لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is NOT included on the F5 DevCentral site?
A. Subscription purchasing options
B. Actual iRules written by othercustomers
C. iRules reference materials
D. Forums
E. The F5 iRule editor
عرض الإجابة
اجابة صحيحة: A
السؤال #2
By default, BIG-IP ASM allows which of the following HTTP methods in a client request? (Choose three.)
A. PUT
B. GET
C. POST
D. HEAD
E. TRACE
عرض الإجابة
اجابة صحيحة: A
السؤال #3
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client, What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Customers can purchase LTM as a stand-alone product, or layer it with additional software modules to increase the functionality of the BIG-IP device.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #5
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers,
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #6
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the_______. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Another name for the F5 OneConnect feature is TCP multiplexing,
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #8
After editing and saving changes to the configuration file containing virtual servers, what is the immediate result?
A. The new configuration is verified and loaded
B. The new configuration is verified not loaded
C. The new configuration is verified
D. The new configuration is loaded but not verified
E. The new configuration is neither verified not loaded
F. The new configuration is verified and loaded if is it syntactically correct
عرض الإجابة
اجابة صحيحة: B
السؤال #9
GTM can load balance to LTM in addition to non-BIG-IP hosts
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #10
SIMULATION A________object maps a FQDN to virtual servers. (Fill in) Your Response: type here
A. "Wide IP"
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which three methods can be used for initial access to a BIG-IP system. (Choose three.)
A. CLI access to the serial console port
B. SSH access to the management port
C. SSH access to any of the switch ports
D. HTTP access to the management port
E. HTTP access to any of the switch ports
F. HTTPS access to the management port
G. HTTPS access to any of the switch ports
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #13
TMOS is an F5 software module that runs on the BIG-IP platform,
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #14
The least connections load balancing method functions best when all pool members share similar characteristics
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which three of these software modules can you layer on top of LTM on a BIG-IP device?
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
عرض الإجابة
اجابة صحيحة: ABD
السؤال #16
Which four of the following statements about LDNS probes are true?
A. Only GTM devices can act as aprober
B. They check each requesting LDNS that has made a request of the GTM
C. They can determine available cache size on the client
D. They are used to develop path metrics
E. They verify the link between a data center and an LDNS
F. Probing only takesplace if GTM is configured to use dynamic load balancing
عرض الإجابة
اجابة صحيحة: BDEF
السؤال #17
SIMULATION The layer 3 security feature__________Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in) Your Response: type here
A. "contain / include"
عرض الإجابة
اجابة صحيحة: A
السؤال #18
SIMULATION GTM uses the F5_____protocol to synchronize performance metrics between GTMdevices. (Fill in) Your Response: type here
A. iQuery
عرض الإجابة
اجابة صحيحة: A
السؤال #19
APM provides access control lists at which two OSI layers?
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
عرض الإجابة
اجابة صحيحة: BC
السؤال #20
When using a routed configuration, the real server must point to the LTM as the
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway
عرض الإجابة
اجابة صحيحة: E
السؤال #21
Which three of the following must be done in order for GTM to properly communicate LTM?
A. Connect the GTM and LTM with a network crossover cable
B. Synchronize the big3d versions between GTM and LTM
C. Add the LTM object to the GTM configuration
D. Configure theGTM and LTM to we MAC masquerading
E. Ensure that GTM and LTM use the same floating IP address
F. Exchange SSL certificates between the two devices
عرض الإجابة
اجابة صحيحة: BCF
السؤال #22
DNSSEC is a GTM add-on licensing feature.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin,
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM
B. Alltraffic through LTM is checked for DDoS attacks
C. No traffic A allowed through LTM until it has been specified
D. All users must authenticate before accessing applications through LTM
E. Only LAN administrators can access resources through LTM
عرض الإجابة
اجابة صحيحة: C
السؤال #25
What are the two most common methods of placing a BIG-IP device into a network environment?
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration
عرض الإجابة
اجابة صحيحة: DF
السؤال #26
In the following request, which portion represents a parameter name?
A. Yes
B. User
C. Week1
D. Financials
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which four of the monitoring methods listed below can GTM use to determine the status and performance ofBIG-IP and servers?
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP
عرض الإجابة
اجابة صحيحة: ABEF
السؤال #28
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality fromother devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides enhanced support for DNS servers
C. Establishes highly detailed policies based on your customer’s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
عرض الإجابة
اجابة صحيحة: D
السؤال #29
On a standalone BIG-IP ASM system, which of the following configuration is valid?
A. Pool named http_pool with 1 pool member, no persistence, and no load balancing method
B. Pool named http_pool with 3 pool members, cookie persistence, and ratio load balancing method
C. Pool named http_pool with 2 pool members, source IP persistence, and least connections load balancing method
D. Pool named http_pool with 3 pool members, cookie persistence, and least connections load balancing method
عرض الإجابة
اجابة صحيحة: C
السؤال #30
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request? Pool Member D
A. A
B. B
C. C
D. D
عرض الإجابة
اجابة صحيحة: B
السؤال #31
FastCache will NOT work with compressed objects.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #32
LTM can only load balance outbound traffic by using iRules
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value,
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #34
The BIG-IP determines the lowest connection speed between the client and the server and then uses that for both connections
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #35
Which of the following is NOT a benefit of using SSL offload?
A. it increases thebandwidth between the client and LTM
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member
C. The organization requires far less SSL certificates
D. The CPU processing load on backend servers isreduced
E. It enables iRules to be used on traffic arriving to LTM that is encrypted
عرض الإجابة
اجابة صحيحة: A
السؤال #36
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria?
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name
عرض الإجابة
اجابة صحيحة: BCF
السؤال #37
Under what condition must an appliance license be reactivated?
A. Licenses only have to be reactivated for RMAs no other situations
B. Licenses generally have to be reactivated during system software upgrades
C. Licenses only have to be reactivated when new features are added (IPv6, Routing Modules, etc
D. Never
عرض الإجابة
اجابة صحيحة: CE
السؤال #38
LTM runs on________F5's proprietary product platform. (Fill in the correct answer)
A. ARX
B. Firepass
C. Acopia
D. TMOS
عرض الإجابة
اجابة صحيحة: D
السؤال #39
When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.)
A. All client requests
B. All server responses
C. Specific client requests
D. Specific server responses
عرض الإجابة
اجابة صحيحة: ABF
السؤال #40
Learning suggestions in the Policy Building pages allow for which of the following? (Choose two.)
A. XML-based parameters and associated schema are automatically learned
B. Blocking response pages can be automatically generated from web site content
C. Flow level parameters are displayed when found and can be accepted into the current policy
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations
E. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator
عرض الإجابة
اجابة صحيحة: E
السؤال #41
Which two of these statements about OneConnect are true?
A. It decreases the CPU load on LTM
B. It aggregates multiple clientconnections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members
عرض الإجابة
اجابة صحيحة: BE
السؤال #42
GTM solves which three of these standard DNS limitations?
A. It can verify that a host is available before resolving a host name for a client
B. It can use HTTPS for the connection between itself and the client
C. It can ensure that clients remain at the same data center for stateful applications
D. It can verify that a client does not have any viruses before sending the IP address
E. It has more complex load balancing methods
عرض الإجابة
اجابة صحيحة: ACE
السؤال #43
The Policy Builder benefits include;
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
عرض الإجابة
اجابة صحيحة: C
السؤال #44
To make complex access policies easier to manage, an administrator can create a__________containing several policy actions, and then add instances of it within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator
عرض الإجابة
اجابة صحيحة: A
السؤال #45
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries
B. They want GTM to make load balancing decisions based on metrics
C. They have data centers in several countries
D. They are using several operating systems for the local DNSservers
عرض الإجابة
اجابة صحيحة: C
السؤال #46
What happens when the data center that GTM recommends for a client is unavailable?
A. GTM uses cached information to determine an alternate route
B. GTM queries thelocal DNS server
C. GTM sends subsequent queries to the next preferred data center
D. GTM directs the client to use its DNS cache to select an alternate location
E. The client continues to attempt to access the preferred data center
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: