Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.221
The administrator must specify APM access control entries as either L4 or L7.
-
True
-
False
Correct Answer: B
Question No.222
Assume a client#39;s traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
-
The BIG-IP would drop the request since the traffic didn#39;t arrive destined to the NAT address.
-
The source address would not change, but the destination address would be changed to the NAT address.
-
The source address would be changed to the NAT address and destination address would be left unchanged.
-
The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP.
Correct Answer: C
Question No.223
A request is sent to the BIG-IP ASM System that generates a Length error violation. Which of the following length types provides a valid learning suggestion? (Choose three.)
-
URL
-
Cookie
-
Response
-
POST data
-
Query string
Correct Answer: ADE
Question No.224
GTM uses the F5 protocol to synchronize performance metrics between GTM devices. (Fill in)
Correct Answer: iQuery
Question No.225
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
-
Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
-
provides enhanced support for DNS servers.
-
Establishes highly detailed policies based on your customer#39;s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
-
Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
Correct Answer: D
Question No.226
In the next few years, 75% of new storage capacity will shift to unstructured data (also known as file data). Which two of the following are examples of unstructured data? (Choose two.)
-
CAD drawings
-
Location data in a GIS (geographic information system)
-
Customer records and product records in a CRM (customer relationship management) database
-
Microsoft Office and PDF documents
Correct Answer: AD
Question No.227
A standard virtual server has been associated with a pool with multiple members. Assuming all other settings are left at their defaults, which statement is always true concerning traffic processed by the virtual server?
-
The client IP address is unchanged between the client-side connection and the server-side connection.
-
The server IP address is unchanged between the client-side connection and the server-side connection.
-
The TCP ports used in the client-side connection are the same as the TCP ports server-side connection.
-
The IP addresses used in the client-side connection are the same as the IP addresses used in the server-side connection.
Correct Answer: A
Question No.228
What is the expected difference between two source address persistence profiles if profile A has a mask of 255.255.255.0 and profile B has a mask of 255.255.0.0?
-
Profile A will have more clients matching existing persistence records.
-
There are no detectable differences.
-
Profile B has a greater potential number of persistence records.
-
Profile B will have fewer persistence records for the sane client base.
Correct Answer: D
Question No.229
APM provides access control lists at which two 051 layers
-
Layer 6
-
Layer 5
-
Layer 7
-
Layer 4
-
Layer 3
-
Layer 2
Correct Answer: CD
Question No.230
Which of the following are four of the security benefits of TMOS? (Choose four.)
-
It verifies traffic based on antivirus signatures.
-
It provides protection against DDoS.
-
It uses SYN cookies and dynamic connection reapers.
-
It supplies guidance for poorly developed applications.
-
It denies all traffic that hasn#39;t been defined.
-
It can hide confidential information from outbound traffic.
Correct Answer: BCEF
Get Full Version of the Exam
101 Dumps
101 VCE and PDF