Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

F5 201 - TMOS Administration

Page: 6 / 8
Total 254 questions

During a high-demand traffic event, the BIG-IP Administrator needs to limit the number of new

connections per second allowed to a Virtual Server.

What should the administrator apply to accomplish this task?

A.

An HTTP Compression profile to the Virtual Server

B.

A connection rate limit to the Virtual Server

C.

A connection limit to the Virtual Server

D.

A OneConnect profile to the Virtual Server

A BIG-IP Administrator is checking the BIG-IP device for known vulnerabilities. What should the 8IG-IP Administrator upload to BIG-IP iHealth for further analysis?

A.

QKView

B.

EUD

C.

UCS

D.

tcpdump

Refer to the exhibit.

An organization is reporting slow performance accessing their Intranet website, hosted in a public cloud. All employees use a single Proxy Server with the public IP of 104.219.110.168 to connect to the Internet. What should the BIG-IP Administrator of the Intranet website do to fix this issue?

A.

Change Source Address to 104.219.110.168/32

B.

Change Load Balancing Method to Least Connection

C.

Change Fallback Persistence Profile to source_addr

D.

Change Default Persistence Profile to cookie

Active connections to pool members are unevenly distributed. The load balancing method is Least Connections (member) Priority Group Activation is disabled. What is a potential cause of the event distribution?

A.

Priority Group Activation is disabled

B.

SSL Profile Server is applied

C.

Persistence profile is applied

D.

incorrect load balancing method

A BIG-IP Administrator remotely connects to the appliance via out-of-band management using https://mybigip mycompany net. The management portal has been working all week. When the administrator attempts to login today, the connection times out. Which two aspects should the administrator verify? (Choose two)

A.

DNS is property resolving the FQDN of the device.

B.

The device is NOT redirecting them to http.

C.

The administrator has the latest version of the web browser.

D.

Packet Filters on the device are blocking port 80.

E.

The administrator has TCP connectivity to the device.

Administrative user accounts have been defined on the remote LDAP server and are unable to log in to

the BIG-IP device.

Which log file should the BIG-IP Administrator check to find the related messages?

A.

/var/log/secure

B.

/var/log/messages

C.

/Nar/log/ltm

D.

/var/log/user.log

A web server administrator informs the BIG-IP Administrator that web servers are overloaded Starting next month, the BIG-IP device will terminate SSL to reduce web server load. The BIG-IP device is ready using client SSL client profile and Rules on HTTP level. What actions should the BIG-IP Administrators to achieve the desired configuration?

A.

Remove the server SSL profile and configure the Pool Members to use HTTP

B.

Remove the client SSL profile and configure the Pool Members to US HTTP

C.

Remove the chart SSL profile and change the Virtual Server to accept HTTP

D.

Remove the server SSL profile and change the Virtual Server to accept HTTP traffic

Refer to the exhibit.

How are new connections load balanced?

A.

To the first two members listed with the same priority group

B.

To the pool member with the least number of connections

C.

To the pool member with a high priority group value defined

D.

To the pool member with a low priority group value defined

Which method is recommended for creating a new user from the CLI?

A.

Run f5adduser username' then 'f5passwd username' from bash or tmsh

B.

Run tmsh create auth user username prompt for password' from bash

C.

edit bigip.conf to add the new user and the user's clear-text password

D.

Run useradd username' then 'passwd username' from bash tmsh

A BIG-IP Administrator needs to view the CPU utilization of a particular Virtual Server. Which section of the Configuration Utility should the administrator use for this purpose?

A.

Statistics > Module Statistics > Local Traffic > Virtual Addresses

B.

Statistics > Module Statistics > Traffic Summary

C.

Statistics > Analytics > Process CPU Utilization

D.

Statistics > Module Statistics > Local Traffic > Virtual Servers