Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.211
Which of the following violations cannot be learned by Traffic Learning?
-
RFC violations
-
File type length violations
-
Attack signature violations
-
Meta character violations on a specific parameter.
Correct Answer: A
Question No.212
If your customer has a policy requirement that cannot be handled in the Visual Policy Editor, what would you use to supplement the Visual Policy Editor?
-
iApps
-
TMOS
-
iControl
-
iRules
Correct Answer: D
Question No.213
Flow login allows for more granular protection of login and logout URLs within web applications. Which of the following are components of flow login? (Choose three.)
-
Schema
-
Login URLs
-
Login pages
-
Attack signatures
-
Access validation
Correct Answer: BCE
Question No.214
An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.251:80 and host the same Web application. What is this object?
-
Pool
-
Self-IP
-
Node
-
Pool member
-
Virtual Server
Correct Answer: A
Question No.215
Which two ports must be enabled to establish communication between GTM Systems and other BIG IP Systems? (Choose two.)
A. |
22 |
B. |
53 |
C. |
443 |
D. |
4353 |
E. |
4354 |
Correct Answer: AD
Question No.216
Which four of these scenarios will benefit from F5#39;s WAN Optimization Module? (Choose four.)
-
An international organization with data centers in different countries.
-
An organization that does not want to rely on using tape backup.
-
An organization with one site but hundreds of Web servers.
-
An organization whose users create extremely large files.
-
An organization that expects their Web site usage to double in the next year.
-
An organization attempting to lower costs by reducing the number of data centers.
Correct Answer: ABDF
Question No.217
It is common for free storage space to exist somewhere in a business network that is not easy for storage administrators to utilize. What solution can the ARX provide in this situation?
-
The ARX identifies the exact location of the free storage, which allows network administrators to target those locations when provisioning additional storage.
-
The ARX extends the capacity of each server by 10-15, through intelligent file virtualization.
-
The ARX uses the extra storage for transaction logs and index files.
-
The ARX allows the customer to pool storage from anywhere within the enterprise and capacity balance the overflow across devices.
Correct Answer: D
Question No.218
A virtual server is defined using a source address based persistence profile. The last five connections were A, B, C, A, C. Given the conditions shown in the graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?
A. 10.10.20.1:80
B. 10.10.20.2:80
C. 10.10.20.3:80
D. 10.10.20.4:80
E. 10.10.20.5:80
Correct Answer: B
Question No.219
LTM can only load balance outbound traffic by using iRules
-
True
-
False
Correct Answer: A
Question No.220
LTM runs on F5#39;s proprietary product platform. (Fill in the correct answer)
Correct Answer: TMOS
Get Full Version of the Exam
101 Dumps
101 VCE and PDF