Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.61
Where is persistence mirroring configured?
-
It is always enabled.
-
It is part of a pool definition.
-
It is part of a profile definition.
-
It is part of a virtual server definition.
Correct Answer: C
Question No.62
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP
service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
-
Edge Client
-
iRules
-
LTM
-
IP intelligence
-
iApps
Correct Answer: D
Question No.63
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it:
If a user connects to 10.10.1.100 and port 22, which pool will receive the request?
-
ftp pool
-
telnet pool
-
None. The request will be dropped.
-
Unknown. The pool cannot be determined from the information provided.
Correct Answer: D
Question No.64
Which of the following is not a feature of a standalone BIG-IP ASM System?
-
Attack signatures
-
Multiple pool members
-
Positive security model
-
Real-time traffic policy builder
-
Predefined security policy templates
Correct Answer: B
Question No.65
Administrators can customize APM to resemble other internal Web applications in the organization.
-
True
-
False
Correct Answer: A
Question No.66
A object maps a FQDN to virtual servers. (Fill in)
Correct Answer: Wide IP
Question No.67
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
-
ping
-
Application monitors
-
Inband monitors
-
SSH
-
iQuery
-
SNMP
Correct Answer: ABEF
Question No.68
A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose three.)
-
Data Guard will be enabled.
-
The enforcement mode will be set to transparent.
-
The encoding language will be set to auto detect.
-
Wildcard tightening will be enabled on file types and parameters.
-
The Attack signature set applied will be Generic Detection Signatures.
Correct Answer: ABE
Question No.69
An LTM has the 3 virtual servers, a SNAT, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:80. When the request is processed, what will be the destination IP address?
-
Destination IP: 10.10.2.10
-
Destination IP: pool member in the 192.168/16 network.
-
Destination IP: pool member in the 172.16/16 network
-
The request will be dropped.
Correct Answer: A
Question No.70
Which of the following is a benefit of using iRules?
-
They provide a secure connection between a client and LTM
-
They enable granular control of traffic
-
They can be used as templates for creating new applications
-
They can use Active Directory to authenticate and authorize users
-
They provide an automated way to create LTM objects
Correct Answer: B
Get Full Version of the Exam
101 Dumps
101 VCE and PDF