Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

F5 771-101 - Application Delivery Fundamentals

Page: 1 / 8
Total 240 questions

What are two examples of network layer protocols? (Choose two)

A.

ARP

B.

TCP

C.

IPv4

D.

BGP

E.

ICMP

What is an advantage of packet forwarding architecture?

A.

allows for SSL offload

B.

reduces latency

C.

allows for manipulation of HTTP headers

D.

handles larger packet sizes

What is used to provide mutual authentication for TLS/SSL?

A.

X 509 Certificate

B.

Access List

C.

Shared Secret key

D.

Mutually Trusted issuer

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Mufti VLANS exist on LACPO1.Which TMSH command should the BIGIP Administrator issue to add the new VLAN to the existing LACP trunk?

A.

create net vlan VLAN40 (interfaces add (LACP01 {lagged)) tag 40}

B.

create net vlan VLAN40 {interfaces replace-all-with {LACP01{tagged}} tag 40}

C.

create net vlan VLAN40 interfaces replace all with {LACP01 {untagged)} tag 40}

D.

create net vlan VLAN40 {interfaces add {LACP01 {untagged}} tag 40}

in which scenario is a full proxy TCP connection required?

A.

when DNS load balancing is performed

B.

When source NAT is demanded

C.

when the client source IP address is sent to the server

D.

when the client and server connection are decoupled

Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?

A.

grep

B.

ping

C.

dig

D.

find

What are three functions commonly performed by HTTP cookies? (Choose three)

A.

Track users' browsing activities

B.

hold User preferences

C.

maintain session state

D.

execute client side scripts

E.

execute server side scripts

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?

A.

Public Key

B.

SSL extension

C.

A negotiated security algorithm

D.

private Key

When is the server also a client?

A.

during a passive FTP session

B.

during an active FTP session

C.

While receiving email

D.

While uploading files