Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.301
Which of the following is NOT a profile type on the BIG-IP?
-
Protocol
-
Application
-
Persistence
-
Authentication
-
SSL
Correct Answer: B
Question No.302
Which is NOT an ASM protection method for cross site scripting?
-
Signatures
-
URl character set limiting
-
Token injection
-
Parameter character set limiting
Correct Answer: C
Question No.303
Which IP address will the client address be changed to when SNAT automap is specified within a Virtual Server configuration?
-
The floating self IP address on the VLAN where the packetleaves the system.
-
The floating self IP address on the VLAN where the packet arrives on the system.
-
It will alternate between the floating and nonfloating self IP address on the VLAN where the packet leaves the system so that port exhaustion is avoided.
-
It will alternate between the floating and nonfloating self IP address on the VLAN where the packet arrives on the system so that port exhaustion is avoided.
Correct Answer: A
Question No.304
When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose two.)
-
License file
-
Security policies
-
Web applications
-
Request information
-
Traffic learning information
Correct Answer: BC
Question No.305
What occurs when a load command is issued?
-
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}
-
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}
-
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }
-
rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}
Correct Answer: A
Question No.306
What percentage of storage in a typical environment is actively used and modified?
A. |
5% |
B. |
50% |
C. |
25% |
D. |
10% |
E. |
90% |
Correct Answer: D
Question No.307
Which three of these are the potential ending options for branches in the Visual Policy Editor? (Choose three.)
-
Reject
-
Fallback
-
Allow
-
Deny
-
Limit
-
Redirect
Correct Answer: CDF
Question No.308
Which cookie persistence method requires the fewest configuration changes on the web servers to be implemented correctly?
-
insert
-
rewrite
-
passive
-
session
Correct Answer: A
Question No.309
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request?
-
A
-
B
-
C
-
D
Correct Answer: B
Question No.310
Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server.
-
Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
-
Terminating SSL at the BIG-IP eliminates all unencrypted traffic from the internal network.
-
Terminating SSL at the BIG-IP eliminates all unencrypted traffic from the internal network.
-
Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.
-
Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.
Correct Answer: A
Get Full Version of the Exam
101 Dumps
101 VCE and PDF