Which two protocol are used for the retrieval of email? (Choose two)
What describes the third ‘’A’’ in the common authentication acronym AAA?
Which two OSI layers map lo IP subnetting and TCP window sizing functions? (Choose two)
A BIG-IP Administrator is cleaning up unused Virtual Servers and pools via the Configuration Utility while trying to delete certain administrator receives an error message that indicates that the pool is in use.
What is the likely cause of this error?
An application uses a proprietary protocol running over TCP
Which FS BIG-IP feature should the administrator use to modify the protocol?
A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to a server.
This is an example of which type of solution?
Which high availability feature allows two different BIG-IP devices to use the MAC address for the same server IP?
A BIG IP virtual Server with an IP address of 10.100.43.108 must be available to public internet users. Which technology should be used to achieve this task?
An administrator wants to insert per-session data in a users browser so that user requests are directed to Which session persistence method should the administrator use?
the same session
An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly
Which F5 technology should the administrator use?
User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?
ARP provides translation between which two address types?
Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?
A new virtual server is being tested to replace http://myapp.mydomain.com. The original virtual server is still on use. And the new virtual server is on a different ip address. What should be done to test this new virtual server using the fully quailed domain name for this application?
What is a disadvantage of running a visualized load balancer
What we two advantages of using SSL offloading? (Choose two)
In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?
An administrator needs to rapidly deter e newly discovered security threat to a remote desktop application.
Which F5 feature provides this functionality?
A user fails to provide credentials when requesting a web resource that requires authentication. Which HTTP response code does the server send?
An administrator suspects that a BIG IP appliance is experiencing performing issue due to spikes in CPU usage checks the performance issues does to spikes in CPU usage checks the performance report in the BIG-IP UI on CPU spikes are evident in the graphs. Which section in the BIG IP UI can the administrator check to troubleshoot the issue further?
What tool should the BIG-IP Administrator use to view the status of all virtual servers and associated resources in one place?
An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?
An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.
11. Times exceeded
What does this mean?
BIG-IP ASM is requesting automatic signature updates from the F5 update service
Who is considered the server in this communication?
An administrator lakes a capture of five Traffic using tcpdump. The administrator notices that different ephemeral port numbers are architecture does this indicate?
Which IP subnet mask can be used to send traffic to all network nodes?
The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?
What is the correct procedure to comply with the recommendation?
Which protocol is used for control and session establishment for streaming media?
Which protocol Authenticates network traffic between hosts end without encryption?
What are three functions commonly performed by HTTP cookies? (Choose three)
In wh.ch layer of the OSI model is the data transported in the form of a packet?
A new VLAN segment has been added to the network. Only the existing connected interface may be used. What should the BIG-IP Administrator do to allow traffic to both the existing and the new VLAN?
Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?
What does the HTTP status code 404 mean?
What is a primary benefit of employing a load balancer to manage traffic for an application?