Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

F5 101 Application Delivery Fundamentals Exam Practice Test

Demo: 36 questions
Total 240 questions

Application Delivery Fundamentals Questions and Answers

Question 1

Which two protocol are used for the retrieval of email? (Choose two)

Options:

A.

ICAP

B.

SMTP

C.

IMAP

D.

POP3

E.

SNMP

Question 2

What describes the third ‘’A’’ in the common authentication acronym AAA?

Options:

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Question 3

Which two OSI layers map lo IP subnetting and TCP window sizing functions? (Choose two)

Options:

A.

Application

B.

Data Link

C.

Transport

D.

Network Session

Question 4

A BIG-IP Administrator is cleaning up unused Virtual Servers and pools via the Configuration Utility while trying to delete certain administrator receives an error message that indicates that the pool is in use.

What is the likely cause of this error?

Options:

A.

The pool members are all disabled

B.

The pool is in use by a Virtual Server

C.

The pool members are marked up with a green circle

D.

The pool is in use by a monitor

Question 5

An application uses a proprietary protocol running over TCP

Which FS BIG-IP feature should the administrator use to modify the protocol?

Options:

A.

SPDY

B.

rewrite profile

C.

TCP profile

D.

iRules

Question 6

A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to a server.

This is an example of which type of solution?

Options:

A.

packet forwarding architecture

B.

Full proxy architecture

C.

TCP compression

D.

TCP optimization

Question 7

Which high availability feature allows two different BIG-IP devices to use the MAC address for the same server IP?

Options:

A.

HSRP virtual MAC address

B.

Device group

C.

Sync- failover

D.

MAC masquerade

Question 8

A BIG IP virtual Server with an IP address of 10.100.43.108 must be available to public internet users. Which technology should be used to achieve this task?

Options:

A.

NDP

B.

DNS

C.

NAT

D.

ARP

Question 9

An administrator wants to insert per-session data in a users browser so that user requests are directed to Which session persistence method should the administrator use?

the same session

Options:

A.

SSL persistence

B.

Source address persistence

C.

destination address persistence

D.

cookie persistence

Question 10

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

Options:

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

Question 11

User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?

Options:

A.

The physical port MAC address on the bridge for user A’s workstation

B.

The MAC address of the 12 bridge

C.

The MAC address of User A's workstation

D.

The physical port MAC address on the bridge for user B*s workstation

Question 12

ARP provides translation between which two address types?

Options:

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Question 13

Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?

Options:

A.

Segment

B.

Datagram

C.

Packet

D.

Bit

Question 14

A new virtual server is being tested to replace http://myapp.mydomain.com. The original virtual server is still on use. And the new virtual server is on a different ip address. What should be done to test this new virtual server using the fully quailed domain name for this application?

Options:

A.

add a DNS record for the fully qualified domain name

B.

add the fully qualified domain name to the browser cache

C.

make an entry in the client host file

D.

make an entry in the web server services file

Question 15

What is a disadvantage of running a visualized load balancer

Options:

A.

more expensive than a hardware load balancer

B.

slower than a hardware load balancer

C.

less reliable than a hardware load balancer

D.

does not support high availability

Question 16

What we two advantages of using SSL offloading? (Choose two)

Options:

A.

Offloads the client to SSL processing

B.

provides single point of management for private keys

C.

reduces server load significantly

D.

encrypts all communications and to end

E.

allows secure remote access to internal server resources

Question 17

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

Options:

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Question 18

An administrator needs to rapidly deter e newly discovered security threat to a remote desktop application.

Which F5 feature provides this functionality?

Options:

A.

iRules

B.

SSL profiles

C.

Proxy SSL

D.

SPDY

Question 19

A user fails to provide credentials when requesting a web resource that requires authentication. Which HTTP response code does the server send?

Options:

A.

HTTP 200

B.

HTTP 302

C.

HTTP 401

D.

HTTP 502

Question 20

An administrator suspects that a BIG IP appliance is experiencing performing issue due to spikes in CPU usage checks the performance issues does to spikes in CPU usage checks the performance report in the BIG-IP UI on CPU spikes are evident in the graphs. Which section in the BIG IP UI can the administrator check to troubleshoot the issue further?

Options:

A.

Statistics > Utilization

B.

System . Utilization

C.

Statics > Dashboard

D.

System > Services

Question 21

What tool should the BIG-IP Administrator use to view the status of all virtual servers and associated resources in one place?

Options:

A.

System performance

B.

Network Map

C.

Pool statistics

D.

Virtual server statistics

Question 22

An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?

Options:

A.

negative security model

B.

Closed security model

C.

positive Security model

D.

ACL Security model

Question 23

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.

11. Times exceeded

What does this mean?

Options:

A.

A faulty router on the network is unable to process the packet in a timely manner

B.

A switch on the network the frame due to an incorrect checksum

C.

The TTL field of the IP header was set to 255. and this was consequently dropped by a router

D.

The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router

Question 24

BIG-IP ASM is requesting automatic signature updates from the F5 update service

Who is considered the server in this communication?

Options:

A.

BIG-IP

B.

User A

C.

F5 update Service

D.

web application

Question 25

An administrator lakes a capture of five Traffic using tcpdump. The administrator notices that different ephemeral port numbers are architecture does this indicate?

Options:

A.

packet-based architecture

B.

full proxy architecture

C.

hub and spoke architecture

D.

ring network architecture

Question 26

Which IP subnet mask can be used to send traffic to all network nodes?

Options:

A.

192 168.0. 255/23

B.

192. 168. 1. 11/31

C.

172. 16. 1255/22

D.

192. 168. 0. 11/30

Question 27

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

Options:

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Question 28

What is the correct procedure to comply with the recommendation?

Options:

A.

Download the product version image from ihealth f5 com

B.

Download the product version image from support 6 com

C.

Download the product version image from dovcentral f5.com

D.

Download the product version image from downloads f5.com

Question 29

Which protocol is used for control and session establishment for streaming media?

Options:

A.

RTP

B.

DTLS

C.

SMB

D.

RTSP

Question 30

Which protocol Authenticates network traffic between hosts end without encryption?

Options:

A.

PPTP

B.

GRE

C.

IPSec AH

D.

iPSec ESP

Question 31

What are three functions commonly performed by HTTP cookies? (Choose three)

Options:

A.

Track users' browsing activities

B.

hold User preferences

C.

maintain session state

D.

execute client side scripts

E.

execute server side scripts

Question 32

In wh.ch layer of the OSI model is the data transported in the form of a packet?

Options:

A.

Transport

B.

Session

C.

Network

D.

Presentation

Question 33

A new VLAN segment has been added to the network. Only the existing connected interface may be used. What should the BIG-IP Administrator do to allow traffic to both the existing and the new VLAN?

Options:

A.

configure VLAN with Link Aggregation Control Protocols (LACP)

B.

configure a tagged VLAN

C.

configure an untagged VLAN

D.

configure VLAN to use interface with Multiple Spanning Tree Protocol (MSTP)

Question 34

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

Options:

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

Question 35

What does the HTTP status code 404 mean?

Options:

A.

Not Acceptable

B.

Forbidden

C.

Request Timeout

D.

Not found

Question 36

What is a primary benefit of employing a load balancer to manage traffic for an application?

Options:

A.

It reduces the number of client connections

B.

It provides a more uniform client experience

C.

It allows easy scaling up of the application

D.

It Reduces dropped connections

Demo: 36 questions
Total 240 questions