Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.91
In order to further accelerate applications, the external router can direct subsequent client traffic to bypass LTM and communicate directly with the server.
-
True
-
False
Correct Answer: B
Question No.92
Another name for the F5 OneConnect feature is TCP multiplexing.
-
True
-
False
Correct Answer: A
Question No.93
Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)
-
Connect the GTM and LTM with a network crossover cable.
-
Synchronize the big3d versions between GTM and LTM.
-
Add the LTM object to the GTM configuration.
-
Configure the GTM and LTM to we MAC masquerading.
-
Ensure that GTM and LTM use the same floating IP address.
-
Exchange SSL certificates between the two devices.
Correct Answer: BCF
Question No.94
Which three iRule events are likely to be seen in iRules designed to select a pool for load balancing. (Choose three)
-
CLIENT_DATA
-
SERVER_DATA
-
HTTP_REQUEST
-
HTTP_RESPONSE
-
CLIENT_ACCEPTED
-
SERVER_SELECTED
-
SERVER_CONNECTED
Correct Answer: ACE
Question No.95
When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?
-
The size of the response
-
The requested resource (URI)
-
The response code from the web server
-
The parameter values of static based parameters
Correct Answer: A
Question No.96
When defining a load balancing pool using the command line, if the load balancing method is not specified, what is the result?
-
The default load balancing method would be used.
-
The load balancing method of the previous pool would be used.
-
The system would prompt the user for a load balancing method.
-
An error would be displayed since no load balancing method was specified.
Correct Answer: A
Question No.97
When is a Virtual Server hosted by an LTM System defined with two IP addresses?
-
Two addresses are used to define the Virtual Server when it is managed by redundant LTM Systems.
-
Two addresses are used to define some Virtual Servers so that the GTM System can choose the better address when resolving the name.
-
Two addresses are used to define Virtual Servers when the LTM System hosting it is behind a firewall that is translating the Virtual Server address.
-
Two addresses are used to define a Virtual Server when the Wide-IP should resolve to a different address depending on which LTM System is active.
Correct Answer: C
Question No.98
Listeners that correspond to nonfloating self IP addresses are stored in which configuration file?
-
/config/BIG-IP.conf
-
/config/BIG-IP_base.conf
-
/config/gtm/wideip.conf
-
/config/BIG-IP_local.conf
Correct Answer: D
Question No.99
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the
. (Fill in)
-
Deployment Wizard
-
Setup Wizard
-
Policy Wizard
-
Visual Wizard
Correct Answer: A
Question No.100
Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)
-
An organization using Novell Netware for authentication.
-
An organization that has been recently fined for failing security compliance.
-
An organization with a traveling sales force.
-
An organization with a single location and no remote employees.
-
An organization that needs to ensure users are using Symantec antivirus software.
-
An organization sharing a public Web site for all Internet users.
Correct Answer: BCE
Get Full Version of the Exam
101 Dumps
101 VCE and PDF