option
Cuestiones
ayuda
daypo
buscar.php
TEST BORRADO, QUIZÁS LE INTERESE: Practicar_APP
COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Practicar_APP

Descripción:
practicas

Autor:
Anonimo
OTROS TESTS DEL AUTOR

Fecha de Creación:
12/04/2024

Categoría: Informática

Número Preguntas: 261
COMPARTE EL TEST
COMENTARNuevo Comentario
No hay ningún comentario sobre este test.
Temario:
what command sends an "Echo Request" message and expects an "Echo Reply" message? ping tcpdump netstat echo.
A BIG-IP Administrator is cleaning up unused virtual server and pools via the configuration utility while trying to delete certain pools administrator receives an error message that the pool is in use. What is the likely cause of this error? the pool is in use by a virtual server the pool member are marked up whit a green circle The pool is in use by a monitor The pool members are all disable.
An Administrator enables HTTP keep alive. How does this affect the network? HTTP connections will remain open longer Fewer TCP connections will need to be opened HTTP connections will close when the keep alive times out More TCP connections will to be opened.
An Administrator needs to restore the BIG-IP configuration from a UCS file. In which section in the BIG-IP configuration utility is this task performed? System > Backup System > Archives System > Services > Backup System > File Management.
Which service should be configured to allow BIG-IP devices to be externally monitored? TMSH SSH SMTP SNMP.
A user is trying to access a website using URL https://1.1.1.1/. the website fails to load. The user can access other websites. Given the packet capture above, what is the most likely issue ? The remote server us actively rejecting the connection the client machine is not connected to the internet the remote server is no responding because it is down the cliente machine's DNS is configured incorrectly.
What is the primary function of a certificate authority ? To expire aoutdated certificates to store security certificates to verify and validate certificates to sing certificate signing request.
Which protocol data unit (PDU) is associated whit the OSI models Physical Layer? Datagram Frame Segment Bit.
A web administrator has added content to a web application, but users are unable to access the new content. What could be preventing them accessing the content? The webapp uses negative security and the denial of service signatures have not been updated The webapp uses negative security and the attack signatures is using an invalid regular expression The webapp uses negative security and the heuristic database has not been updated The webapp uses positive security and the new content has not been defined as allowed behavior.
in which scenario is a full proxy TCP connection requiered? When the source NAT is demanded When the DNS load balancing is performed when the client and server connectgion are decoupled when the client source IP address is sent to the server.
A BIG-IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Multi VLANS exist on LACP01. Which TMSH command should the BIG-IP Administrator issue to add the new VLAN to the existing LACP trunk? create net vlan VLAN40 (interfaces add (LACP01 {tagged)) tag 40} create net vlan VLAN40 {interfaces add {LACP01 {untagged}} tag 40} create net vlan VLAN40 interfaces replaces replace all whith {LACP01 {untagged)} tag 40} create net vlan VLAN40 interfaces replaces replace-all-whith {LACP01{tagged)} tag 40}.
A new VLAN segment has been added to the network. Only the existing connected interface may be used. What showuld the BIG-IP Administrator do to allow traffic to both the existing and the new vlan? configure an untagged VLAN configure VLAN to use interface whith Multiple Spanning Tree (MSTP) configure VLAN whith Ling Aggregation Control Protocols (LACP) configure a tagged VLAN.
An administrator needs a data format that supports authentication against an external security domain. The data format must also SSO. Which data format should the adminitrator choose? AAA EAP Kerberos SAML.
A BIG-IP Administrator Observers that the pool member status is a blue square. What does this status indicate? the object is available The object is unavailable the availability of the object is unknown The object has reached its configured connection limit.
A company deploys F5 load balancers to manage a large of secure applications. the company needs to centrally manager certificaes. Which product provides this functionality? GTM BIG-IQ LTM iHeath.
An IPV6 clients tries to connect to http://myserver.com. Which type of DNS request should the client send to its configured server? type AAAA type A type DNS type MX.
What is the purpose if the transport layer? formats, encrypts, and converts data for Application implements routing, enabling connections, and path selection between two end system converts packets from the Data Link layer into electrical signals divides the data into segments, reassembles and manages the order of data.
A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BIG-IP is currently supported. How showuld the administrator verify that the HA pair is under support contract? confirm that license OK is set to yes in the applied licence confirm tha the "Service Check Data" specified in the applied has not passed review var/log/license for a messages that indicate an expired license check the status of the licence under the platform menu of the F5 Configutarion Unity.
User A and User B's workstations are on the same VLAN. Lou connected through a transparent layer 2 bridge in user B's ARP table. Which MAC address is reported for user A's workstations? The MAC address of the user A's workstation The physical port MAC address on the bridge for user B's workstation The physical por MAC address on the bridge for user A's workstations The MAc address of the L2 bridge.
During a TCP three-way handshake, which packet indicates the server's maximum segment size (MSS)? the ACK that completes the three-way handshake the first packet after the three-way handsahke the initial SYN packet the SYNACK packet.
Which two protocol are used for the retrieval of email? (choose two) SMTP ICAP POP3 SNMP IMAP.
An administrator is updating private keys used for SSL encryption from 1024 to 2048 bits. Which possible effect should the administrator consider when performing this activity? The larger key size will increase private key installation complexity Some certificate authorities will NOT support the 2048 key Some hardware will NOT support the 2048 key The large key size will increase processing requirements.
At which layer of the OSI model does the DNS resolution process occur? Layer4 Layer7 Layer3 Layer2.
An administrator needs to all secure access to applications within the corporate data center for remote office, branch office and mobile employees. Which F5 product provides this functionally? APM GTM AFM ASM.
How is hop limit defined in a packet? PDU MSS MTU TTL.
A client's operating system needs to make sure that data received from a server is mapped to the application. How does it complete this mapping? using the server source port using the TCP acknowledgement number using the client source port using the TCP sequence number.
A BIG-IP Administrator needs to make sure that request from a single user are directed to the servver that was initially selected (unless that server us maned down). What should the administrator configure? TCP profile persistence profile caching profile security policy.
in which scenario would an SSL VPN solution have an advantage over an IPSec VPN? when users require a secure connection to the corporate network when users require the ability to RDP to internal resources when users are unable to install software on their PC when users work remotely.
in which scenario does the client act as a server? when browsing websites when downloading email during an SMTP connection during an active FTP session.
ICMP is used by which command line tool? nslookup traceroute tcpdump curt.
Client for a web application is managed by a load balancers in a high-availability configuration. After a failover event, all clients are forced to login again to the web application. What is the most like reason this ocurred? SSL offloading was OT configured on the load balancer correction mirroring configuration was NOT configured on the load balance Clients were sending request to failed load balancer The server was responding to the failed load balancer.
What is the correct procedure to comply whith the recommendation? Download the product version image from devcentral.f5.com Download the product version image from ihealt.f5.com Download the product version image from support.f5.com Download the product version image from downloads.f5.com.
A client receives all of the expetced data from a server and sends a FIN packet signaling the end of communication. What will the server do when it receives the FIN Packet from the client? send an RST packet send an ACK Packet send a SYN packet send both FIN and RST packets.
Given the service list of a server shown. the administrator needs to determine why users are unable to resolve the ip address www.example.com. What is causing this issue? tomcat is down named is down dnscahed is down bigd is down.
A BIG-IP Administrator is trying to send traffic to a server on the same subnet and sees an incomplete in the BIP-IP devices ARP table. What could cause the imcomplete status? Router does not have a default gateway BIG-IP device connection is half-duplex Server's switch connection is in the wrong VLAN Firewall is blocking ICMP.
What Tool Should the BIG-IP Administrator use to view the status of all virtual server and associated resources in one place? system performance Virtual server statistics Network Map Pool statistics.
What should the BIG-IP Administrator configure to perform SSL of loading when the certificate is already imported on the BIG-IP device? Virtual server using SSL profile configured to use the certificate Virtual server using client SSL profile configured to use the certificate HTTP profile using server SSL profile HTTP profile using client SSL profile.
Ping and traceroute outputs are provided for a connectivity issue. What is the cause of these results? routing loop asymetric routing multiple paths toward the destination packets that are routed with a high metric.
in an active/standby high-availability mode, what causes a standby unit to assume the active role? resource utilization hashed unit ID management MAC address heartbeat detection.
HTTPS traffic is not working properly. What is the likely reason for the issue? The server is not listening on TCP 443 0.0.0.0 is an invalid address in netstat The server is not listening on UDP 80 0.0.0.0:80 should be in an active state.
in which scenario is a full proxy TCP connection required? UDP to ICMP gateway UDP routing TCP routing IPv4 to a IPv6 gateway.
A client is transmitting a large amount of data to a server. During this process, the server sets the window size to zero. What is the likely cause of this issue? The server is unable to accept more data The client runs out of network buffers The server resets the connection The server reaches its maximum segment size.
End user report widespread issues accesing multiple network resources. What tool should the BIG-IP Administratror use to view status of all virtual servers and associated resources in one place? Pool statistics Virtual server statistics Network Map system performance.
A user opens a command prompt and uses the ipconfig command to view the IP settings: The user runs a test with ping to 172.17.10.4. Which of the following would happen? The PC sends a DNS query for 172.17.10.4 The PC sends an ARP looking for the MAC address of 172.17.10.4 The PC sends an ARP looking for the MAC address of 172.17.10.1 The PC sends a DNS query for 172.17.10.
TLS-SSL provides which funtionality when a web browser connects to a web site using the HTTPS protocol? stop the web browser from automatically downloading malware prevents the web server from being compromised protects network packets from interception by iontermediaries delivers secure communication over a network connection.
Which technology can be used on a BIG-IP device to accelerate the deliver of the same content to multiple user? caching compression persistence SSL offloading.
An administrator is given the IP Address of 192.168.100.0/24 and needs 64 subnets. How many hosts per network are allowed? 2 8 6 4.
Which funtion does a caching profile provide on the BIG-IP server? caches data for reuse to cut down on transfer time for future request caches HTTP headers to improve servcer load times caches client IP addresses to improve respoinse times caches selected pool members to improve load balancing times.
An administrator needs to provide access to corporate resources for remote users. The administrator also needs to virify that the remote user has anti-virus software installed. Which F5 product provides this functionality? APM AFM ASM GTM.
An administrator configure secures remoto access to a server's to a server's shell. Given the netstat output, what did the administrator configure? sshd, allowing connections only from IP address 10.1.10.46 telnetd, listening on IP address 10.1.10.46 feinted, allowing connections only from IP address 10.1.10.46 sshd, listening on IP address 10.1.10.46.
A BIG-IP administrator recently reset statistics or interfaces 1.1 and 1.2 the adminstrator notices that traffic appears on a data plane interface without receiving any clients request. All nodes and pools have monitoring enabled, and all routes are locally defined on the device. A management traffic is sent over the mgmt interface. What is the nature of this traffic? Dynamic routing protocols SNMP polling and traps TCP keepalives for node and pool me Health checks for nodes and pool members.
if a workstation is configured with an address of 224.0.0.1, which funtionality will allow? multicasting to the local subnet loopback to itself automatic private IP addressing broadcasting to the local subnet.
A new VLAN must be created whith an 802.11 tag of 705 on interface 1.1, What is the proper TMSH command to create this new VLAN on the BIG-IP? create /net vlan internal interfaces add { 1.1 {tagged} tag 705 add /net vlan internal interfaces add {1.1} tag 705 create /net vlan internal trunk add { 1.1 { tagged } add /net vlan internal trunk add { 1.1 { tagged } tag 705.
Which technology alllows remote users encrypted users access to corporate resources? SSL VPN FTP MPLS GRE.
Which HTTP response code indicates an OK status? 404 302 200 100.
Which protocol data unit (PDU) is associated with the OSI models Transport layer? Bit Segment Packet Datagram.
A BIG-IP Administrator runs the command ipconfig form the BIG-IP command line and sees a high number of collisions. What is the likely cause? A crossover cable has been used The interface is sent to hall duplex Spanning Tree Protocol is blocking the port There is a duplicate IP addres on the network.
The users in a company are unable to send and receive SMTP e-mails using the BIG-IP Virtual Server. The administrator logs into the BIG-IP device to verify if the mail pool member with an IP address of 192.158.10.100 is serving SMTP traffic. Which command on the BIG-IP device should the administrator use to verify the traffic? tcpdump -ni 0 0 host 192.168.10.100 and port 25 tcpdump -ni 0 0 host 192.168.10.100 and port 443 telnet 192.168.100.143 curl -i smtp1/192.168.10.100.
A BIG-IP Administrator is trying to reach the internal web server from a workstation. - The workstation has a MAC address of 00:00:00:00:00:01 and an IP address of 192.168.0.1 - An internal web server has a MAC address of 00:00:00:00:00:02 and an IP address of 10.10.1.1 - The workstation's default gateway has a MAC address of 00:00:00:00:00:03 and IP addres of 192.168.0.254 What is the destination hardware address of the outbound packet when it leaves the workstation? 00:00:00:00:00:00 00:00:00:00:00:02 00:00:00:00:00:03 00:00:00:00:00:01.
Web application http://www.example.com, at 10.10.1.110, is unresponsive. A recent change installed new firewalls in the network. Which command should be used to test remote http connectivity to the web application? ping 10.10.1.110 traceroute 10.10.1.110 curl 10.10.1.110 telnet 10.10.1.110.
What are two ecxamples of failover capabilities of BIG-IP? (choose two) Failing over network connection based on SNMP error Failing over serial cable based on electric failure code Failing over based on a over temperature alarm Failing over network connection bades on a heartbeat detection Failing over serial cable based on voltage detection.
What does response code HTTP 302 represent? The server has not found anything matching the Request-URI The request has succeeded The requested resource resides temporarily under a different URI A the server encourented an unespected condition that prevented it from fulfilling the request.
For an IP of 192.168.10.10 with a subnet mask of 255.255.240.0 an administrator is asked to provide: - The first network address - The broadcast address - The number of hosts available per subnet host What should be the administrator's response? 192.168.16.0 is the network address 192.168.31.255 is the broadcast address there are 4094 addresseable hosts 192.168.0.0 is the network address 192.168.15.255 is the broadcast address. There are 4094 addresseable hosts 192.168.0.1 is the network address 192.168.10.255 is the broadcast address. There are 16382 addresseable hosts 192.168.0.0 is the network address 192.168.16.255 is the broadcast address. There are 1022 addresseable hosts.
An administrator notices the following logh message generated by a BIG-IP system "diskmonitor: 011d005: Disk partition shared has less than 30% free" Which command showuld the administrator use to troubleshoot the problem? df-h fdisk-1 parted-1 isbik.
After all expected HP data has been sent from a server to a client the client does not close connection. The server reaps the connection, but after that client sends a "keep alive" packet to the server. Which type will the server respond with? SYN FIN RST ACK.
A server is capable of handling more connections than other servers in the same pool. Which load distribution method should the administrator choose? Least Connections Round Robin Ratio Fastest.
A device needs to decrytpt traffic and send unencrypted to the web server. Which method should the BIG-IP Administrator use? SSL caching SSL Birdging SSL Termination SSL Optimization.
An administrator finds a BIG-IP Virtual Edition (VE) disk size inadequeate for upgrading, The administrator has increased the disk size on the hypervisor and increased the size of the directories on the BIG-IP VE. What does the output indicate? The disk size increase is pending and requieres the hypervisor to be updated The disk size increase has failed and requieres attention on the hypervisor The disk size increase has failed and requieres attention on the hypervisor The disk size increase will take effect after a reboot.
An administrator is having a connectivity issue with a server in the same network. Upon checking with the command arp-a on a Windows machine. the two outputs are taken on a 1 minute interval. What is likely causing this issue? IP address conflict The interface down Mac address conflict No route available.
A BIG-IP administrator reviews the virtual server configuration and sees the object status represented by a blue square for an unknown status. How should the administrator change the unknown status? restart the BIG-IP device restart the backend webserver run a packet capture on the BIG-IP device assing a monitor to the pool.
Application on one VLAN are experiencing poor performance. Which statistics showuld the BIG-IP Administrator use to troubleshoot this issue? Connection statistics Pool statistics Virtual Server Interface statistics.
A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool showuld the administrator use to show synchronization status with the network time protocol servers? ntpd ntpdate date time.
A BIG-IP Administrator is troubleshooting a slow web applicationb. A packet capture shows that some of the packets coming from a windows size of zero. A packet shows that some a window size of zero. What does this mean? A client is trying to close the TCP connection The server is temporarily unable to receive any more data The server is trying to close the TCP connection The client is temporarily unable to receive any more data.
Which protocol coiuld be used to proveide AAA Accounting? SAML Kerberos DIAMETER LDAP.
An Administrator needs a remote VPN solution for corporate users. The existing network infraestructure has web-based services. The administratror needs to select the VPN that is the least complicated to deploy. Which VPN solution should the administrator choose? PPTP SSL IPsec L2TP.
What are the two primary functions of the OSI 7 layer model? (choose two) to define protocol behavior to standardize HTTP commununications between different vendors to group communications into logical layers to guide interoperability between products made by different vendors to define specifications of host-to-host communications.
The BIG-IP device has the following configured routes: Which gateway will be chosen to send packet to the destination 10.238.10.11? 192.168.10.20 192.168.10.10 192.168.10.30 192.168.10.40.
A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show synchronization status with the network time protocol servers? ntpdate ntpd time date.
An application has a nix of both shot and long lived connections. Which algorithm would provide an even distribution fo all connections across the pool? priority group activation least connections round robin static ratio.
A BIG-IP Administrator needs to create a virtual server for a new secure end-to-end web application. After changes in configuration, the virtual server is still server marked down. The configuration of the virtual server and the pool me are correct. Aquick server shows the status. To fix how issue, what should the BIG-IP Administrator inform the web server administrator to do ? restart the web service change the web server configuration to use SSL/TLS change the web server configuration to use SSH/SCP reboot the server.
How does file caching affect the web application? It reduces the load on the web application It increases the load on the web application It slows traffic to the web application It speeds up traffic to web application.
A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connecctions over the internet using only a standard and common ports and protocols, Which solution should the administrator select? GRE Tunnel SSL VPN SSH tunnel IPsec VPN.
The Administrator wants client request to be directed to the same pool member throughout the session on the client IP address. Which persistence method should the administrator choose ? coockie persistence SSL persistence Source address affinity persistence destination address affinity persistence.
Which type of certificate is pre-installed in a web browser's trusted store? Client Certificate Root Certificate Server Certificate intermediate Certificate.
A certificate chain can be used for which purpose? Creating anonymous connections on the internet anchoring the geographic location of a client or server Ensuring multiple layers of decryption and encryption Determining a client or server should be trusted.
ARP provides translation between which two address types? IP addresses and hardware addresses VLAN and IP addresses Hostnames and IP addresses Hardware addresses and VLAN.
What describes the third "A" in the common authentication acronym AAA? provides redundancy measures usage against an identity ensure the correct identity provides user filtered access.
in the context of load balancing, what does the term "persistence" refer to? the ability to keep idle connections open as long as possible by sending dummy traffic periodically Ensuring request from a single source always end up being handled by the same server the ability for associate different HTTP request to a single user so that activity can be tracked Keeping TLS session key information in memory so sessions can be quickly resumed.
In which scenario is a full proxy TCP connection requiered? when routing is enabled when IP Anycasting is enabled when the number of TCP connections to the server must be optimized when the client TCP connections options must be sent to the server.
An administrator needs to selectively compress HTTP traffic based on geographical location. Which F5 feature showuld the admnistrator use? irules SPDY profile ONE Connect iSessions.
Comment calculator DNS error SERVFAL HTTP 404 and SMTP error 550 are all examples of which type error? Application Service Session network.
The BIG-IP device has the status of interface 2.1 as DOWN. The BIG-IP Administrator validates that the cabling is correct and connected to switch port 3/2/1. What is the likely reason for the status of the interface to be DOWN? The interface 2.1 is unpopulated oin the BIG-IP device The interface 3/2/1 is DOWN on switch The interface 3/2/1 is UP on switch The interface 2.1 is diseable on the BIG-IP device.
Which HTTP response code is returned when a web server requieres authentiocation to access a resource? 100 302 401 500.
Whats is used to resolve IP address to MAC address mappings? DHCP ARP DNSD ICMP.
Ethernet frame FCS errors occur when which calculation fails? CRC FSCM CSR HSTS.
What should a BIGIP Administrator configure to provide remote access and ensure data privacy? VPN GRE packet filter security policy.
A BIGIP Administrator recently added a new VLAN and needs to confirm that the BIG-IP sees traffic on ths VLAN the VLAN is untagged on interface 1.1 and is named VLAN7M4 in the BIG-IP utility. Which tool should be used to generate a packet captuyre that shows all traffic on this VLAN? netstat ifconfig tcpdump map.
A company needs to use a custom value when making persistence decisions. Which f5 product provides this funcionality? iControl iApps iRules iHealth.
A wishes to retrieve a file from a FTP server. A minimum of how many TCP connections are required to perform this action? 1 4 2 3.
A BIG-IP Administrator needs to perform a packet capture and identify the source IP that is connecting to the Virtual Server. Which utility showuld the administrator use on the BIG-IP device? traceroute ping telnet tcpdump.
In which scenartio is full proxy required? when all TCP client parameters must be seen by the server when administration directly access the servers for administration when a separation between client and server connection is needed when the server sends the response through the load balancer.
What does HTTP status code 500 mean? Internal server error Bad Gateway Gateway timeout service unavailable.
The useof attack signatures within an intrusion Detection System (IDS) is an application of which security model? Negative Positive Role-Based context-based.
An administrator is currently designing the IP addresing scheme for a small company. They have been to use the 192.168.100.x block of address a /27 network prefix. How many network will be available when using the 27-bit network prefix? 8 networks with 30 hosts 30 networks each with 8 hosts 255 networks each with 224 hosts 27 networks each with 30 hosts.
In which scenario is a full proxy TCP connection required? when compression is activated when a virtual server is configured When source IP persistence is required When source NAT configured.
In an administrator's enviroment, the administrator wants to inspect a high volume of SSl traffic. What showuld be used for this task? Big-IP Global Traffic Manager appliance Big-IP standard virtual edition Big-IP Local Traffic Manager appliance Big-IP virtual editiuon with FIPS.
What is used to stablish trust relationships between BIG-IP devices? trust ID units ID certificate-based authentication device group identification.
What is a primary benefit of employing a load balancer to manage traffic for an application? It Reduces dropped connections It allows easy scaling up of the application It provides a more uniform client experience It reduces the number of client connections.
A messanging system digitally signs to ensure non-repudation of the sender. Which component should the receiver use to validate the message? A negociated security algorithm It Private Key It SSL extension Public Key.
An administrator security policy defines allowed URLs, file types and parameter values. Which security model is the administrator using? positive Security model negative security model Closed security model ACL Security model.
Web application http://www,example.com at 10.10.1.110 is unresponsive. A recent change migrate DNS a new platform. Which command should be used test that the correct namespace is being retruned toi the user? dig www example.com telnet www. example.com 80 telnet 10.10.1.110.80 dig 10.10.1.110.
A VoIP application requiers taht data payloads will NOT be fragmented Which protocol controils network behavior in this situation? TCP RTSP UDP IP.
A website is using source address persistence with a 30 second timeout a client is idle for 35 seconds. What happens to their connection? The client receives a "404 Page Not Found error The client connection is dropped The client remains on the same server The client request is load balancer.
Which protocol data unit (PDU) is associated with the OSI model Network Layer ? Packet Segment Bit Frame.
Without decrypting, what protion of an HTTPS sessions is visible with a packet capture ? HTTP request Headers Sources IP Addrees Cookies HIP Response Headers.
Which security model provides protection from unknown attacks ? ACL Security model Positive security model Negative security model closed security model.
Which three security controls are used in a SSL transaction? (choose three) Symmetric encryption Asymmetric encryption database encryption network admission controls digital certificates.
An administrator needs to provision additional modules on a BIG-IP virtual Edition (VE). What showuld be done to increase the vCPU and memory of the BIG-IP VE? Shut down the BIP-IP VE, edit vCPU and memory settings powe on the guest leave the BIG-IP on edit the vCPU and memory settings restart the guest leave the BIG-IP on edit the vCPU and memory settings in System > Resource Provisioning restart the BIG-IP VE Shut down the BIG-IP VE and memory settings in system > Resource provisioning power on the BIG-IP VE.
An administrator needs to rapidly deter newly discovered security threat to a remote desktop application. Which F5 feature provides this funtionality? SSL profiles iRules Proxy SSL SPDY.
Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (Ido) offer (Choose two)? filter access provide session auditing provide availability provide authentication measure usage.
What is one way that application delivery controller lowers the CPU-load on web servers? use SSL termination at the application delivery controller make the application delivery controller function as a firewall make the application delivery controller a member of both external and internal VLANs use cookie persistence on the application delivery controller.
An administrator suspects that a BIG-IP appliance is experincing performance issues due to spikes in CPU checks the performance reports in the BIG-IP UI can the administrator check to troubleshoot the issue further? Statistics > Utilization Statistics > Dashboard System > Service System > Utilization.
A BIG-IP administrator contacts F5 support and is asked to a Snapshot, Which command should be entered to generate the requested file? tmsh qkview tmsh tcpdump tmsh save sys ucs support tmsh generate snapshot.
What is a common use of an iRule? to create a reusable application delivery template to integrate a BIG-IP into an enterprise orchestration tool to modify application traffic betwenn the client and server to create an accelerated session between two BIG-IP devices.
in which scenmario is a full proxy TCP connection required? when a server responds directlto the client whgen traffic is routed when administrators manage the servers directly when SSL offloading ius used.
A BIG-IP Administrator needs to upload a view to software upgrade options which service should be used? F5 WedSubDon DevCentral iHealth AskF5.
Web application http://www.example.com at 10.10.1.110 is unresponsive- Arecent change installed new firewalls in the network. Which command showuld be used to locate where data loss has ocurred within the network? ping 10.10.1.110 telnet 10.10.110 dig 10.10.110 traceroute 10.10.1.110.
An administrator needs to deploy a VPN solution that offers data integrity and origin authentication of IP packets. Which solution showuld the administrator use? PPTP IPsec VPN SSL VPN GRE.
When is the server also a client? during a passive FTP session Whiule uploading files While receiving email during an active FTP session.
Which funtion does the presentation layer provide? translation and encryption trasnsmition over a medium internetworking capabilities access to available resources.
An administrator needs to protect a web application from cross-site scripting (XSS) exploits: Which F5 protocol provide this functionality? GTM APM ASM AFM.
in which scenario is a full proxy TCP connection required? when layer 3 load balancing is configured when SIP UDP load balancing is defined when compression is eneable when DNS load balancing is configured.
what us the next hop used to send traffic to reach 192.168.1.50? 172.17.12.254 172.17.12.51 192.168.1.50 172.17.12.255.
Which kind of network issue results in ICMP TTL expired in transit messages? Link speed mismatch Spanning tree loop Asynchronous routing Routing loop.
An adminitrator wants to create a new vlan in the BIG-IP device using the 2.1 network interface. The interface is showing the status that appears in the exibit. What could be the reason for this? No SPF inserted in the slot Has SPF installed but no cable attached Cable is connected but no networks signals Software might not have initialized the interface.
A company is creating a new department dor Security Engineering needs to create a segregated network segment with only 24 IP's What should be configured? configure a new vlan and assing a netmask of /29 use an existing VLAN and assing a netmask of /30 use an existing VLAN and assing a netmask of /28 configure a new vlan and assing a netmask of /27.
An administrator deploys a site in which the load balancer only sees the ingress traffic form the client. Which type of solution is this? Full proxy architecture packet forwarding architecture delayed binding switching.
What is the response of HTTP 200 status code? CONTINUE FOUND OK MISSING.
HTTPS traffic is not working proporly. What is the likely reason for this issue? The server is not listening on TCP 443 The server is not listening on UDP 80 0.0.0.0 is an invalid address in netstat 0.0.0.0:80 should be in an active state.
A new virtual server is being tested to replace http://myapp.mydomain.com. What should be done to test this new virtual server the fully quelled domain name for this application? make an entry in the client host file make an entry in the web server series file add a DNS record for the fully qualified file add the fully qualified domain name to browser cache.
Which protocol data unit (PDU) is associated with the OSI model's Network layer? Segment Frame Bit Packet.
In IPv4 the loopback IP is 127.0.0.1 For IPv6, what is the loopback address? FEB00:0:1 FE80:0::0:1 ::1 2001:127::1.
Which transport layer security (TLS) extension can be used to enable a single virtual server to server multiple HTTPs websites in different can be used to enable a single virtual server to server domains? Certificate Status Request OCSP Stapling Server Name Indication Session Tickets.
Which protocol maps a MAC address to an IP address? DNS ARP UDP SCP.
Which two destination ports showuld be used in a default active FTP Session? (Choose two) TCP 20 UDP 20 TCP 21 TCP 22 UDP 21.
Which device group type allows a BIG-IP system automatically become active in the event that the current active system fails ? sync-standby Sync-active sync-only sync-failover.
An administrator encounters an error while working on eBIG-IP device and contacts F5 support to open a case. While opering the case F5 support of the administrator that a BIG-IP vertsion update is required. Which F5 support policy requires the adminstrator to upgrade the BIG-IP version? End of Technical Support End of return to Manufactoring End of Software Support End of Support Contact Renewal.
What are three functions commonly performed by HTTP cookies?(Choose two) execute server side scripts maintain session state Track users browsing activities execute client side scripts hold user preferences.
An administrator needs to lowe the amount of new TCP connections to help with network congestion. How should the administrator accomplish this? Enable delayed ACKS Use HTTP keep-alive use an indefinite timeout set a larger receive window.
in which scenario is packet forwarding architecture required? when HTTP header must be modified when the number of TCP connectiond on the server should be reduced when the server responds directly to the client when cookie persistency is demanded.
in which version of SNMP can AuthPriv be used? 3 2 2c 3c.
Which two OSI layers map to IP subnetting and TCP window sizing function? (choose two) Network Data Link Session Application Transport.
what advantage does an active-standby configuration have over an active-active configurations? Active-standby Uses significantly less power comsumption than active-active Active-standby utilizes the hardware more efficiently Active-standby configuration allows for the backup of peer configuration Active-standby is less complex to troubleshoot.
What is an advantage of packet forwarding architecture? reduce latency allows for SSL offload handles larger packet sizes allows for manipulation of HTTP headers.
Which IP subnet mask can be used to send traffic to all network nodes? 192.168.0.11/30 192.168.0.255/23 172.16.1.255/22 192.168.1.11/31.
The BIG-IP device is connected to the same network as a server. Which communication protocol will the BIG-IP device use to discover the link address of the server? ICMP RARP ARP PING.
A company deploys F5 load balancer to manage a large number of secure applications. The company manage certificates. Which F5 product provides this functionality? LTM GTM BIG-IQ iHealth.
An F5 Administrator finds a critical software detect that is affecting the performance of applications utilizing the BIG-IP has the most current-long-term stability release and hotfixes installed F5 support indicates that there is no workaround available. Which solution provided by F5 support should the administrator use to fix defect? software upgrade Rule An engineering hotfix hotfix.
The HTTP 1/1 standard is being used as part of communications to a server. The client fails to maintain the session within tha maximum timeout by the server. Which device is responsible for ending the HTTP session? the client the default gateway of the load balancer the server the load balancer.
What does "ICMP Time Exceeded" mean? The ping command exceeded the time limit TTL has reached zero Remoto host did not respond The traceroute command exceeded the time limit.
BIG-IP ASM is requesting automatic signature updates from the F5 update service. Who is considered the srver in this communication? BIG-IP F5 update Service web application User A.
An administrator configures a default gateweay for the host. What is the purpose of a default gateway? to pass all traffic to the defualt gateway to populate the ARP table to forward packets to remote networks to replace the destination IP address with the default gateway.
The 2001:db8:f54 IPv6 address block is allocated to a load balancer for uses as virtual server addresses. The address block is routed to a load balancer self IP address using a static route. What is the correct representation for last address in the address block that a virtual server can use? 2001:db8:: 2001:db8::255 2001:db8:ffff:ffff:ffff:ffff 2001:db8:ffff:ffff:ffff:fffe.
Which protocol emphasizes reduced latency over reliability? TCP GRE UDP RSVP.
An Administrator takes a capture of live traffic using tcpdump. the administratoir notices that different ephemeral port numbers are used on the server side of the load balancer than on the client side. Which type of architecture does this indicate? hube and spoke architecture packet-based architecture full proxy architecture ring network architecture.
An administrator need to prepare change control documents for operations staff. To reduce possible errors the administrator killed number of default configuration options to choose from. Which F5 feature is intended to help with this task? icontrol iApp iCall iRules.
An IPv4 client tries to acces to http://www.myserver.com. Which type of DNS request should the client send to its configured DNS server? type AAA type NS type MX type A.
An administrator wants to insert per-session data in a users browser so that in a user browser so that user request are directed to the same session. Which session persistence method should the administrator use? Source address persistence SSL persistence destination address persistence cookie persistence.
A company recently opened a new branch site. The site needs to access the internet trough a link to HQ. The router ate the branch 1 the computers at the branch site reside on ther network 192.168.1.0/24 directly connected to Branch1 Users al HQ ca already access the internet. What routing must be configured to achieve the required internet connectivity for the branch site? only a route for 0.0.0.0 on Branch1 to core a route for 0.0.0.0 on core 1 to branch1 and a route for 192.168.1.0/24 from branch1 to core1 only a route for 192.168.1.0/24 on core 1 to Branch1 a route for 0.0.0.0 on branch1 to core1 and a route for 192.168.1.0/24 from core1 to branch1.
Which command should a BIG-IP Administrator use to resolve the domain www.f5.com? find dig grep ping.
The BIG-IP Administrator performs the capture as shown in the image. On which protocol is the application responding? DNS RDP HTTPS HTTP.
A BIG-IP Administrator needs to configurate a MAC masquierade adderss for traffic-group 1. Where on the GUI should this configuration be performed? Network > ARP: Static List > traffic-group-1 System > Configuration: Device General > traffic-group-1 Device Management > Traffic Groups > traffic-group-1 Local Traffic > Traffic Class > traffic-group-1.
A BIG-IP Virtual Server with an IP address of 10.100.43.108 must be available to public internet users. Which technology should be used to achieve this task? DNS NDP ARP NAT.
A BIG-IP Administrator is testing a web server behind ADC. The connection to a virtual Server is successfull but the page ios still not loading. Where should the administrator test to determine if the server is available? from client side interface in ADC from server side interface in ADC from switch connected to ADC and server from Workstation client.
A BIG-IP appliance is connected to a switch via a single interface. The switch is configured to present VLAN's 101 and 102 using 802.1q and VLAN 200 as the native VLAN. How should the administrator configure all three VLAN's correctly on the appliance? Set VLANS 101 and 102 as tagged and VLAN 200 as untagged Set VLANS (101, 102 and 200) as tagged Set VLANS 101 and 102 as untagged and VLAN 200 astagged Set VLANS (101, 102 and 200) as untagged.
VLAN "test-vlan" is configured on interface 1.1 instead of interface 1.2 which TMSH command should be used to correct this issue ? modify /net test-vlan interfaces replace all with {1.2} modify /net vlan test-vlan interfaces replace all with {1.2} modify /net vlan test-vlan interfaces { 1.2} modify /net test vlan interfaces { 1.2}.
Crytographic hash functions can be used to ptovide which service? data modification data validation data decryption data encryption.
What ir a benefit of configuring BIG-IP devices in active-active high availability mode? provides ability to upgrade a member of the pair without disruption avoid overload in the BIG-IP system in the event of a failover allows full utilization of hardware purchased reduces troubleshooting complexity.
A network Administrator needs a new networking device that can perform NAT to connect several devices on a computer network. What is the most appropiate device for this requirement? Switch Router Hub Bridges.
Which protocol Autheticates network traffic between hosts end without encryption? GRE IPsec ESP PPTP IPSec AH.
Devices are configured to use the following timeserver 0asia.pool.ntp.org. Which support service is required to synchronize the time stamps in system logs from these devices? SNMP DNS SMTP Syslog.
An administrator configures, a custom MAC masquerade address on a redundant BIG-IP system. What will be result? The adminitrator will be prompted during configuration to define which unit use the MAC masquerade address The MAC masquerade address will only be used by the active unit The MAC masquerade address will be concurrently used by both active standby unit The standby unit will use the system is actual interface(s) MAC address the other unit will use the system's actual interface(s) Mac address.
A user opens a command prompt and uses the ipconfig command to view the IP settings: IPV4 Address .......................... 172.17.10.28 Subnet Mask .......................... 255.255.255.224 Default Gateway ................... 172.17.10.1 The user runs a test with ping to 172.17.10.4 Which of the following would happen? The PC sends an ARP looking for the MAC address of 172.17.10.1 The PC sends an ARP looking for the MAC address of 172.17.10.4 The PC sends a DNS query for 172.17.10.4 The PC sends a DNS query for 172.17.10.1.
Given the /var/log/ltm, what triggered the BIG-IP device to failover? the vlan external falsed the clock advance by 515 the monitor status for pool member went down the virtual server GOLF-HOTEL-IIS_Become unavailable.
File caching is turned on in the BIG-IP Local traffic Manager. Why does this ligten the traffic load for the web application? because the web application will serve the file faster because the file will be processed through the Local Traffic Manager because the file is compressed at the Local Traffic Manager because the client receives the file firectly from the Local traffic Manager.
A BIG-IP Adminmistrator needs to create a route to send traffic destined to 10.1.1.1 to another router with and address of 192.168.1.1, Which TMSH command should the arministrator use? add/net route 10.1.1.1/32 gw 192.168.1.1 add/net route 192.168.1.1 gw 10.1.1.1/32 create/net route 10.1.1.1/32 gw 192.168.1.1 create/net route 192.168.1.1/32 gw 10.1.1.1.
In 2001:db8::f64 IPv6 address block is allocated to load balancer for use as virtual server addresses. The address block balancer set ip address using a static route, What is te correct representation for the last address in the address block that virtual server can use? 2001:db8::ffff:ffff:ffff:ffff 2001:db8::255 2001:db8::ffff:ffff:ffff:fff0 2001:db8::.
An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly. Which F5 technology should the administrator use? iSessions iRules iApps iControl.
A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to server. This is an example of which type of solution? Full proxy architecture packet forwarding architecture TCP optimization TCP compression.
If the web application Server made a query to the Database to present dynamic content for a user who would be the client? The Big-IP The Web application server The User The Database.
An organization needs to cryptographically sign its domains. Which F5 product provides this functionality? GTM APM ASM LTM.
A BIG-IP Administrator needs to configure a network to separate traffic into a three different VLANs using a single port on the BIG-IP device. What means should be used to allow this? Multiple MAC registration Protocol 802.1q VLAN tagging LACP link aggregation Port Spanning.
An organization needs to protect its data center from layer three-based and layer four-based exploits. Which F5 provides this functionality? AFM GTM ASM APM.
A server is operating on the network 10.1.0.0/24 The BIG-IP device is operating on the 192.168.0.0/24 net. What isd required to enable the server and BIG-IP to communicate properly? Switch Firewall Router Hub.
HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted. What is the F5-recommended persistence method in this situation? source address persistence SIP persistence SSL session ID persistence destination address persistence.
A new web server VLAN has been created and the IP address 10.1.1/24 has been assigned to the BIG-IP device. The BIG-IP Administrator needs to create the new Self IP and prevent administrative access to the BIG-IP device from the newly created network. Which TMSH command should be used? add /net self internal address 10.1.1.1 mask 255.255.255.0 wan VLAN 10 allow service default add /net self internal address 10.1.1.1/24 wan VLAN 10 allow-service none create /net self internal address 10.1.1.1/24 wan VLAN 10 allow service none create /net self internal address 10.1.1.1/24 wan VLAN 10 allow service default.
An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality? iRules iCall iControl iSession.
Where is the MAC masquerade address configured? Device Groups Traffic Groups Virtual Server Virtual Addres.
An Administrator is diagnosing a remote host connection using an ICMP based network troubleshooting utility and receives and ICMP error diagram with the following error code 11-Times exceeded. What does this mean? A switch on the network the frame due to an incorrect checksum faulty router on the network is unable to process the packet in a timely manner The TTL field of the IP header was decremented to 0 and this was consenquently dropped by a router The TTL field of the IP header was set to 255, and this was consenquetlyt dropped by a router.
Which Datalink sublayter has the primary function of providing node to node flow and error control? Mac LLC UDP ARP.
If there are multiple applications authentucated agaisnt a single identity store, which technology solution will simplify access to all applications? single sign on LDAP multifactor authentication RADIUS.
In which security model does a false-postive incident occur? Role based Negative Positive Context-based.
What is the primary reason to choose hardware over virtual devices? management capabilities SSL performance HA capabilities failure isolation.
What is the next hop used to send traffic to reach 192.168.1.50? 172.17.12.51 192.168.1.50 192.168.1.1 172.17.12.254.
What should a BIG-IP Administrator configure to minimize impact during a failover? MAC masquerading Clone pool External monitors One Connect profile.
When using LDAP for autentication, what is the purpose of the base DN? the search context starting point the directory's simple name the fundamental naming convention the base attrbute in an LDAP directory.
What should the administrator investigate first to address this traffic slowness? the virtual server indicates 14 slow connections killed the pool shows no current connections interface 1.2 shows 9.2k errors the pool member ss unchecked.
Why is it important that devices in a high-availability pair share the same configuration? so that application traffic can do gracefully after a failover so that load can be shared equally between the devices so that a spanning tree loop can be avoided ao that configuration updates can occur instantly between two devices.
While doing a server health check, an administratore notices that no recent system event have been recorded. The administrator finds the disk spaces status shown. What is the causing this issue? The /var/log directory is full The /shared directory is almost full The /var/flog directory is 100% free The /shared directory is 99% free.
A load balancing decision needs to be made based on custom application characterics. What is the most appropiate F5 feature for this purpose? iRules iControl Scale iApps.
A user fails to provide credentials when requesting a web resource authentication. Which HTTP response code does the server send? HTTP 302 HTTP 200 HTTP 401 HTTP 502.
Which device type in the topology will forward network packets without an OSI layer 3 address assigned to a data plane interface? Firewall Switch Application Server Router.
A company would like to create a web service multiple data centers (US EU,Asia) where each data center uses the same IP address. Request will be routed to the closest data center. Which address type is the appropiate solution? Micest Broadcast Unicast Anycast.
An Administrator needs to load balancer connections to the application server with the lowest number of connections. The application server IP's are present in multiple pools on the LTM Which load balancing method meets these requirements? Ratio Least Connections (member) Least Connections (member) Least Sessions least Connections (node).
A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function? Router switch Bridge HUD.
An HTTP pool attached to a virtual server has three member: - Pool Member A: default HTTP monitor in red - Pool Member B: custom HTTP monitor in green - Pool Member C: does not monitor Which pool members participate in the load balancing? Pool members A and B Pool members A and C Pool members AB and C Pool members B and C.
In the load balanced scenario which service would require persistence to function correctly? DNS HTTP Simple Mail Transport Protocol Web-based email.
Pool A has three members. Why is then pool up? Health on monitoring is enabled on only one member Member starus is determined by volume of traffic There member is no health monitoring One member has a succesfull health monitor.
Which protocols is used for control session establishment for streaming media? OTLS RTP RTSP SMB.
In which layer of the OSI model is the data transported in the form of packet? Transport Session Presentation Network.
What does encryption on a VPN provide? authentication integrity availability confidentiality.
Which protocol does an internet host use to request the hardware address of an IP address? Address Resolution Protocol (ARP) Dynamic Host Configuration Protocol (DHCP) BOOTP Reverse Address Resolution Protocol (RARP).
A BIG-IP Administrator has a cluster of devices. What showuld the administrator do after creating a new Virtual Server on Device? create a new cluster on device 1 synchronize the settings of device 1 to the group create the new virtual server device 2 synchronize the settings of the group to device 1.
In the network Map a red diamond appears next to the three member servers in the Virtual Servers pool. The nodes in the pool each show a green circle. What is the likely reason for this scenario? The pool members health monitor has been disable The pool members have been powered off The pool members have been disabled73 The pool members services have been shut down.
What does the 5XX group of HTTP statusd codes indicate? Successful Server Error Client Error Redirection.
10:20:37.00749 IP.192.168.255.264.3:6664>10.0.1.10.http:flags(s). seq 740424862, Win 29200 A web site is fronted by a load balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there bro nodes Node1 and node2 The administrator is debuggin an isssue on node 1 using tcpdump and records the above out about a received packet To wacht device does the ip address 192.168.255.254 belong? node2 node 1 load balancer web client.
A client computer and server are 72 hops away from one another. A packet is generated by the client computer with a TTL og 64. What will happend to that packet? The first hop router will drop the packet and request a higher TTL from the client computer The packet will proceed through the network for a total of 64 hops and then be dropped The client computer will automatically update the TTL to 72 before sending the packet to the server The router at hop 64 will reset the TTL to 664 and send it to the server.
Which OSI layer provides reliable transmission of frame between adjacent nodes and is built on top of the provides reliable trasmission of frames between adjacent nodes and is built on top of the Physical layer? Network Data Link Application Transpor.
Client A from the 192.168.0.0/24 network wants to send a ping to client B on 10.10.10.0/24 Additionally The default Gateway from client A is 192.168.0.1 The MAC Address of client A is 00:11:11:11:11.5D The MAC Address of client B is 00:22:22:22:22 The MAC Address of Default Gateway is 00:33:33:33:33 What is the destination MAC Address of the ping packet when it leaves client A interface card? 00:11:11:11:11 f1:f1:f1:f1:f1:f1 00:33:33:33:33 00:22:22:22:22.
What are two examples of network layer protocols? (choose two) ICMP TCP BGP IPv4 ARP.
A manufacturer is given an organizationally unique identifier (OUI) of F41653, How many unique MAC address can be provisioned on the manufacture's equipment using this OUI? 4,294,967,296 65,536 474,976,710,656 16.777216.
Which of the following is a valid IP address and prefix length? 192.168.0.128/25 192.168.0.127/25 192.168.0.255/25 192.1468.0.129/25.
What does the HTTP status code 404 mean? Forbidden Not Acceptable Request Timeout Not found.
WhaAn application uses a propietary protocol running over TCP. Which F5 BIG-IP feature should the administrator use to modify the protocol? iRules TCP profile rewrite profile SPDY.
An administrator is trying to debug why the 10.0.10.0/24 network is inaccessible from a certain server. The server is able to access the internet sucessfully the administrator isnpects the routing table ARP table on the affected server. Given the terminal output shown, what could be causing this issue? The local server is unable to receive ARP responses The static route for 10.0.10.0/24 is misconfigured The default rpute (0.0.0.0/0) is misconfigured The default gateway is not sending ARP responses.
An administrator needs to assess an LTM for potential configuration issues and required security updates. Which F5 website can automate this task? ihealth.f5.com addf5.f5.com www.f5.com Devcentral.f5.com.
Which FTP mode should be used by a client a firewall taht has no special configuration? Active FTP Passive FTP Secure FTP Protected FTP.
What two advantages of using SSL offloading?(Choose two) Provides single point of management for private keys allows secure remote access to internal server resources Offloads the client to SSL processing reduces server load significantly encrypts all communications and to end.
An administrator needs to connect a new device to a switched network. The interconnect must be both redundant and combined bandwidth than a single link. Which low-level protocol will help facilitate this? Link Layer Discovery Protocol(LDP) Link Aggregation Control Protocol(LACP) Link Local Distribution Protocol(LLDP) Link Allocation & Configuration Protocol(LACP).
What is used to provide mutual authentication for TLS/SSL? Access list X509 Certificate Shared Secret Key Mutually Trusted issuer.
Host A sends 10 TCP packets to host B. All packets arrive at Host B quickly, but some arrive out of order. What will Host B do? ACK all packets and place them in order ACK only packets that are in ordes drop any packets that arrive out of order drop all packets and wait for arrival in order.
in a full proxy architecture, what is considered the client in the server-side communications? the server the ADC the client workstation the switch.
Which method should an administrator of the BIG-IP use the sync the configuration to only certain other BIG-IPs? Exclude devices from certain Device Groups Exclude devices from certain Traffic Groups synchronize only certain folders Exclude devices from certain Sync Groups.
A BIG-IP Administrator needs to open a case with F5 support for a specific issue with an existing HA pair of platform. What should be uploaded to iHealth prior to opening the case to expedite proccesing of the support case? SCF file Qkview file tcpdump file UCS file.
Layer 2 mapping information is announced by an interface without receiving a request for the mappiong first. Which term describes this event? ICMP ARP STP gratuitous ARP.
What is a disadvantage of running a virtualized load balancer? slower than a hardware load balancer more expensive than a hardware load balancer less reliable than a hardware load balancer does not support high availability.
An administrative receives an error message when attempting to create a self-IP address on a BIG-IP appliance. Which address should the administrator use to resolve the issue? 2001:0db8:85a3:0000:0000:8a2i:0370:7334 2001:0db8:85a3:0000:0000:8a2e:0370:7334 2001:0db8:85a3:8a2e:0370:7334 2001:0db8:85a3:8d3:8a2e:370:7334.
A client needs to learn if a web server supports POST. Which HTTP method is used? GET OPTIONS TRACE LIST.
An Administrator needs to do the following - install a load balancer in front of an existing application - test application performance - avoid reconfiguration of the application server -avoid interruption of users accesing the apllications} Which step showul the administrator take to meet the requirements? configure Port Address Translation modify the DNS server A-record for the application modify the test client's local file configure IP Anycasting.
the web server. What is causing this issue? An administrator sets up a web server for a new application. The administrator cannot access The HTTP service listens on localhost The user's IP needs to be allowed to access The HTTPS service is not running The server needs to be restarted.
An administrator connects two devices using an Ethernet cable. The link fails to come up on either device could prevent the link from being established? IP configuration DNS resolvers Proxy settings Link speed.
A BIG-IP administrator is interested in using some of th vCMP capabilities available to the BIG-IP. What should the impact the administrator's decision? vCMP is available on all F5 hardware platforms vCMR is only available on the virtual edition vCMP is only available on certain F5 platforms vCMP is hardware independent.
Duplex mismacht, collision, and FCS errors are all examples of which kind off issue? Session Browser service Network.
Which security model functions by defining what traffic is allowed and rejecting all other traffic? context-based access control model positive security model role-based access control model negative security model.
Which high availability feature allows two diferent BIG-IP device to use the MAC address for the same vistual server IP? Device Group HSRP virtual MAC address MAC masquerade Sync-failover.
in which FTP mode is the server responsible for initiating the data correction back to the client? secure FTP Active FTP Protected FTP Passive FTP.
An administrator points the browser at http://mydomain.com the destination server listens on TCP port 8080. Which feature must be enabled on the virtual server for this configuratioon to work? HTTP presistence port translation source NAT destination address affinity.
An administrator is performing a capture from a tagged port on an Ethernet SWITCH. Which OSI layr showuld be inspected to determine with which VLAN a datagram in associated? transport layer Network layer Application layer Data-link layer.
A BIG-IP Administrator needs to create a route to send traffic described to 10.1.1.1 another router an address of 192.168.1.1 Which TMSH command showuld the administrator use? create /net route 192.168.1.1/32 gw 10.1.1.1 Add/net route 10.1.1.1/32 gw 192.168.1.1 Create /net 10.1.1.1/32 GW 192.168.1.1 Add /net 192.168.1.1/32 GW 10.1.1.1.
Web application http://www.example.com at 10.1.1.110, is unresponsive. Aplatform. Which command verified that the application is responding to HTTP request? telnet www.example.com 80 curl http://www.example.com telnet 10.10.1.110 80 dig www.example.com.
Web application http://www.example.com at 10.1.1.110, is unresponsive. A recent change migrated DNS to a new platform. Which command verified that the application is responding to HTTP request? telnet www.example.com 80 curl http://www.example.com telnet 10.10.1.110 80 dig www.example.com.
Denunciar Test