Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

F5 771-101 - Application Delivery Fundamentals

Page: 5 / 8
Total 240 questions

Which protocol emphasizes reduced latency over reliability?

A.

TCP

B.

UDP

C.

GRE

D.

RSVP

A client needs to learn if a web server supports POST

Which HTTP method is used?

A.

OPTIONS

B.

TRACE

C.

LIST

D.

GET

A BIG IP Administrator reviews the Virtual Server configuration and sees the object status represented by a blue square tor an unknown status.How should the administrator change the unknown status?

A.

restart the BIG-IP device

B.

assign a monitor to the pool

C.

restart the backend webserver

D.

run a packet capture on the BIG-IP device

A BIG-IP Administrator needs to make sure that requests from a single user are directed to the server that was initially selected (unless that server is marked down). What should the administrator configure?

A.

caching profile

B.

TCP profile

C.

persistence profile

D.

security policy

Client traffic for a web application is managed by load balancers in a high availability configuration. After a failover event all clients ant forced to login again to the application.

What is the most like reason this occurred?

A.

Clients were sending request to failed load balancer

B.

correction mirroring configuration was NOT configured on the loadbalancer

C.

The server was responding to the failed load balancer

D.

SSL offloading was NOT configured on the load balancer

A BIG-IP Administrator needs to open a case with F5 Support for a specific issue with an existing HA pair of BIG-IP platform. What should be uploaded to iHealth prior to opening the case to expedite processing of the support case?

A.

UCS file

B.

SCF filo

C.

tcpdump file

D.

Qkview file

Which of the following is a valid IP address and prefix length?

A.

192. 168.:0 177/25

B.

192 168:0. 129/25

C.

192.168:0 128/25

D.

192 168 :0 255/25

A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to a server.

This is an example of which type of solution?

A.

packet forwarding architecture

B.

Full proxy architecture

C.

TCP compression

D.

TCP optimization

An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality?

A.

iCall

B.

iRules

C.

iSession

D.

iControl

What are the two primary functions of the OSI 7 layer model (Choose two)

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors