Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

F5 301a - BIG-IP LTM Specialist: Architect Set-Up & Deploy

Page: 1 / 5
Total 147 questions

A virtual server is experiencing intermittent port exhaustion. What should be done to fix this issue?

A.

add more SNAT addresses

B.

add more pool members

C.

enable advanced routing

D.

enable SNAT automap

An LTM specialist needs to upgrade a VCMP quest in an HA Setup with minimum interruption for all VCMP guest instances.

In which should the LTM Specialist perform this upgrade?

A.

Relicense the host. Failover all guest’s active traffic-groups to the other host, copy image to gest, create guest UCS install and set boot location to new volume, reboot

B.

Failover this specific guest’s active traffic-group to the other Host, Relicense the guest, copy image to guest , create guest UCS, install and set boot location to new volume, reboot

C.

Failover all guests’ active traffic-group to the other Host, Relicense the host, copy image to guest, create guest UCS, install and set boot location to new volume , reboot

D.

Failover all guests’ active traffic-group to the other host, copy image to guest, create guest UCS install and set boot location to new volume, reboot, Relicense the host

RADIUS authentication has been configured on the LTM device. The default remote user access requirements are as shown:

    Read only access to the configuration Utility

    Access to TMOS shell

Which two items need to be configured in this situation? (Choose two)

A.

Console access is Advanced Shell

B.

Console access is Read Only

C.

Default remote user role is Guest

D.

In Console access is TMSH

E.

Default remote user role is Manager

F.

Default remote user role is Operator

Exhibit.

The server team has recently configured the three new DNS servers shown for the data center. No current DNS servers are currently configured on the LTM device.

Which command should be used to configure the LTM device to use the new DNS servers?

A.

tmsh create/systins name-servers add {192 168.1.2.192.168.100.1O0.192.168.2O0.2OO}

B.

tmsh change /sysdns name-servers add {192.168.1.2.192.168.100.100.192.168.200.200}

C.

tmsh modify/sysdns name-servers add {192.168.1.2.192.168.100.100.192.168.200.200}

D.

tmsh set/sysdns name-servers add {192.168.2.192.168.100.100.192.168.200.200}

An LTM Specialist needs to force only FTP traffic, sourced from subnet 10.10.10.0/24 to virtual server 10.10.20.1 to the new FTP1 server. The following virtual servers are configured on the LTM device:

Traffic sourced from 10.10.10/24 must use the specific pool member for load balancing.

Which configuration change is needed to meet the requirements?

A.

Create a new virtual server for traffic sourced from 10.10.10.0/24 on port 80 that is destined to 10.10.20.1/32, and create a new pool has only the pool member FTP1 defined.

B.

Add FTP1 to the pool assigned to the MyVS4 virtual server, and remove all other pool members from the pool.

C.

Create a new virtual server for traffic sourced from 10.10.10.0/24 on traffic sourced from 10.10.10./24 on port 21 that is destined to 10.10.20.1/32, and create a new pool that has only the pool member FTP1 defined.

D.

Add FTP1 to the pool assigned to the MyVS2 virtual server, and remove all other pool member from the pool.

An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.

How should the LTM Specialist block these attempts?

A.

add the permitted source IP addresses to the httpd allow list via tmsh

B.

add the suspicious source IP addresses to the httpd deny list via tmsh

C.

add the suspicious source IP addresses to the httpd deny list via Configuration Utility

D.

add the permitted source IP addresses to the allow list via Configuration Utility

An LTM Specialist configures a new HTTPS virtual server that contains a valid example.com ssl certificate. The LTM Special receives an error in the browser when connecting.

What must be added to the SSL Client profile to fix this issue?

A.

A sell-sign certificate

B.

A new example com certificate

C.

An intermediate certificate

D.

A public root certificate

The picture belongs to static content, you can configure static content cache in FS to meet this demand

An LTM Specialist must configure session persistence for a highly available, highly utilized web-based application.

* The following requirements are provided:

* http proxy setup for security

persistence information available to the HA peer in case of failover

The LTM Specialist needs to minimize additional burden on the LTM device to the greatest extent possible.

Which persistence profile should be used?

A.

Cookie insert

B.

Universal

C.

Source Address Affinity

D.

Destination Address Affinity

A virtual server configuration for traffic destined to a server is as shown:

FTP traffic is destined to the 192.168.1.101 server from the source of 192.168.2.129.

Based on precedence, which virtual server accepts this traffic?

A.

MyVS4

B.

MyV53

C.

MyVS1

D.

MyVS2

A pool has four members. Ail of the servers have been designed and configured with the same application. Each client's request can significantly the performance of the servers.

Which load balancing method should the LTM Specialist use to maintain a relatively even load across all servers?

A.

Least Connections

B.

Priority Group

C.

Ratio

D.

Observed