The latest free F5 Certification 101 exam dumps online test exercises and F5 Certification 101 PDF
free download from pass4itsure Multi-domain experts are available.
Do you have the confidence to successfully complete the F5 Certification 101 and then start earning your salary?
Pass4itsure has a leading edge in developing F5 Certification exam issues, ensuring you pass the F5 Certification 101 exam! Pass4itsure experts
provide you with the most accurate, up-to-date F5 Certification 101 exam issue updates, and offer a 100% money back guarantee
commitment! The following questions and answers are the newly released F5 Certification Official Exam Center: https://www.pass4itsure.com/101.html
[PDF] Free F5 Certification 101 dumps download from Google Drive:
https://drive.google.com/open?id=14CMrq-jLO5hpTqPRS78A9fo0iKNZhYo-
[PDF] Free All F5 Certification dumps download from Google Drive:
https://drive.google.com/open?id=15Ijst1JA4OD6ZRRj2-xumGt01rBsSTey
[PDF] 101 – application delivery fundamentals – F5 Networks:
https://www.f5.com/pdf/certification/exams/blueprint-app-delivery-fundamentals-exam.pdf
Pass4itsure offers the latest F5 Certification 101 practice test free of charge (40Q&As)
QUESTION 1
Which IP address will the client address be changed to when SNAT automap is specified within a VirtualServer
configuration?
A. The floating self IP address on the VLAN where the packet leaves the system.
B. The floating self IP address on the VLAN where the packet arrives on the system.
C. It will alternate between the floating and non-floating self IP address on the VLAN where the packet leavesthe system
so that port exhaustion is avoided.
D. It will alternate between the floating and non-floating self IP address on the VLAN where the packet arriveson the
system so that port exhaustionis avoided.
Correct Answer: A
QUESTION 2
When using the setup utility to configure a redundant pair, you are asked to provide a andquot;Failover Peer
IPandquot;.
Which address is this?
A. an address of the other system in its management network
B. an address of the other system in a redundant pair configuration
C. an address on the current system used to listen for fail-over messages from the partner BIG-IP
D. an address on the current system used to initiate mirroring and network fail-over heartbeat messages
Correct Answer: B
QUESTION 3
What is the purpose of the GTM Systems Address Exclusion List concerning local DNSservers?
A. To prevent probing of specific local DNSs
B. To prevent name resolution to specific Virtual Servers
C. To prevent name resolution for requests from specific local DNSs
D. To prevent probing of any local DNS servers by specific F5 devices
Correct Answer: A
QUESTION 4
What is required for a virtual server to support clients whose traffic arrives on the internal VLAN and poolmembers
whose traffic arrives on the external VLAN?
A. That support is never available. B. The virtual server must be enabled for both VLANs.
C. The virtual server must be enabled on the internal VLAN.
D. The virtual server must be enabled on the external VLAN.
Correct Answer: C
QUESTION 5
A site has six members in a pool. All of the servers have been designed, built, and configuredwith the sameapplications.
It is known that each client\’s interactions vary significantly and can affect the performance of theservers. If traffic should
be sent to all members on a regular basis, which load-balancing mode is mosteffective if the goal is to maintain a
relatively even load across all servers?
A. Ratio
B. Priority
C. Observed
D. Round Robin
Correct Answer: C
QUESTION 6
Which two statements are true about SNATs? (Choose two.)
A. SNATs are enabled on all VLANs, by default.
B. SNATs can be configured within a Profile definition.
C. SNATs can be configured within a Virtual Server definition.
D. SNAT\’s are enabled only on the VLAN where origin traffic arrives, by default
Correct Answer: AC
QUESTION 7
In the following request, which portion represents a parameter name?
A. Yes
B. User
C. Week1
D. Financials
Correct Answer: B
QUESTION 8
When configuring the BIG-IP ASM System in redundant pairs, which of the following aresynchronized? (Choose 2) A. License file
B. Security policies
C. Web applications
D. Request information
E. Traffic learning information
Correct Answer: BC
QUESTION 9
Which persistence method will always recognize a client when the client returns to the same virtual server?
A. SSL
B. MSRDP
C. Expression [universal]
D. No persistence method work in all situations.
E. Source address
Correct Answer: D
QUESTION 10
What is a characteristic of iQuery?
A. It uses SSH.
B. It uses SSL.
C. It uses SCP.
D. It uses HTTPS.
Correct Answer: B
QUESTION 11
When defining a load-balancing pool using the command line, if the load-balancing methodis not specified, what is the
result:
A. The default load-balancing method would be used.
B. The load-balancing method of the previous pool would be used.
C. The system would prompt the user for a load-balancing method.
D. An error would be displayed since no load-balancing method was specified.
Correct Answer: A
QUESTION 12
A site is load balancing to a pool of web servers. Which statement is true concerning BIG- IP\’s ability to verifywhether
the web servers are functioning properly or not?
A. Web server monitors can test the content of any page on the server.
B. Web server monitors always verify the contents of the index.html page.
C. Web server monitors can test whether the server\’s address is reachable, but cannot test a page\’s content.
D. Web server monitors can test the content of static web pages, but cannot test pages that would require theweb
server to dynamically buildcontent.
Correct Answer: A
QUESTION 13
iQuery is a proprietary protocol that distributes metrics gathered from which three sources?(Choose three.)
A. SNMP
B. DNS root servers
C. Path probes such as ICMP
D. Monitors from LTM Systems
E. Monitors from Generic Host Servers
Correct Answer: ACD
QUESTION 14
When initially configuring the BIG-IP system using the config utility, which two parameters canbe set?(Choose two.)
A. the netmask of the SCCP
B. the IP address of the SCCP
C. the port lockdown settings for the SCCP
D. the netmask of the host via the management port
E. the IP address of the host via the management port
F. the port lockdown settings for the host via the management port
Correct Answer: DE
QUESTION 15
Which three parameters could be used to determine whether a connection request will havethe source address
translated as the request is processed? (Choose three.)
A. The client\’s router\’s IP address. B. The client\’s browser\’s preferred language.
C. The client\’s IP netmask.
D. The client\’s TCP port.
E. The client\’s IP address.
F. The client IP fragment offset.
Correct Answer: BDE
QUESTION 16
An HTTP class is available ..
A. on any BIG-IP LTM system
B. only when ASM is licensed.
C. only when ASM or WA are licensed.
D. only when a specific license key is required.
Correct Answer: A
QUESTION 17
A standard virtual server has been associated with a pool with multiple members. Assuming all other settingsare left at
their defaults, which statement is always true concerning traffic processed by the virtual server?
A. The client IP address is unchanged between the client-side connection and the server- side connection.
B. The server IP address is unchanged between the client-side connection and the server- side connection.
C. The TCP ports used in the client-side connection are the same as the TCP ports server- side connection.
D. The IP addresses used in the client-side connection are the same as the IP addresses used in the
serversideconnection.
Correct Answer: A
QUESTION 18
Which two must be included in a Wide-lP definition for the Wide-lP to resolve a DNS query?
(Choose two.)
A. a name
B. a monitor
C. a load balancing method
D. one or more virtual servers
Correct Answer: AC
QUESTION 19
Where is connection mirroring configured?
A. It an option within a TCP profile.
B. It is an optional feature of each pool.
C. It is not configured; it is default behavior.
D. It is an optional feature of each virtual server.
Correct Answer: D
QUESTION 20
How do you support non-intelligent DNS resolution in an environment with GTM Systemsand standard DNS servers?
(Choose two.)
A. The GTM System must be a secondary server in all of your zones.
B. Your GTM System must delegate some DNS names to the DNS Servers.
C. Your DNS servers may delegate some DNS names to the GTM Systems.
D. The GTM System may have a Listener set for your DNS server\’s address.
E. The GTM System may have a Listener set for the GTM\’s loopback address.
Correct Answer: CD
QUESTION 21
Which of the following is not a configurable parameter data type?
A. Email
B. Array
C. Binary
D. Decimal
Correct Answer: B
QUESTION 22
Which of the following protocol protections is not provided by the Protocol SecurityManager?
A. FTP
B. SSH
C. HTTP
D. SMTP
Correct Answer: B
QUESTION 23
A monitor has been defined with an alias port of 443. All other options are left at theirdefaults. The administrator wishes
to assign it to a pool of members where the members\’ports vary.
Which is the result?
A. For each member, if the member port is not 443, the member will be marked down.
B. For each member, the monitor will test member node at port 443.
C. For each member, if it is running an SSL service at the member port, the monitor maywork.Otherwise, the monitor
willfail and the member will be marked down.
D. This assignment is not allowed since the port do not match.
Correct Answer: B
QUESTION 24
When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
Correct Answer: B
QUESTION 25
Which are immediate results of entering the following command: b pool PoolA . { lb method predictive member10.10.1
.1:80 member 10.10.1.2:80 }
A. Requests sent to this BIG-IP system with a destination port of 80 are load-balanced between the membersof PoolA.
B. No changes will take place since the command is missing the monitor component for PoolA.
C. The /config/bigip.cinf file is updated to include a definition for the pool named PoolA.
D. A new pool is available for association with any iRule or virtual server.
Correct Answer: D
QUESTION 26
A steaming profile will do which of the following?
A. Search and replace all occurrences of a specified string only is responses processed by avirtual server.
B. Search and replace all occurrences of a specified string only in request processed by avirtual server. C. Search and replace all occurrences of a specified string in requests and responsesprocessed by a virtual server.
D. Search and replace the first occurrence of a specified of a specified string in either arequest or response processed
by a virtual server.
Correct Answer: C
QUESTION 27
A site wishes to delegate the name www.mysite.com to a GTM System. Which entry wouldbe appropriate in their
current DNS servers?
A. www.mysite.com. IN A 132.26.33.15
B. 15.33.addr-in.arpa.com IN PRT .wiw.mysite.com.
C. www.mysite.com. IN CNAME wip.mysite.com.
D. www.mysite.com. IN DELwww.GTM.mysite.com.
Correct Answer: C
QUESTION 28
A request is sent to the BIG-IP ASM System that generates a Length error violation. Whichof the following length types
provides a valid learning suggestion? (Choose 3)
A. URL
B. Cookie
C. Response
D. POST data
E. Query string
Correct Answer: ADE
QUESTION 29
The following request is sent to the BIG-IP ASM System:
GEThttp://www.example.local/financials/week1.xls?display=yesandamp;user=johnandamp;logon=true
Which of the following components in this requests line represent the query string?
A. .xls
B. /week1.xls
C. /financials/week1.xls
D. display=yesandamp;user=johnandamp;logon=true
Correct Answer: D
QUESTION 30
When configuring a pool member\’s monitor, which three association options are available? (Choose three.)
A. inherit the pool\’s monitor
B. inherit the node\’s monitor
C. configure a default monitor
D. assign a monitor to the specific member
E. do not assign any monitor to the specific member
Correct Answer: ADE
QUESTION 31
Which three files/data items are included in a BIG-IP UCS backup file? (Choose three.)
A. The BIG-IP administrative addresses.
B. The BIG-IP license.
C. The BIG-IP log files.
D. The BIG-IP default traps.
E. The BIG-IP host name.
Correct Answer: ABE
QUESTION 32
With standard DNS, assuming no DNS request failures, which process describes the normalresolution process on a
andquot;first timeandquot; DNS request?
A. Client requests address from root server, root server returns IP address to Authoritative DNS, Authoritative DNS
returns requested IP address, LDNS returns requested IPaddress to client.
B. Client requests address from LDNS, LDNS requests from GTM, GTM requests fromAuthoritative DNS, Authoritative
DNS returns requested IP address, LDNS returnsrequested IP address to client.
C. Client requests address from LDNS, Authoritative DNS receives request from root server,root server returns LDNS
address, LDNS returns client address, Authoritative DNSreturns requested IP address, LDNS returns requested IP
address to client.
D. Client requests address from LDNS, LDNS requests from root server, root server returnsAuthoritative DNS address,
LDNS requests from Authoritative DNS, Authoritative DNSreturns requested IP address, LDNS returns requested IP
address to client.
Correct Answer: D
QUESTION 33
Generally speaking, should the monitor templates be used as production monitors or should they becustomized prior to
use? A. Most templates, such as http and tcp, are as effective as customized monitors.
B. Monitor template customization is only a matter of preference, not an issue of effectiveness or performance.
C. Most templates, such as https, should have the receive rule customized to make the monitor more robust.
D. While some templates, such as ftp, must be customized, those that can be used without modification arenot
improved by specific changes.
Correct Answer: C
QUESTION 34
What is the advantage of specifying three load balancing methods when load balancingwithin pools?
A. Specifying three methods allows the GTM System to use all three methodssimultaneously.
B. Specifying three methods allows the GTM System to choose the optimal method for eachname resolution.
C. Specifying three methods allows the GTM System alternate methods if insufficient data isavailable for other
methods.
D. Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used
too often.
Correct Answer: C
QUESTION 35
A site wishes to use an external monitor. Other than what is coded in the monitor script,what information must be
configured on the BIG-IP for the monitor to be functional?(Choose two.)
A. BIG-IP services that are running on the system to be tested.
B. BIG-IP the IP addresses of the devices that will be tested. Must know which
C. BIG-IP node or member the result are to be applied to. Must know all
D. BIG-IP must know the name of the program.
E. BIG-IP must know which function the program is going to test. Must know
Correct Answer: CD
QUESTION 36
Which VLANs must be enabled for a SNAT to perform as desired (translating only desired packets)?
A. The SNAT must be enabled for all VLANs.
B. The SNAT must be enabled for the VLANs where desired packets leave the BIG-IP.
C. The SNAT must be enabled for the VLANs where desired packets arrive on the BIG-IP.
D. The SNAT must be enabled for the VLANs where desired packets arrive and leave the BIG-IP.
Correct Answer: C
QUESTION 37
Which two statements are true about NATs? (Choose two.)
A. NATs support UDP, TCP, and ICMP traffic.
B. NATs can be configured with mirroring enabled or disabled.
C. NATs provide a one-to-one mapping between IP addresses.
D. NATs provide a many-to-one mapping between IP addresses.
Correct Answer: AC
QUESTION 38
When choosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the following
components? (Choose 2)
A. Attack signatures
B. Global parameters
C. HTTP protocol compliance
D. URLs and meta characters
Correct Answer: AC
QUESTION 39
Which three methods can be used for initial access to a BIG-IP system? (Choose three.)
A. CLI access to the serial console port
B. SSH access to the management port
C. SSH access to any of the switch ports
D. HTTP access to the management port
E. HTTP access to any of the switch ports
F. HTTPS access to the management port
G. HTTPS access to any of the switch ports
Correct Answer: ABF
QUESTION 40
Which statement is true concerning the default communication between a redundant pair of BIG-IP devices?
A. Communication between the systems cannot be effected by port lockdown settings.
B. Data for both connection and persistence mirroring are shared through the same TCP connection. C. Regardless of the configuration, some data is communicated between the systems at regular intervals.
D. Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled.
Correct Answer: B
Summarize:The latest free F5 Certification 101 exam dumps online test exercises and F5 Certification 101 PDF
free download from pass4itsure Multi-domain experts are available.
Pass4itsure provides the latest F5 Certification 101 questions and Answers! In recent years, F5 Certification 101 certification has become
a global standard for many successful IT companies. Want to be a certified F5 Certification Professional? Want to pass the F5 Certification 101 exam
at once? Download Pass4itsure 2018 The latest released F5 Certification 101 exam dump full version and pass F5 Certification 101 100%!
[PDF] Free F5 Certification 101 dumps download from Google Drive:
https://drive.google.com/open?id=14CMrq-jLO5hpTqPRS78A9fo0iKNZhYo-
[PDF] Free All F5 Certification dumps download from Google Drive:
https://drive.google.com/open?id=15Ijst1JA4OD6ZRRj2-xumGt01rBsSTey
Pass4itsure Promo Code 15% Off
related: https://www.origexams.com/latest-updated-cisco-ccna-200-155-dumps-exam/