F5 101 Exam Practice Questions (P. 5)
- Full Access (460 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
FastCache will NOT work with compressed objects.
send
light_mode
delete
Question #42
Which of the following can be accomplished using iRules?
- ATrack inbound and outbound traffic
- BPerform deep packet inspection
- CInspect traffic and drop it
- DAll of the above
- EIntercept traffic and redirect it
Correct Answer:
D
D
send
light_mode
delete
Question #43
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
send
light_mode
delete
Question #44
Which four of the following statements about LDNS probes are true? (Choose four.)
- AOnly GTM devices can act as a prober.
- BThey check each requesting LDNS that has made a request of the GTM.
- CThey can determine available cache size on the client.
- DThey are used to develop path metrics.
- EThey verify the link between a data center and an LDNS.
- FProbing only takes place if GTM is configured to use dynamic load balancing.
Correct Answer:
BDEF
BDEF
send
light_mode
delete
Question #45
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.
send
light_mode
delete
Question #46
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
send
light_mode
delete
Question #47
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
- AThey want GTM to examine all DNS queries.
- BThey want GTM to make load balancing decisions based on metrics.
- CThey have data centers in several countries.
- DThey are using several operating systems for the local DNS servers.
Correct Answer:
C
C
send
light_mode
delete
Question #48
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.
What security benefit does this provide to customers?
What security benefit does this provide to customers?
- AOffloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
- Bprovides enhanced support for DNS servers.
- CEstablishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
- DProvides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
Correct Answer:
D
D
send
light_mode
delete
Question #49
Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.
- AF5 can ensure a DNS DDoS attack is not successful.Most Voted
- BF5 has high performance DNS services.
- CF5 can answer the DNS queries directly.Most Voted
- DWith Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
- EF5 can ensure a customer never faces a DNS DDoS attack.
Correct Answer:
CE
CE
send
light_mode
delete
Question #50
Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)
- ASecure the connection between WAN sites.
- BImprove application availability and scalability.
- CAuthenticate and authorize users.
- DBoost application performance.
- EInclude application security.
- FAct as a Web application firewall
Correct Answer:
BDE
BDE
send
light_mode
delete
All Pages