لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
In a routed configuration, what does LTM do with the packet before sending it to the pool member?
A. Change the source IP and the destination IP address
B. Leave it unchanged and forward it
C. Change the source IP address
D. Change the destination IP address
عرض الإجابة
اجابة صحيحة: D
السؤال #2
In the following configuration, a virtual server has the following HTTP class configuration: HTTP Class 1 = Host pattern www.f5.com HTTP Class 2 = No filters A request arriving for WWW.F5.COM will be matched by which class(es)?
A. Class 1
B. Class 2
C. Both Class 1 and Class 2
D. The request will be dropped
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Application templates save the time it typically takes to create nodes, pools, pool members, virtual servers, and monitors.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP
عرض الإجابة
اجابة صحيحة: ABEF
السؤال #5
If the BIG-IP device is NOT always located between the client and the server, it will NOT provide full optimization and security.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)
A. An organization using Novell Netware for authentication
B. An organization that has been recently fined for failing security compliance
C. An organization with a traveling sales force
D. An organization with a single location and no remote employees
E. An organization that needs to ensure users are using Symantec antivirus software
F. An organization sharing a public Web site for all Internet users
عرض الإجابة
اجابة صحيحة: BCE
السؤال #7
When using a routed configuration, the real server must point to the LTM as the ________.
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway
عرض الإجابة
اجابة صحيحة: E
السؤال #8
Which of the following methods are used by the BIGIP ASM System to protect againstSQL injections?
A. HTTP RFC compliancy checks
B. Meta-character enforcement and attack signatures
C. HTTP RFC compliancy checks and length restrictions
D. Response scrubbing, HTTP RFC compliancy checks, and meta-character enforcement
عرض الإجابة
اجابة صحيحة: A
السؤال #9
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
عرض الإجابة
اجابة صحيحة: A
السؤال #10
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides enhanced support for DNS servers
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
عرض الإجابة
اجابة صحيحة: D
السؤال #11
The Policy Builder benefits include:
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following is not a feature of a standalone BIG-IP ASM System?
A. Attack signatures
B. Multiple pool members
C. Positive security model
D. Real-time traffic policy builder
E. Pre-defined security policy templates
عرض الإجابة
اجابة صحيحة: B
السؤال #13
An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?
A. Self IP
B. Virtual Server
C. Pool
D. Node
E. Pool Member
عرض الإجابة
اجابة صحيحة: E
السؤال #14
In order to further accelerate applications, the external router can direct subsequent client traffic to bypass LTM and communicate directly with the server.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #16
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #17
A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all other factors are equal and traffic should be sent to all members, which two load-balancing methods are most appropriate? (Choose two.)
A. Ratio
B. Priority
C. Observed
D. Round Robin
عرض الإجابة
اجابة صحيحة: C
السؤال #18
What is NOT a benefit of using a SNAT?
A. ASM can be deployed easily
B. No changes are needed on the servers
C. Fail open is easy to add
D. Higher performance than other configuration
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Adding more RAM to a GTM device drastically improves query performance.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #20
A failover event is recorded in the following log messages: Jan 01 00:56:56 BIG-IP notice mcpd[5318]: 01070727:5: Pool /Common/my-pool member /Common/10.0.0.10:80 monitor status down. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0045:5: Leaving active, group score 10 peer group score 20. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0052:5: Standby for traffic group /Common/traffic-group-1. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0018:5: Standby Jan 01 00:57:06 BIG-IP notice logger: /usr/bin/tmipsecd --
A. The HA group score changed
B. No traffic is seen on traffic-group-1
C. The peer device left the traffic group
عرض الإجابة
اجابة صحيحة: ACD
السؤال #21
One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which four F5 products are on the TMOS platform? (Choose four.)
A. ARX
B. GTM
C. WOM
D. APM
E. ASM
F. Firepass
عرض الإجابة
اجابة صحيحة: BCDE
السؤال #23
ASM offers the most extensive, effective, and simplest to configure CSRF protection in the WAF market.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which of the following statements about Web server offload is NOT true?
A. It performs rate shaping to reduce overflow
B. It forces the client browser to use multiple connections streams
C. It uses OneConnect to reduce multiple TCP connections
D. It utilizes cached content to prevent unnecessary trips for the same content
E. It uses specialized hardware for SSL offload
عرض الإجابة
اجابة صحيحة: B
السؤال #25
CSRF is difficult to detect because:
A. The attacks are requests a user should be allowed to make
B. The attacks always utilize obfuscation
C. The attacks are always encrypted
D. All of the above
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which level of parameter assumes the highest precedence in BIG-IP ASM Systemprocessing logic?
A. Flow
B. Object
C. Global
D. URL
عرض الإجابة
اجابة صحيحة: AB
السؤال #27
Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention
B. Cross-site request forgery prevention
C. Web scraping attack prevention
D. Parameter tampering prevention
عرض الإجابة
اجابة صحيحة: BD
السؤال #28
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
عرض الإجابة
اجابة صحيحة: ABD
السؤال #29
Information leakage is a major obstacle to achieving PCI DSS compliance.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #30
Which of the following is not a configurable parameter data type?
A. Email
B. Array
C. Binary
D. Decimal
عرض الإجابة
اجابة صحيحة: C
السؤال #31
IP Enforcer blocks IP addresses that have repeatedly and regularly attacked the site.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #32
A network administrator tells you that they do NOT need WebAccelerator because their Web application is fine. What is your best response?
A. Challenge them to run performance testing on their Web site
B. Access their Web site with them to display its response
C. Request a follow up meeting within the next three months
D. Ask for an opportunity to speak with the CIO or a member of their Web application team
عرض الإجابة
اجابة صحيحة: D
السؤال #33
LTM can only load balance outbound traffic by using iRules
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #34
Which of the following is NOT a benefit of using SSL offload?
A. It increases the bandwidth between the client and LTM
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member
C. The organization requires far less SSL certificates
D. The CPU processing load on backend servers is reduced
E. It enables iRules to be used on traffic arriving to LTM that is encrypted
عرض الإجابة
اجابة صحيحة: A
السؤال #35
When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacity.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #36
Which three of these file types work well with HTTP compression? (Choose three.)
A. MP4 videos
B. Digital photos
C. Text files
D. Static HTML Web pages
E. CD quality songs
F. Microsoft Word documents
عرض الإجابة
اجابة صحيحة: CDF
السؤال #37
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria? (Choose three.)
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name
عرض الإجابة
اجابة صحيحة: BCF
السؤال #38
What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration
عرض الإجابة
اجابة صحيحة: DF
السؤال #39
Which of the following statements about cookie persistence is NOT true?
A. The cookie's timeout value can be customized
B. They are F5'spreferred persistence method
C. No persistence information is placed on LTM
D. Web servers must be configured to send cookies to clients
E. They do not add a performance impact on LTM
عرض الإجابة
اجابة صحيحة: D
السؤال #40
A virtual server is defined using a source-address based persistence profile. The last five connections were A, B, C, A,
C. Given the conditions shown in the graphic, if a client with IP address 205
A. 10
B. 10
C. 10
D. 10
E. 10
عرض الإجابة
اجابة صحيحة: A
السؤال #41
GTM can load balance to LTM in addition to non-BIG-IP hosts.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #42
When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Active scenario because this provides additional load balancing capabilities.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #43
Which of the following is a client-side action in the Visual Policy Editor that prevents external access and deletes any files created during a secure access session?
A. Windows Group Policy
B. Resource Assign
C. Protected Workspace
D. Virtual Keyboard
E. Browser Cache and Session Control
عرض الإجابة
اجابة صحيحة: C
السؤال #44
Which of the following are four of the security benefits of TMOS? (Choose four.)
A. It verifies traffic based on antivirus signatures
B. It provides protection against DDoS
C. It uses SYN cookies and dynamic connection reapers
D. It supplies guidance for poorly developed applications
E. It denies all traffic that hasn't been defined
F. It can hide confidential information from outbound traffic
عرض الإجابة
اجابة صحيحة: BCEF
السؤال #45
Which of the following are four of the benefits of the TMOS architecture? (Choose four.)
A. User authentication
B. Server-side optimization
C. Dynamic DDoS protection
D. Web application security
E. Client-side optimization
F. Antivirus checking
عرض الإجابة
اجابة صحيحة: BCDE
السؤال #46
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
عرض الإجابة
اجابة صحيحة: BC
السؤال #47
An LTM device pair is configured for failover and connection mirroring. The LTM devices are configured with virtual servers for HTTP, HTTPS with SSL offload, and SSH. An event occurs that causes a failover. HTTP and SSH sessions active at the time of failover remain active, but HTTPS sessions are dropped. What is the root cause of this problem?
A. The SSL certificates on the LTM devices do NOT match
B. Connection mirroring is incompatible with clientssl profiles
C. SNAT automap was NOT enabled for the HTTPS virtual servers
D. Connection mirroring was NOT enabled for the HTTPS virtual servers
عرض الإجابة
اجابة صحيحة: C
السؤال #48
TCP Express is licensed separately from LTM
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #49
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation
عرض الإجابة
اجابة صحيحة: D
السؤال #50
Which of the following is NOT a profile type on the BIG-IP?
A. Protocol
B. Application
C. Persistence
D. Authentication
E. SSL
عرض الإجابة
اجابة صحيحة: B
السؤال #51
Which four of the following statements about LDNS probes are true? (Choose four.)
A. Only GTM devices can act as a prober
B. They check each requesting LDNS that has made a request of the GTM
C. They can determine available cache size on the client
D. They are used to develop path metrics
E. They verify the link between a data center and an LDNS
F. Probing only takes place if GTM is configured to use dynamic load balancing
عرض الإجابة
اجابة صحيحة: BDEF
السؤال #52
-- Exhibit -- Exhibit -- An LTM Specialist is reviewing the virtual server configuration on an LTM device. Which two actions should the LTM Specialist perform to minimize the virtual server configuration? (Choose two.)
A. Remove 'snat automap' from the virtual server
B. Remove the 'http' profile from the virtual server
C. Remove the 'default_class' from the virtual server
D. Combine 'acct_class' and 'marketing_class' into one class and update associations on the virtual server
E. Combine 'marketing_class' and 'default_class' into one class and update associations on the virtual server
عرض الإجابة
اجابة صحيحة: D
السؤال #53
The administrator must specify APM access control entries as either L4 or L7.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #54
Which of the following are default settings when using the Policy Builder to build a securitypolicy based on the QA lab deployment scenario? (Choose 2)
A. All learned entities are placed in staging
B. Attack signatures are not placed in staging
C. The security policy is placed in blocking mode
D. Tightening is enabled only on file types and parameters
عرض الإجابة
اجابة صحيحة: CD
السؤال #55
Which two of these statements about OneConnect are true? (Choose two.)
A. It decreases the CPU load on LTM
B. It aggregates multiple client connections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members
عرض الإجابة
اجابة صحيحة: BE
السؤال #56
As a full TCP proxy, LTM acts as the termination point for both requests from the client and responses from the server.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #57
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM
B. All traffic through LTM is checked for DDoS attacks
C. No traffic A allowed through LTM until it has been specified
D. All users must authenticate before accessing applications through LTM
E. Only LAN administrators can access resources through LTM
عرض الإجابة
اجابة صحيحة: C
السؤال #58
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries
B. They want GTM to make load balancing decisions based on metrics
C. They have data centers in several countries
D. They are using several operating systems for the local DNS servers
عرض الإجابة
اجابة صحيحة: C
السؤال #59
Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing interruptions.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: