Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

F5 101 Application Delivery Fundamentals Exam Practice Test

Page: 1 / 24
Total 240 questions

Application Delivery Fundamentals Questions and Answers

Question 1

An administrator needs to do the following

* install a load balancer in front of an existing application

* test application performance

* avoid reconfiguration of the application server

* avoid interruption of users accessing the application

Options:

A.

modify the test client's local host file

B.

modify the DNS Server A-record for the application

C.

configure IP Anycasting

D.

configure Port Address Translation

Question 2

Which function does the Presentation Layer provide?

Options:

A.

translation and encryption

B.

transmission over a medium

C.

internetworking capabilities

D.

access to available resources

Question 3

A load balancing decision needs to be made based on custom a What is the most appropriate F5 feature (or this purpose?

Options:

A.

iApps

B.

Scale

C.

iControl

D.

iRules

Question 4

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

Options:

A.

ASM

B.

APM

C.

AFM

D.

GTM

Question 5

What are Iwo examples of failover capabilities of BIG-IP? (Choose two )

Options:

A.

failing over based on an over temperature alarm

B.

failing over serial cable based on electric failure code

C.

II failing over network connection based on heartbeat detection

D.

fading over network connection based on SNMP error

E.

failing over serial cable based on voltage detection

Question 6

A BIG-IP Administrator contacts F5 Support and is asked to upload a Support Snapshot. Which command should be entered to the CLI to generate the requested file?

Options:

A.

imsh generate snapshot

B.

tmsh tcpdump

C.

tmsh save sys ucs support

D.

tmsh qkview

Question 7

What are three functions commonly performed by HTTP cookies? (Choose three)

Options:

A.

Track users' browsing activities

B.

hold User preferences

C.

maintain session state

D.

execute client side scripts

E.

execute server side scripts

Question 8

Cryptographic hash functions can be used to provide which service?

Options:

A.

data modification

B.

data encryption

C.

data validation

D.

data decryption

Question 9

A VoIP application requires that data payloads will NOT be fragmented. Which protocol controls network behavior in this situation?

Options:

A.

RTSP

B.

UDP

C.

TCP

D.

IP

Question 10

An administrator needs to load balance connections to the application server with the lowest number of

Which load balancing method meets these requirements?

Options:

A.

Least Sessions

B.

Ratio Least Connections (member)

C.

Least Connections (member)

D.

Least Connections (node)

Question 11

Which HTTP response code indicates an OK status?

Options:

A.

302

B.

404

C.

200

D.

100

Question 12

Which security model provides protection from unknown attacks?

Options:

A.

ACL Security model

B.

closed security model

C.

Negative security model

D.

Positive security model

Question 13

The administrator wants client request to be directed to the same pool member through the session based on the client IP address.

Which persistence method should the administrator choose?

Options:

A.

SSL persistence

B.

destination address affinity persistence

C.

cookie persistence

D.

Source address affinity persistence

Question 14

A BIG IP Administrator observes that the pool member status is a blue square What does this status indicate?

Options:

A.

The object is available

B.

The availability of the object is unknown.

C.

The object has reached its configured connection limit

D.

The object is unavailable.

Question 15

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

Options:

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Question 16

An administrator points the browser at h.tp://www mydomain com.The destination server listens on TCP port 8080 Which feature must be enabled on the virtual server for this configuration to work?

Options:

A.

HTTP persistence

B.

source NAT

C.

destination address affinity

D.

port translation

Question 17

A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to a server.

This is an example of which type of solution?

Options:

A.

packet forwarding architecture

B.

Full proxy architecture

C.

TCP compression

D.

TCP optimization

Question 18

An Administrator enables HTTP keep alive.

How does this affect the network?

Options:

A.

HTTP connections will remain open longer

B.

Fewer TCP connections will need to be opened

C.

HTTP connections will close when the keep-alive times out

D.

More TCP connections will need to be opened

Question 19

Why is it important that devices in a high availability pair share the same configuration?

Options:

A.

so that a spanning tree loop can be avoided

B.

so that application traffic can do gracefully resumed after a failover

C.

so that configuration Updates can occur instantly between two devices

D.

so that the load can be shared equally between the devices

Question 20

Which method should an administrator of the BIG-IP use to sync the configuration to only certain other BIG-IPs?

Options:

A.

synchronize only certain folders

B.

exclude devices from certain Traffic Groups

C.

exclude devices from certain Sync Groups

D.

exclude devices from certain Device Groups

Question 21

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG IP device, Multiple other VLANs exist on LACP01.Which TMSH command should the BIG IP Administrator issue to add the new VLAN lo the existing LAC?

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named IACP01) connected to the BIG IP device Multiple other VLANs exist on LACP01. Which TMSH command should the BIG IP Administrator issue to add the new VLAN to the existing LAC?

Options:

A.

create net vlan VIAN40 (interfaces replace all with {LACP01 (untagged } } lag 40 )

B.

create net vian VLAN40 (interfaces add { LACP01 {tagged} tag JO J

C.

create net vian VLAN40 {interfaces add ( LACP01 {untagged)) tag 40}

D.

create net wan VLAN40 {interfaces replace all with {LACP01 {tagged ]} lag 40 }

Question 22

What does response code HTTP 302 represent?

Options:

A.

The server encountered an unexpected condition that prevented it from Milling the request.

B.

The server has not found anything matching the Request URI

C.

The request has succeeded.

D.

The requested resource resides temporary under a different URI

Question 23

AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH command to create this new VLAN on the BIG-IP?

Options:

A.

Create/net wan internal interfaces add {1 1 (tagged }} tag 706

B.

Create/net vlan internal trunk add (11 {tagged)}

C.

add /net vlan internal interfaces add (11) tag 705

D.

add / net vlan internal tunk add {1 1 (tagged)) tag 705

Question 24

In wh.ch layer of the OSI model is the data transported in the form of a packet?

Options:

A.

Transport

B.

Session

C.

Network

D.

Presentation

Question 25

Which HTTP response code is returned when a web

server requires authentication to access a resource?

Options:

A.

500

B.

401

C.

302

D.

100

Question 26

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

Options:

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Question 27

What is the primary function of a certificate authority?

Options:

A.

to expire outdated certificates

B.

to verify and validate certificates

C.

to store security certificates

D.

to sign certificate signing requests

Question 28

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

Options:

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

Question 29

Question # 29

An administrate receives an error message when attempting to create a self-IP address on a BIG-IP appliance Which address should the administrator use to resolve the issue?

A 2001 0db8.85a3 0000 0000 8a2e 0370 7334

B. 2001:db8:85a3 Bd3.Ba2e.370 7334

C. 2001:0db8:85i3:0000:0000: : 8a2i:0370:7334

Options:

Question 30

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

Options:

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

Question 31

A BIG-IP Administrator needs to make sure that requests from a single user are directed to the server that was initially selected (unless that server is marked down). What should the administrator configure?

Options:

A.

caching profile

B.

TCP profile

C.

persistence profile

D.

security policy

Question 32

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

Options:

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Question 33

A BIG IP Administrator need to perform a packet capture and identify the source IP that is connecting to the Virtual Server.

Which utility should the administrator use on the BIG IP device?

Options:

A.

leinel

B.

traceroute

C.

ping

D.

tcpdump

Question 34

When using LDAP for authentication, what is the purpose of the base ON?

Options:

A.

the search context starting point

B.

the directory's simple name

C.

the base attribute in an LDAP directory

D.

the fundamental naming convention

Question 35

In a load balanced scenario which service would require persistence to function correctly?

Options:

A.

Simple Mail Transport Protocol

B.

DNS

C.

Web-based email

D.

HTTP

Question 36

Which service should be configured to allow BIG-IP devices to be externally monitored?

Options:

A.

SSHD

B.

TMSH

C.

SMTP

D.

SNMP

Page: 1 / 24
Total 240 questions