Question 1 ( Topic 1 )
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator
Answer : A
Explanation:
Question 2 ( Topic 1 )
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
Answer : A
Explanation:
Question 3 ( Topic 1 )
The Policy Builder benefits include:
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
Answer : C
Explanation:
Question 4 ( Topic 1 )
APM administrators can configure access policies granting users which two types of access?
A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access
Answer : D
Explanation:
Question 5 ( Topic 1 )
Which of the following is a benefit of using iRules?
A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects
Answer : B
Explanation:
Question 6 ( Topic 1 )
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
Answer : BC
Explanation:
Question 7 ( Topic 1 )
TMOS is an F5 software module that runs on the BIG-IP platform.
A. True
B. False
Answer : B
Explanation:
TMOS is multi-module OS on Big-IP platform
Question 8 ( Topic 1 )
Which four F5 products are on the TMOS platform? (Choose four.)
A. ARX
B. GTM
C. WOM
D. APM
E. ASM
F. Firepass
Answer : BCDE
Explanation:
Question 9 ( Topic 1 )
Which of the following is NOT a profile type on the BIG-IP?
A. Protocol
B. Application
C. Persistence
D. Authentication
E. SSL
Answer : B
Explanation:
Question 10 ( Topic 1 )
The BIG-IP determines the lowest connection speed between the client and the server and then uses that for both connections.
A. True
B. False
Answer : B
Explanation:
Question 11 ( Topic 1 )
Another name for the F5 OneConnect feature is TCP multiplexing.
A. True
B. False
Answer : A
Explanation:
Question 12 ( Topic 1 )
LTM runs on______F5's proprietary product platform. (Fill in the correct answer)
A. ARX
B. Firepass
C. Acopia
D. TMOS
Answer : D
Explanation:
Question 13 ( Topic 1 )
Which programming language is the basis for F5 iRules?
A. Lisp
B. C++
C. Java
D. TCL
E. AWK
Answer : D
Explanation:
Question 14 ( Topic 1 )
What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration
Answer : DF
Explanation:
Question 15 ( Topic 1 )
Which of the following is NOT a benefit of using SSL offload?
A. It increases the bandwidth between the client and LTM.
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
C. The organization requires far less SSL certificates.
D. The CPU processing load on backend servers is reduced.
E. It enables iRules to be used on traffic arriving to LTM that is encrypted.
Answer : A
Explanation:
SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.
Question 16 ( Topic 1 )
When using a routed configuration, the real server must point to the LTM as the ________.
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway
Answer : E
Explanation:
Question 17 ( Topic 1 )
TCP Express is licensed separately from LTM
A. True
B. False
Answer : B
Explanation:
TCP Express is licensed including in LTM
Question 18 ( Topic 1 )
LTM can only load balance outbound traffic by using iRules
A. True
B. False
Answer : A
Explanation:
Question 19 ( Topic 1 )
Which two of these statements about OneConnect are true? (Choose two.)
A. It decreases the CPU load on LTM
B. It aggregates multiple client connections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members
Answer : BE
Explanation:
Question 20 ( Topic 1 )
GTM solves which three of these standard DNS limitations? (Choose three.)
A. It can verify that a host is available before resolving a host name for a client.
B. It can use HTTPS for the connection between itself and the client.
C. It can ensure that clients remain at the same data center for stateful applications.
D. It can verify that a client does not have any viruses before sending the IP address.
E. It has more complex load balancing methods.
Answer : ACE
Explanation:
GTM solves three of these standard DNS limitations
It can verify that a host is available before resolving a hostname for a client
It can ensure that clients remain at the same data center for stateful applications
It has more complex load balancing methods
Question 21 ( Topic 1 )
Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin.
A. True
B. False
Answer : A
Explanation:
Question 22 ( Topic 1 )
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
Answer : ABD
Explanation:
These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and GTM.
Question 23 ( Topic 1 )
Customers can purchase LTM as a stand-alone product, or layer it with additional software modules to increase the functionality of the BIG-IP device.
A. True
B. False
Answer : A
Explanation:
Question 24 ( Topic 1 )
Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?
A. Floating IPs
B. Fallback host
C. Auto last hop
D. SNAT automap
E. Pool offload
F. Priority group activation
Answer : D
Explanation:
http://support.f5.com/kb/en-us/products ... pools.html
Question 25 ( Topic 1 )
The least connections load balancing method functions best when all pool members share similar characteristics.
A. True
B. False
Answer : A
Explanation:
Question 26 ( Topic 1 )
FILL BLANK -
The layer 3 security feature _______ Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in)
Answer : contain -or- include
Question 27 ( Topic 1 )
A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an example of a sub-zone?
A. www.F5.com/sub
B. www.F5.com
C. www.gslb.F5.com
D. .com
E. f5.com
Answer : C
Explanation:
Question 28 ( Topic 1 )
FILL BLANK -
A _______ object maps a FQDN to virtual servers. (Fill in)
Answer : Wide IP
Question 29 ( Topic 1 )
Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)
A. Connect the GTM and LTM with a network crossover cable.
B. Synchronize the big3d versions between GTM and LTM.
C. Add the LTM object to the GTM configuration.
D. Configure the GTM and LTM to we MAC masquerading.
E. Ensure that GTM and LTM use the same floating IP address.
F. Exchange SSL certificates between the two devices.
Answer : BCF
Explanation:
Integrating LTM systems with GTM systems on a network
Running the bigip_add utility -
Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM.
Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other.
When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems. http://support.f5.com/kb/en-us/products ... 3-0/7.html
Note:
The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.
Question 30 ( Topic 1 )
DNSSEC is a GTM add-on licensing feature.
A. True
B. False
Answer : A
Explanation:
Question 31 ( Topic 1 )
FILL BLANK -
GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM devices. (Fill in)
Answer : iQuery
Question 32 ( Topic 1 )
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP
Answer : ABEF
Explanation:
http://support.f5.com/kb/en-us/products ... -30/1.html
Configuring -
GTM to determine packet gateway health and availability
http://support.f5.com/kb/en-us/products ... 5-0/9.html sol13690:
Troubleshooting BIG-IP GTM synchronization and iQuery connections (11.x) http://support.f5.com/kb/en-us/solution ... 13690.html
Question 33 ( Topic 1 )
What happens when the data center that GTM recommends for a client is unavailable?
A. GTM uses cached information to determine an alternate route.
B. GTM queries the local DNS server.
C. GTM sends subsequent queries to the next preferred data center.
D. GTM directs the client to use its DNS cache to select an alternate location.
E. The client continues to attempt to access the preferred data center.
Answer : C
Explanation:
Question 34 ( Topic 1 )
GTM can load balance to LTM in addition to non-BIG-IP hosts.
A. True
B. False
Answer : A
Question 35 ( Topic 1 )
Which of the following is NOT included on the F5 DevCentral site?
A. Subscription purchasing options
B. Actual iRules written by other customers
C. iRules reference materials
D. Forums
E. The F5 iRule editor
Answer : A
Explanation:
Subscription purchasing options is in Partner Resource Center
Question 36 ( Topic 1 )
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request?
A. A
B. B
C. C
D. D
Answer : B
Explanation:
Question 37 ( Topic 1 )
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM.
B. All traffic through LTM is checked for DDoS attacks.
C. No traffic A allowed through LTM until it has been specified.
D. All users must authenticate before accessing applications through LTM.
E. Only LAN administrators can access resources through LTM.
Answer : C
Explanation:
Question 38 ( Topic 1 )
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria? (Choose three.)
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name
Answer : BCF
Explanation:
Question 39 ( Topic 1 )
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation
Answer : D
Explanation:
Question 40 ( Topic 1 )
As a full TCP proxy, LTM acts as the termination point for both requests from the client and responses from the server.
A. True
B. False
Answer : A
Explanation:
Question 41 ( Topic 1 )
FastCache will NOT work with compressed objects.
A. True
B. False
Answer : A
Explanation:
Question 42 ( Topic 1 )
Which of the following can be accomplished using iRules?
A. Track inbound and outbound traffic
B. Perform deep packet inspection
C. Inspect traffic and drop it
D. All of the above
E. Intercept traffic and redirect it
Answer : D
Explanation:
Question 43 ( Topic 1 )
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
A. True
B. False
Answer : B
Explanation:
Question 44 ( Topic 1 )
Which four of the following statements about LDNS probes are true? (Choose four.)
A. Only GTM devices can act as a prober.
B. They check each requesting LDNS that has made a request of the GTM.
C. They can determine available cache size on the client.
D. They are used to develop path metrics.
E. They verify the link between a data center and an LDNS.
F. Probing only takes place if GTM is configured to use dynamic load balancing.
Answer : BDEF
Explanation:
Question 45 ( Topic 1 )
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.
A. True
B. False
Answer : A
Explanation:
Question 46 ( Topic 1 )
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
A. True
B. False
Answer : A
Explanation:
Question 47 ( Topic 1 )
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries.
B. They want GTM to make load balancing decisions based on metrics.
C. They have data centers in several countries.
D. They are using several operating systems for the local DNS servers.
Answer : C
Explanation:
Question 48 ( Topic 1 )
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.
What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
B. provides enhanced support for DNS servers.
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
Answer : D
Explanation:
Question 49 ( Topic 1 )
Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.
A. F5 can ensure a DNS DDoS attack is not successful.
B. F5 has high performance DNS services.
C. F5 can answer the DNS queries directly.
D. With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
E. F5 can ensure a customer never faces a DNS DDoS attack.
Answer : CE
Explanation:
Question 50 ( Topic 1 )
Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)
A. Secure the connection between WAN sites.
B. Improve application availability and scalability.
C. Authenticate and authorize users.
D. Boost application performance.
E. Include application security.
F. Act as a Web application firewall
Answer : BDE
Explanation:
Application Delivery Fundamentals F5 Questions + Answers
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am