Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What are the two primary functions of the OSI 7-layer model? (Choose two)

A.

to group communications into logical layers

B.

to define host-to-host communications

C.

to standardize HTTP communications between different vendors

D.

to go interoperability between products made by different vendors

E.

to define protocol behavior

Full Access
Question # 5

A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192.168.0.0/24 net. What is required to enable the several and BIG-IP device to communicate properly?

A.

Firewall

B.

Switch

C.

Router

D.

Hub

Full Access
Question # 6

Which support service is required to synchrony the time stamps in system logs from these devices?

A.

SNMP

B.

Syslong

C.

SMTP

D.

DNS

Full Access
Question # 7

What is an advantage of a packet forwarding architecture?

A.

allows for manipulation of HTTP headers

B.

allows for SSL offload

C.

reduces latency

D.

handles larger packet sizes

Full Access
Question # 8

Which HTTP response code indicates an OK status?

A.

302

B.

404

C.

200

D.

100

Full Access
Question # 9

BIG-IP ASM is requesting automatic signature updates from the F5 update service

Who is considered the server in this communication?

A.

BIG-IP

B.

User A

C.

F5 update Service

D.

web application

Full Access
Question # 10

An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?

A.

The HTTP service only listens on localhost

B.

The users IP needs to be allowed to access

C.

The server needs to be restarted

D.

The HTTPS service Is not running

Full Access
Question # 11

What does the HTTP status code 404 mean?

A.

Not Acceptable

B.

Forbidden

C.

Request Timeout

D.

Not found

Full Access
Question # 12

What does HTTP status code 500 mean?

A.

Service unavailable

B.

Internal server error

C.

Gateway timeout

D.

Had gateway

Full Access
Question # 13

in which scenario is a full proxy required?

A.

When a separation between client and server connection .s needed

B.

When administration directly access the servers for administration

C.

when the server sends the response through Iho load balancer

D.

when all TCP client parameters must be seen by the server

Full Access
Question # 14

A.

There is no SFP plugged into the port.

Full Access
Question # 15

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Full Access
Question # 16

What is the correct procedure to comply with the recommendation?

A.

Download the product version image from ihealth f5 com

B.

Download the product version image from support 6 com

C.

Download the product version image from dovcentral f5.com

D.

Download the product version image from downloads f5.com

Full Access
Question # 17

Which HTTP response code is returned when a web

server requires authentication to access a resource?

A.

500

B.

401

C.

302

D.

100

Full Access
Question # 18

An administrator is performing a capture from a lagged port on an Ethernet SWITCH.

Which OSI layer should be inspected to determine with which VLAN a datagram is associated?

A.

Network layer

B.

Data-link layer

C.

Application layer

D.

Transport layer

Full Access
Question # 19

An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer.

Which type of solution is this?

A.

packet forwarding architecture

B.

delayed binding

C.

switching

D.

Full proxy architecture

Full Access
Question # 20

Which type of certificate is pre-installed in a web browser’s trusted store?

A.

Root Certificate

B.

Server Certificate

C.

Client Certificate

D.

intermediate Certificate

Full Access
Question # 21

In which FTP mode is the serve, responsible for initiating the data correction back to the client?

A.

Protected FTP

B.

Active FTP

C.

Secure FTP

D.

Passive FTP

Full Access
Question # 22

Web application http://www example.com at 10.10.1.1.10 is unresponsive. A recent change installed new firewalls in the network. Which command should be used to locate where data loss has occurred within the network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

What is the primary function of a certificate authority?

A.

to expire outdated certificates

B.

to verify and validate certificates

C.

to store security certificates

D.

to sign certificate signing requests

Full Access
Question # 24

An administrator needs to provide access to corporate resources for remote users. The administrator also needs to verify that the remote use has anti-virus software installed. Which F5 product provides this functionality?

A.

ASM

B.

APM

C.

AFM

D.

TGM

Full Access
Question # 25

In the context of load balancing, what does the term persistence" refer to?

A.

Ensuring requests from a single source always end up being handled by the same server.

B.

the ability to associate different HTTP requests to a single user so that activity can be tracked.

C.

Keeping TLS session key information in memory so sessions can be quickly resumed

D.

the ability to keep idle connections open as long as possible by sending dummy traffic periodically

Full Access
Question # 26

An administrator needs to deploy a VON solution that offers data integrity and origin authentication of IP packets. Which solution the administrator use?

A.

IPSecVPN

B.

PPTP

C.

GRE

D.

SSL VPN

Full Access
Question # 27

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.

11. Times exceeded

What does this mean?

A.

A faulty router on the network is unable to process the packet in a timely manner

B.

A switch on the network the frame due to an incorrect checksum

C.

The TTL field of the IP header was set to 255. and this was consequently dropped by a router

D.

The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router

Full Access
Question # 28

A company needs to use a custom value when making persistence decisions.Which F5 product provides this functionality?

A.

iControI

B.

(Rules

C.

lApps

D.

(Health

Full Access
Question # 29

What is a disadvantage of running a visualized load balancer

A.

more expensive than a hardware load balancer

B.

slower than a hardware load balancer

C.

less reliable than a hardware load balancer

D.

does not support high availability

Full Access
Question # 30

Which service should be configured to allow BIG-IP devices to be externally monitored?

A.

SSHD

B.

TMSH

C.

SMTP

D.

SNMP

Full Access
Question # 31

An application uses a proprietary protocol running over TCP

Which FS BIG-IP feature should the administrator use to modify the protocol?

A.

SPDY

B.

rewrite profile

C.

TCP profile

D.

iRules

Full Access
Question # 32

An administrator needs to assess an LTM for potential configuration issues and required security updates.

Which F5 website con automate this task?

A.

addf5f5.com

B.

ihealth5.com

C.

Devcentral f5.ccom

Full Access
Question # 33

An organization needs to cryptographically sign its domains. Which F5 product provides this functionality?

A.

GTM

B.

LTM

C.

ASM

D.

APM

Full Access
Question # 34

An administrator configures secure remote access to a server's shell Given the netstal output, what did the administrator configure?

A.

teinetd. allowing connections only from IP address 10 .1. 10.46

B.

sshd. listening on IP address 10. 1. 10.46

C.

sshd. allowing connections only from IP address 10.1. 10. 46

D.

teinetd listening on IP address 10.1. 10. 46

Full Access
Question # 35

ARP provides translation between which two address types?

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Full Access
Question # 36

An administrator needs a remote VPN solution for corporate users. The existing network infrastructure has web-based services. The administrator needs to select the VPN that is the least complicated to deploy.

Which VPN solution should the administrator choose?

A.

IPSec

B.

L2TP

C.

SSL

D.

PPTP

Full Access