload for external analysis.

Which command should the LTM Specialist execute on the LTM device command line interface?

A.
tcpdump -vvv -w /var/tmp/trace.cap 'net 192.168.0.0/25'
A.
tcpdump -vvv -w /var/tmp/trace.cap 'net 192.168.0.0/25'
Answers
B.
tcpdump -vvv -s 0 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
B.
tcpdump -vvv -s 0 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
Answers
C.
tcpdump -vvv -nni vlan-301 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
C.
tcpdump -vvv -nni vlan-301 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
Answers
D.
tcpdump -vvv -s 0 -nni vlan-301 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
D.
tcpdump -vvv -s 0 -nni vlan-301 -w /var/tmp/trace.cap 'net 192.168.0.0/25'
Answers
Suggested answer: D

An LTM Specialist has just captured trace /var/tmp/trace.cap for site www.example.com while listening on virtual address 10.0.0.1:443 configured on partition Application

A . The data payload being captured is SSL encrypted.

Which command should the LTM Specialist execute to decrypt the data payload?

A.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/Common_d/certificate_d/:Common:www.example.com.crt_1
A.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/Common_d/certificate_d/:Common:www.example.com.crt_1
Answers
B.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/Common_d/certificate_key_d/:Common:www.example.com.key_1
B.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/Common_d/certificate_key_d/:Common:www.example.com.key_1
Answers
C.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/ApplicationA_d/certificate_d/:ApplicationA:www.example.com.crt_1
C.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/ApplicationA_d/certificate_d/:ApplicationA:www.example.com.crt_1
Answers
D.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/ApplicationA_d/certificate_key_d/:ApplicationA:www.example.com.key_1
D.
ssldump -Aed -nr /var/tmp/trace.cap -k /config/filestore/files_d/ApplicationA_d/certificate_key_d/:ApplicationA:www.example.com.key_1
Answers
Suggested answer: B

An LTM Specialist must perform a packet capture on a virtual server with an applied standard FastL4 profile. The virtual server 10.0.0.1:443 resides on vlan301.

Which steps should the LTM Specialist take to capture the data payload successfully while ensuring no other virtual servers are affected?

A.
The standard FastL4 profile should have PVA acceleration disabled. Then the packet capture tcpdump -ni vlan301 should be executed on the command line interface.
A.
The standard FastL4 profile should have PVA acceleration disabled. Then the packet capture tcpdump -ni vlan301 should be executed on the command line interface.
Answers
B.
The packet capture tcpdump -ni vlan301 should be executed on the command line interface. There is no need to change profiles or PVA acceleration.
B.
The packet capture tcpdump -ni vlan301 should be executed on the command line interface. There is no need to change profiles or PVA acceleration.
Answers
C.
A new FastL4 profile should be created and applied to the virtual server with PVA acceleration disabled. Then the packet capture tcpdump -ni vlan301 should be executed on the command line interface.
C.
A new FastL4 profile should be created and applied to the virtual server with PVA acceleration disabled. Then the packet capture tcpdump -ni vlan301 should be executed on the command line interface.
Answers
D.
The LTM device is under light load. The traffic should be mirrored to a dedicated sniffing device. On the sniffing device, the packet capture tcpdump -ni vlan301 should be executed.
D.
The LTM device is under light load. The traffic should be mirrored to a dedicated sniffing device. On the sniffing device, the packet capture tcpdump -ni vlan301 should be executed.
Answers
Suggested answer: C

A new VLAN vlan301 has been configured on a highly available LTM device in partition Application A . A new directly connected backend server has been placed on vlan301. However, there are connectivity issues pinging the default gateway. The VLAN self IPs configured on the LTM devices are 192.168.0.251 and 192.168.0.252 with floating IP 192.168.0.253. The LTM Specialist needs to perform a packet capture to assist with troubleshooting the connectivity.

Which command should the LTM Specialist execute on the LTM device command line interface to capture the attempted pings to the LTM device default gateway on VLAN vlan301?

A.
tcpdump -ni /ApplicationA/vlan301 'host 192.168.0.253'
A.
tcpdump -ni /ApplicationA/vlan301 'host 192.168.0.253'
Answers
B.
tcpdump -ni vlan301 'host 192.168.0.253'
B.
tcpdump -ni vlan301 'host 192.168.0.253'
Answers
C.
tcpdump -ni /ApplicationA/vlan301 'host 192.168.0.251 or host 192.168.0.252'
C.
tcpdump -ni /ApplicationA/vlan301 'host 192.168.0.251 or host 192.168.0.252'
Answers
D.
tcpdump -ni vlan301 'host 192.168.0.251 or host 192.168.0.252'
D.
tcpdump -ni vlan301 'host 192.168.0.251 or host 192.168.0.252'
Answers
Suggested answer: A

An LTM device pool has suddenly been marked down by a monitor. The pool consists of members 10.0.1.1:443 and 10.0.1.2:443 and are verified to be listening. The affected virtual server is 10.0.0.1:80.

Which two tools should the LTM Specialist use to troubleshoot the associated HTTPS pool monitor via the command line interface? (Choose two.)

A.
curl
A.
curl
Answers
B.
telnet
B.
telnet
Answers
C.
ssldump
C.
ssldump
Answers
D.
tcpdump
D.
tcpdump
Answers
Suggested answer: A, C

An LTM Specialist needs to modify the logging level for tcpdump execution events. Checking the BigDB Key, the following is currently configured:

sys db log.tcpdump.level {

value 'Notice'

}

Which command should the LTM Specialist execute on the LTM device to change the logging level to informational?

A.
tmsh set /sys db log.tcpdump.level value informational
A.
tmsh set /sys db log.tcpdump.level value informational
Answers
B.
tmsh set /sys db log.tcpdump.level status informational
B.
tmsh set /sys db log.tcpdump.level status informational
Answers
C.
tmsh modify /sys db log.tcpdump.level value informational
C.
tmsh modify /sys db log.tcpdump.level value informational
Answers
D.
tmsh modify /sys db log.tcpdump.level status informational
D.
tmsh modify /sys db log.tcpdump.level status informational
Answers
Suggested answer: C
Total 210 questions
Go to page: of 21