Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

F5 101 Application Delivery Fundamentals Exam Practice Test

Demo: 36 questions
Total 240 questions

Application Delivery Fundamentals Questions and Answers

Question 1

Which protocol Authenticates network traffic between hosts end without encryption?

Options:

A.

PPTP

B.

GRE

C.

IPSec AH

D.

iPSec ESP

Question 2

10:20: 37 .00749:IP 199.16.255.254.36664>10.0.1.10 http : flags (s) seq 700424862, Win 29200

A website is fronted by a toad balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there are bro nodes Node 1 and node2

She administrator is debugging an issue on node 1 using icpdump and records the above out about a received packet o watch device does the IP address 192 168 265 254" belong?

Options:

A.

node2

B.

node 1

C.

load balancer

D.

web Client

Question 3

Which function does a caching profile provide on the BIG IP server?

Options:

A.

caches client IP addresses to improve response times

B.

caches HTTP headers lo improve server load times.

C.

caches selected pool members to improve load balancing times.

D.

caches data for reuse to cut down on transfer time for future requests

Question 4

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

Options:

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Question 5

What are two examples of network layer protocols? (Choose two)

Options:

A.

ARP

B.

TCP

C.

IPv4

D.

BGP

E.

ICMP

Question 6

A BIG IP Administrator need to perform a packet capture and identify the source IP that is connecting to the Virtual Server.

Which utility should the administrator use on the BIG IP device?

Options:

A.

leinel

B.

traceroute

C.

ping

D.

tcpdump

Question 7

A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?

Options:

A.

switch

B.

Router

C.

HUP

D.

Bridge

Question 8

Which three security controls are used in an SSL transaction? (Choose three.)

Options:

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Question 9

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

Options:

A.

Positive

B.

Context-based

C.

Negative

D.

Role-based

Question 10

Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?

Options:

A.

grep

B.

ping

C.

dig

D.

find

Question 11

Which protocol emphasizes reduced latency over reliability?

Options:

A.

TCP

B.

UDP

C.

GRE

D.

RSVP

Question 12

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

Options:

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Question 13

In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?

Options:

A.

FEBO::1

B.

FF8Q 0.0 : :1

C.

2001 :: 127 : : 1

D.

: : 1

Question 14

An administrator needs a remote VPN solution for corporate users. The existing network infrastructure has web-based services. The administrator needs to select the VPN that is the least complicated to deploy.

Which VPN solution should the administrator choose?

Options:

A.

IPSec

B.

L2TP

C.

SSL

D.

PPTP

Question 15

What is an advantage of packet forwarding architecture?

Options:

A.

allows for SSL offload

B.

reduces latency

C.

allows for manipulation of HTTP headers

D.

handles larger packet sizes

Question 16

Which FTP mode should be used by a client behind a firewall that has no special configurator?

Options:

A.

Passive FTP

B.

Secure FTP

C.

Active FTP

D.

Protected FTP

Question 17

User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?

Options:

A.

The physical port MAC address on the bridge for user A’s workstation

B.

The MAC address of the 12 bridge

C.

The MAC address of User A's workstation

D.

The physical port MAC address on the bridge for user B*s workstation

Question 18

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

Options:

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Question 19

What is used to establish trust relationships between BIG-IP devices?

Options:

A.

trust ID

B.

device group identification

C.

certificate-based authentication

D.

unit IDs

Question 20

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

Options:

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

Question 21

An administrator notices the following log message generated by a BIG IP system " diskmonitor 011d005: Disk partition shared has less than 30% tree" Which command should the administrator use to troubleshoot the problem?

Options:

A.

parted-1

B.

fdisk-1

C.

isbik

D.

df-h

Question 22

In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic

What should be used for this task?

Options:

A.

Big-IP Global Traffic Manager appliance

B.

Big-lP standard virtual edition

C.

Big-IP Local Traffic Manager appliance

D.

Big-IP virtual edition with FIPS

Question 23

A BIG-IP Administrator needs to configure a network to separate traffic into three different VLANs using a single port on the BIG-IP device. What means should be used to allow this?

Options:

A.

LACP link aggregation

B.

Multiple MAC registration Protocol

C.

0902 19 VLAN tagging

D.

Port Spanning

Question 24

What are the two primary functions of the OSI 7 layer model (Choose two)

Options:

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors

Question 25

End users report widespread issues accessing multiple network resources

What tool should the BIG IP Administrator use to view the status of all virtual servers and associated resources in one place?

Options:

A.

Pool statistics

B.

Network Map

C.

System performance

D.

Virtual server statistics

Question 26

What is a primary benefit of employing a load balancer to manage traffic for an application?

Options:

A.

It reduces the number of client connections

B.

It provides a more uniform client experience

C.

It allows easy scaling up of the application

D.

It Reduces dropped connections

Question 27

Which protocol could be used to provide AAA Accounting?

Options:

A.

karberos

B.

SAML

C.

DIAMETER

D.

LDAP

Question 28

Host A sends 10 TCP packets to Host B. All packets arrive at Host B quickly, but some arrive out of order.

What will Host B do?

Options:

A.

ACK only packets that are in order

B.

drop all packets and wait for arrival in order

C.

drop any packets that arrive out of order

D.

ACK all packets and place them in order

Question 29

An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer.

Which type of solution is this?

Options:

A.

packet forwarding architecture

B.

delayed binding

C.

switching

D.

Full proxy architecture

Question 30

In 200 db8 IPv6 address block is allocated to a load balancer for use as virtual server addresses. The address block balancer set ip address using a static route. What is the representation for the last address in the address block that a virtual server can use?

Options:

A.

2001 db8 :: ffff, ffff, ffff, ffff

B.

2001 db8::

C.

2001 db8 :: 255

D.

2001 db8 ffff, ffff, ffff, ffff

Question 31

A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192.168.0.0/24 net. What is required to enable the several and BIG-IP device to communicate properly?

Options:

A.

Firewall

B.

Switch

C.

Router

D.

Hub

Question 32

A new VLAN segment has been added to the network. Only the existing connected interface may be used. What should the BIG-IP Administrator do to allow traffic to both the existing and the new VLAN?

Options:

A.

configure VLAN with Link Aggregation Control Protocols (LACP)

B.

configure a tagged VLAN

C.

configure an untagged VLAN

D.

configure VLAN to use interface with Multiple Spanning Tree Protocol (MSTP)

Question 33

HTTP pool attached to a Virtual Server has three members

Pool member A default HTTP monitor in red

Pool member 6 custom HTTP monitor in green

Pool member C does not monitor

Which pool members participate in the load balancing?

Options:

A.

Pool members A and C

B.

Pool members A B and C

C.

Pool members B and C

D.

Pool members A and B

Question 34

ARP provides translation between which two address types?

Options:

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Question 35

Where is the MAC masquerade address configured?

Options:

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Question 36

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Mufti VLANS exist on LACPO1.Which TMSH command should the BIGIP Administrator issue to add the new VLAN to the existing LACP trunk?

Options:

A.

create net vlan VLAN40 (interfaces add (LACP01 {lagged)) tag 40}

B.

create net vlan VLAN40 {interfaces replace-all-with {LACP01{tagged}} tag 40}

C.

create net vlan VLAN40 interfaces replace all with {LACP01 {untagged)} tag 40}

D.

create net vlan VLAN40 {interfaces add {LACP01 {untagged}} tag 40}

Demo: 36 questions
Total 240 questions