Application Delivery Fundamentals F5 Questions + Answers

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Application Delivery Fundamentals F5 Questions + Answers

Post by answerhappygod »

Question 1 ( Topic 1 )
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator


Answer : A

Explanation:
Question 2 ( Topic 1 )
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard


Answer : A

Explanation:
Question 3 ( Topic 1 )
The Policy Builder benefits include:
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact


Answer : C

Explanation:
Question 4 ( Topic 1 )
APM administrators can configure access policies granting users which two types of access?
A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access


Answer : D

Explanation:
Question 5 ( Topic 1 )
Which of the following is a benefit of using iRules?
A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects


Answer : B

Explanation:



Question 6 ( Topic 1 )
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2


Answer : BC

Explanation:
Question 7 ( Topic 1 )
TMOS is an F5 software module that runs on the BIG-IP platform.
A. True
B. False


Answer : B

Explanation:
TMOS is multi-module OS on Big-IP platform
Question 8 ( Topic 1 )
Which four F5 products are on the TMOS platform? (Choose four.)
A. ARX
B. GTM
C. WOM
D. APM
E. ASM
F. Firepass


Answer : BCDE

Explanation:
Question 9 ( Topic 1 )
Which of the following is NOT a profile type on the BIG-IP?
A. Protocol
B. Application
C. Persistence
D. Authentication
E. SSL


Answer : B

Explanation:
Question 10 ( Topic 1 )
The BIG-IP determines the lowest connection speed between the client and the server and then uses that for both connections.
A. True
B. False


Answer : B

Explanation:


Question 11 ( Topic 1 )
Another name for the F5 OneConnect feature is TCP multiplexing.
A. True
B. False


Answer : A

Explanation:
Question 12 ( Topic 1 )
LTM runs on______F5's proprietary product platform. (Fill in the correct answer)
A. ARX
B. Firepass
C. Acopia
D. TMOS


Answer : D

Explanation:
Question 13 ( Topic 1 )
Which programming language is the basis for F5 iRules?
A. Lisp
B. C++
C. Java
D. TCL
E. AWK


Answer : D

Explanation:
Question 14 ( Topic 1 )
What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration


Answer : DF

Explanation:
Question 15 ( Topic 1 )
Which of the following is NOT a benefit of using SSL offload?
A. It increases the bandwidth between the client and LTM.
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
C. The organization requires far less SSL certificates.
D. The CPU processing load on backend servers is reduced.
E. It enables iRules to be used on traffic arriving to LTM that is encrypted.


Answer : A

Explanation:
SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.


Question 16 ( Topic 1 )
When using a routed configuration, the real server must point to the LTM as the ________.
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway


Answer : E

Explanation:
Question 17 ( Topic 1 )
TCP Express is licensed separately from LTM
A. True
B. False


Answer : B

Explanation:
TCP Express is licensed including in LTM
Question 18 ( Topic 1 )
LTM can only load balance outbound traffic by using iRules
A. True
B. False


Answer : A

Explanation:
Question 19 ( Topic 1 )
Which two of these statements about OneConnect are true? (Choose two.)
A. It decreases the CPU load on LTM
B. It aggregates multiple client connections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members


Answer : BE

Explanation:
Question 20 ( Topic 1 )
GTM solves which three of these standard DNS limitations? (Choose three.)
A. It can verify that a host is available before resolving a host name for a client.
B. It can use HTTPS for the connection between itself and the client.
C. It can ensure that clients remain at the same data center for stateful applications.
D. It can verify that a client does not have any viruses before sending the IP address.
E. It has more complex load balancing methods.


Answer : ACE

Explanation:
GTM solves three of these standard DNS limitations
It can verify that a host is available before resolving a hostname for a client
It can ensure that clients remain at the same data center for stateful applications
It has more complex load balancing methods


Question 21 ( Topic 1 )
Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin.
A. True
B. False


Answer : A

Explanation:
Question 22 ( Topic 1 )
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager


Answer : ABD

Explanation:
These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and GTM.
Question 23 ( Topic 1 )
Customers can purchase LTM as a stand-alone product, or layer it with additional software modules to increase the functionality of the BIG-IP device.
A. True
B. False


Answer : A

Explanation:
Question 24 ( Topic 1 )
Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?
A. Floating IPs
B. Fallback host
C. Auto last hop
D. SNAT automap
E. Pool offload
F. Priority group activation


Answer : D

Explanation:
http://support.f5.com/kb/en-us/products ... pools.html
Question 25 ( Topic 1 )
The least connections load balancing method functions best when all pool members share similar characteristics.
A. True
B. False


Answer : A

Explanation:


Question 26 ( Topic 1 )
FILL BLANK -
The layer 3 security feature _______ Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in)


Answer : contain -or- include

Question 27 ( Topic 1 )
A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an example of a sub-zone?
A. www.F5.com/sub
B. www.F5.com
C. www.gslb.F5.com
D. .com
E. f5.com


Answer : C

Explanation:
Question 28 ( Topic 1 )
FILL BLANK -
A _______ object maps a FQDN to virtual servers. (Fill in)


Answer : Wide IP

Question 29 ( Topic 1 )
Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)
A. Connect the GTM and LTM with a network crossover cable.
B. Synchronize the big3d versions between GTM and LTM.
C. Add the LTM object to the GTM configuration.
D. Configure the GTM and LTM to we MAC masquerading.
E. Ensure that GTM and LTM use the same floating IP address.
F. Exchange SSL certificates between the two devices.


Answer : BCF

Explanation:
Integrating LTM systems with GTM systems on a network

Running the bigip_add utility -
Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM.
Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other.
When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems. http://support.f5.com/kb/en-us/products ... 3-0/7.html
Note:
The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.
Question 30 ( Topic 1 )
DNSSEC is a GTM add-on licensing feature.
A. True
B. False


Answer : A

Explanation:


Question 31 ( Topic 1 )
FILL BLANK -
GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM devices. (Fill in)


Answer : iQuery

Question 32 ( Topic 1 )
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP


Answer : ABEF

Explanation:
http://support.f5.com/kb/en-us/products ... -30/1.html

Configuring -
GTM to determine packet gateway health and availability
http://support.f5.com/kb/en-us/products ... 5-0/9.html sol13690:
Troubleshooting BIG-IP GTM synchronization and iQuery connections (11.x) http://support.f5.com/kb/en-us/solution ... 13690.html
Question 33 ( Topic 1 )
What happens when the data center that GTM recommends for a client is unavailable?
A. GTM uses cached information to determine an alternate route.
B. GTM queries the local DNS server.
C. GTM sends subsequent queries to the next preferred data center.
D. GTM directs the client to use its DNS cache to select an alternate location.
E. The client continues to attempt to access the preferred data center.


Answer : C

Explanation:
Question 34 ( Topic 1 )
GTM can load balance to LTM in addition to non-BIG-IP hosts.
A. True
B. False


Answer : A

Question 35 ( Topic 1 )
Which of the following is NOT included on the F5 DevCentral site?
A. Subscription purchasing options
B. Actual iRules written by other customers
C. iRules reference materials
D. Forums
E. The F5 iRule editor


Answer : A

Explanation:
Subscription purchasing options is in Partner Resource Center


Question 36 ( Topic 1 )
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request?



A. A
B. B
C. C
D. D


Answer : B

Explanation:
Question 37 ( Topic 1 )
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM.
B. All traffic through LTM is checked for DDoS attacks.
C. No traffic A allowed through LTM until it has been specified.
D. All users must authenticate before accessing applications through LTM.
E. Only LAN administrators can access resources through LTM.


Answer : C

Explanation:
Question 38 ( Topic 1 )
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria? (Choose three.)
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name


Answer : BCF

Explanation:
Question 39 ( Topic 1 )
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation


Answer : D

Explanation:
Question 40 ( Topic 1 )
As a full TCP proxy, LTM acts as the termination point for both requests from the client and responses from the server.
A. True
B. False


Answer : A

Explanation:


Question 41 ( Topic 1 )
FastCache will NOT work with compressed objects.
A. True
B. False


Answer : A

Explanation:
Question 42 ( Topic 1 )
Which of the following can be accomplished using iRules?
A. Track inbound and outbound traffic
B. Perform deep packet inspection
C. Inspect traffic and drop it
D. All of the above
E. Intercept traffic and redirect it


Answer : D

Explanation:
Question 43 ( Topic 1 )
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
A. True
B. False


Answer : B

Explanation:
Question 44 ( Topic 1 )
Which four of the following statements about LDNS probes are true? (Choose four.)
A. Only GTM devices can act as a prober.
B. They check each requesting LDNS that has made a request of the GTM.
C. They can determine available cache size on the client.
D. They are used to develop path metrics.
E. They verify the link between a data center and an LDNS.
F. Probing only takes place if GTM is configured to use dynamic load balancing.


Answer : BDEF

Explanation:
Question 45 ( Topic 1 )
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.
A. True
B. False


Answer : A

Explanation:


Question 46 ( Topic 1 )
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
A. True
B. False


Answer : A

Explanation:
Question 47 ( Topic 1 )
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries.
B. They want GTM to make load balancing decisions based on metrics.
C. They have data centers in several countries.
D. They are using several operating systems for the local DNS servers.


Answer : C

Explanation:
Question 48 ( Topic 1 )
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.
What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
B. provides enhanced support for DNS servers.
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process


Answer : D

Explanation:
Question 49 ( Topic 1 )
Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.
A. F5 can ensure a DNS DDoS attack is not successful.
B. F5 has high performance DNS services.
C. F5 can answer the DNS queries directly.
D. With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
E. F5 can ensure a customer never faces a DNS DDoS attack.


Answer : CE

Explanation:
Question 50 ( Topic 1 )
Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)
A. Secure the connection between WAN sites.
B. Improve application availability and scalability.
C. Authenticate and authorize users.
D. Boost application performance.
E. Include application security.
F. Act as a Web application firewall


Answer : BDE

Explanation:
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply