Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

F5 101 - Application Delivery Fundamentals

Page: 4 / 8
Total 240 questions

Which two destination pods should be used in a default active FTP Session? (Choose two)

A.

UDP 20

B.

TCP 20

C.

TCP 22

D.

TCP 21

E.

UDP 21

An administrator needs to do the following

* install a load balancer in front of an existing application

* test application performance

* avoid reconfiguration of the application server

* avoid interruption of users accessing the application

A.

modify the test client's local host file

B.

modify the DNS Server A-record for the application

C.

configure IP Anycasting

D.

configure Port Address Translation

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Mufti VLANS exist on LACPO1.Which TMSH command should the BIGIP Administrator issue to add the new VLAN to the existing LACP trunk?

A.

create net vlan VLAN40 (interfaces add (LACP01 {lagged)) tag 40}

B.

create net vlan VLAN40 {interfaces replace-all-with {LACP01{tagged}} tag 40}

C.

create net vlan VLAN40 interfaces replace all with {LACP01 {untagged)} tag 40}

D.

create net vlan VLAN40 {interfaces add {LACP01 {untagged}} tag 40}

ATP administrator recently added a new VLAN and needs to confirm that the BIG IP sees traffic on this VLAN. The VLAN is untagged on interface 1.1 and is named VLAN704 in the BIG IP Configuration Unity.

Which tool should be used to generate a packet capture that shows all traffic on this VLAN?

A.

netstat

B.

map

C.

tcpdump

D.

ifconsfig

The BIG-IP device has the following configured routes:

Which gateway will be chosen to send the packet to the destination 10 238 10 11?

A.

192. 168 10 20

B.

192. 168.10. 40

C.

192 168. 10. 30

D.

192. 168. 10. 10

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.

What is the F5-recommended persistence method in this situation?

A.

SSL session ID persistence

B.

source address persistence

C.

SIP persistence

D.

destination address persistence

in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?

A.

when users are unable to install software on their PC

B.

when users require a secure connection to the corporate network

C.

when users work remotely

D.

when users require the ability to RDP to internal resources

An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?

A.

negative security model

B.

Closed security model

C.

positive Security model

D.

ACL Security model

An administrator is updating private keys used for SSL encryption from 1024 to 2048 bits. Which possible effect should the administrator consider when performing this activity?

A.

The larger Key size will increase processing requirements

B.

Some hardware will NOT support the 2048 key

C.

Some certificate authorities will NOT support the 2048 key

D.

The larger key sire will increase private key installation complexity

AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH command to create this new VLAN on the BIG-IP?

A.

Create/net wan internal interfaces add {1 1 (tagged }} tag 706

B.

Create/net vlan internal trunk add (11 {tagged)}

C.

add /net vlan internal interfaces add (11) tag 705

D.

add / net vlan internal tunk add {1 1 (tagged)) tag 705