[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 261-270

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.261

Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.

  1. True

  2. False

Correct Answer: A

Question No.262

Which is the result when multiple monitors are assigned to a pool member?

  1. The member is marked available if sufficient monitors succeed, and as unavailable if insufficient monitors succeed.

  2. The member is marked as available if any of the monitors succeed.

  3. The member is marked as unavailable if any of the monitors fails.

  4. The member is marked available if all monitors succeed, and as marginal if one or more monitors fail(s).

Correct Answer: A

Question No.263

What occurs when a load command is issued?

  1. The running configuration is replaced by the any portion of the configuration files that are syntactically correct.

  2. The running configuration is loaded into files for storage.

  3. The running configuration is compared to the configuration in files and, when changes are noted, the version in the files is loaded over what is in money.

  4. The running configuration is replaced by the configuration in the files, but only if they are syntactically correct.

Correct Answer: D

Question No.264

Which of the following mitigation techniques is based on anomaly detection? (Choose two)

  1. Brute force attack prevention

  2. Cross site request forgery prevention

  3. Web scraping attack prevention

  4. Parameter tampering prevention

Correct Answer: AC

Question No.265

When users are created, which three access levels can be granted through the GTM Configuration Utility? (Choose three.)

  1. Root

  2. Guest

  3. Operator

  4. Administrator

  5. CLI Web Read Only

Correct Answer: BCD

Question No.266

Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)

  1. Web Accelerator

  2. APM

  3. ARX

  4. GTM

  5. Firepass

  6. Enterprise Manager

Correct Answer: ABD

Explanation:

These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and GTM.

Question No.267

Administrators can configure which three of the following load balancing options in GTM? (Choose three.)

  1. Alternate

  2. Fallback

  3. Required

  4. Preferred

  5. Backup

  6. Optional

Correct Answer: ABD

Question No.268

What is the purpose of MAC masquerading?

  1. to prevent ARP cache errors

  2. to minimize ARP entries on routers

  3. to minimize connection loss due to ARP cache refresh delays

  4. to allow both BIG-IP devices to simultaneously use the same MAC address

Correct Answer: C

Question No.269

An administrator is planning on solving latency issues by placing the backup data center in a neighboring city to the primary data center. Why isn#39;t this effective solution?

  1. It does not provide an acceptable disaster recovery solution.

  2. It won#39;t improve latency between the data centers.

  3. It won#39;t improve the backup time from the primary data center to the backup data center.

  4. Users near the data centers will find their connections going back and forth between the two site

  5. It costs more to have the data centers close together than further apart.

Correct Answer: A

Explanation:

It does not provide an acceptable disaster recovery solution, it is too close in proximity

Question No.270

The Web Application Security Administrator user role can perform which of the following functions? (Choose two.)

  1. Modify HTTP class profiles

  2. Create new HTTP class profiles

  3. Create new Attack signature sets

  4. Assign HTTP class profiles to virtual servers

  5. Configure Advanced options within the BIG-IP ASM System

Correct Answer: CE

Get Full Version of the Exam
101 Dumps
101 VCE and PDF