لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5 professionals and customers?
A. Modular Functionality
B. iApps
C. TMOS
D. DevCentral
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A monitor has been defined using the HTTP monitor template. The send and receive stringswere customized, but all other settings were left at their defaults. Which resources can themonitor be assigned to?
A. only specific pool members
B. most virtual severs
C. most nodes
D. most pools
عرض الإجابة
اجابة صحيحة: C
السؤال #3
ARX will detect any modification to a file on the second tier because all clients are being .......... by the ARX to get to the storage.
A. Deleted
B. Copied
C. Backed up
D. Proxied
E. Moved
عرض الإجابة
اجابة صحيحة: A
السؤال #4
If your customer has a policy requirement that cannot be handled in the Visual Policy Editor, what would you use to supplement the Visual Policy Editor?
A. iApps
B. TMOS
C. iControl
D. iRules
عرض الإجابة
اجابة صحيحة: S
السؤال #5
Basic F5 IP Geolocation provides whichfourtypes of client information?
A. State
B. Continent
C. Postal code
D. City
E. Carrier
F. Country
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Match the security-related term with the correct definition. 1. Demilitarized zone (DMZ) 2. Denial of service (DoS) 3. DNS Express 4. DNS Security Extensions (DNSSEC) 5. Endpoint inspection Build List and Reorder:
عرض الإجابة
اجابة صحيحة: A
السؤال #7
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a *3, network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply-request process
عرض الإجابة
اجابة صحيحة: D
السؤال #8
True or false? To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
A. True
B. False
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A monitor has been defined using the HTTP monitor template. The send and receive stringswere customized, but all other settings were left at their defaults. Which resources can themonitor be assigned to?
A. Only specific pool members
B. Most virtual severs
C. Most nodes
D. Most pools
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
A. An intrusion prevention system (IPS) is base on Packet Filtering
B. An IPS doesn't have the visibility into HTTPS traffic
C. An IPS only focus op operating system attacks; it doesn't understand what application are in the network
D. An IPS can only look at overall traffic patterns; it doesn't understand what applications are in the network
عرض الإجابة
اجابة صحيحة: D
السؤال #11
What percentage of storage in a typical environment is actively used and modified?
A. 5%
B. 50%
C. 25%
D. 10%
E. 90%
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which twoof the following statements are accurate descriptions of the ARX index?
A. The ARX index stores the bulk of its data as bit arrays and answers most questions by performing bitwise logical operations on these bitmaps
B. The ARX index contains the index keys in sorted order, with the leaf level of the index containing the pointer to the page and the row number in the data page
C. The ARX index is the key enabler of transparent data mobility because the ARX tracks where files reside at all times, from creation through migration and deletion
D. The ARX index is 100% disposable and can be rebuilt at any point in time without disrupting client or application access to data
عرض الإجابة
اجابة صحيحة: D
السؤال #13
True or false? The production version of BIG-IP Virtual Edition is limited to 200 Mbps throughput.
A. True
B. False
عرض الإجابة
اجابة صحيحة: D
السؤال #14
True or false? When installing LTM on different VIPRION performance blades, each instance of LTM needs to be licensed separately.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #15
When using SNAT, which additional IP addresses will the BIG-IP system change? Select two.
A. The source IP address on the client to BIG-IP request packet
B. The source IP address on the BIG-IP to pool member request packet
C. The destination IP address on the BIG-IP to pool member request packet
D. The source IP address on the BIG-IP to client response packet
E. The destination IP address on the BIG-IP to client response packet
F. The destination IP address on the pool member to BIG-IP response packet
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of these statements about a stream profile is false?
A. It is applied to an HTTP class profile
B. It is not recommended for telnet traffic
C. It can replace one data string for another for all traffic going through a virtual server
D. It applies to both inbound and outbound traffic
E. It will not inspect HTTP headers when an HTTP profile is present
عرض الإجابة
اجابة صحيحة: BCDE
السؤال #17
Which two of the following statements about how TMOS typically manages traffic between a client and server are accurate?
A. It changes the destination address before forwarding a request to the server
B. It changes the destination address before sending a response to the client
C. It changes the source address before sending a response to the client
D. It changes the source address before forwarding a request to the server
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Select the two best questions you would use to ask your customer about their currentweb access management solution. Select two.
A. What impact are slow remote access connections having on productivity?
B. Are you using Google multi-factor authentication?
C. Is user authentication data sitting on partner systems outside your control,
D. Have you standardized on Androids or iPhones?
E. How are you planning to extend Exchange to your mobile users?
F. How do you think a blobal remote access deployment with integrated acceleration and avaibility services might benefit your business?
عرض الإجابة
اجابة صحيحة: A
السؤال #19
True or False? Although not all modules run on all platforms, each F5 hardware platform can run LTM plus at least one additional software module.
A. True
B. False
عرض الإجابة
اجابة صحيحة: BD
السؤال #20
Select the key question you would use to ask your customer related to DNS attacks?
A. Do you over-provision your DNS infrastructure?
B. Do you regularly update BIND or some other DNS application to the latest release?
C. Do you rely on your network firewall to protect your DNS server?
D. How do you secure your DNS infrastructure against attacks?
عرض الإجابة
اجابة صحيحة: A
السؤال #21
When DNS_REV is used as the probe protocol by the GTM System, which information isexpected in the response from the probe?
A. A reverse name lookup of the GTM System
B. The list of root servers known by the local DNS
C. The FQDN of the local DNS being probed for metric information
D. The revision number of BIND running on the requesting DNS server
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which of the following business benefits does storage tiering offer to customers?
A. Reduces time for backups because data on the secondary tier can have a less time-intensive backup policed applied to it
B. All of the above
C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data
D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage
عرض الإجابة
اجابة صحيحة: AD
السؤال #23
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP.............. service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
A. Edge Client
B. iRules
C. LTM
D. IP intelligence
E. iApps
عرض الإجابة
اجابة صحيحة: BEF
السؤال #24
A customer wants the best possible throughput but only has a maximum of 3RU rack space. Which F5 platform should you recommend?
A. BIG-IP 11050
B. VIPRION with only 1 performance blade
C. BIG-IP 8950
D. BIG-IP 8900
E. VIPRION with 4 performance blades
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Select the best word or phrase to complete the following sentence. Using the.............feature in GTM, F5's Application Delivery Firewall solution can handle a significantly higher number of queries than traditional DNS servers.
A. DNS Express
B. BIND
C. Site availability request
D. Location-based routing
عرض الإجابة
اجابة صحيحة: BE
السؤال #26
Even though F5 is an application delivery controller, it can also effectively mitigate attacks directed at the network layer.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Which two processes are involved when BIGIP systems issue traps? (Choose two.)
A. bigd
B. alertd
C. smtpd
D. sysloging
عرض الإجابة
اجابة صحيحة: BD
السؤال #28
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request
A. A
B. C
C. D
D. B
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: