لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following platforms support both standalone and modular BIG-IP ASM implementations? (Choose 2)
A. 3900
B. 6800
C. 6900
D. 8800
عرض الإجابة
اجابة صحيحة: B
السؤال #2
On a standalone BIG-IP ASM system, which of the following configuration is valid?
A. Pool named http_pool with 1 pool member, no persistence, and no load balancing method
B. Pool named http_pool with 3 pool members, cookie persistence, and ratio load balancing method
C. Pool named http_pool with 2 pool members, source IP persistence, and least connections load balancing method
D. Pool named http_pool with 3 pool members, cookie persistence, and least connections load balancing method
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What is the purpose of the GTM Systems Address Exclusion List concerning local DNSservers?
A. To prevent probing of specific local DNSs
B. To prevent name resolution to specific Virtual Servers
C. To prevent name resolution for requests from specific local DNSs
D. To prevent probing of any local DNS servers by specific F5 devices
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A steaming profile will do which of the following?
A. Search and replace all occurrences of a specified string only is responses processed by avirtual server
B. Search and replace all occurrences of a specified string only in request processed by avirtual server
C. Search and replace all occurrences of a specified string in requests and responsesprocessed by a virtual server
D. Search and replace the first occurrence of a specified of a specified string in either arequest or response processed by a virtual server
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Monitors can be assigned to which three resources? (Choose three.) A. Pools
B. Servers
C. Wide IPs
D. Data Centers
E. Pool Members
عرض الإجابة
اجابة صحيحة: ACD
السؤال #6
A BIGIP has two SNATs, a pool of DNS servers and a virtual server configured to loabalanceUDP traffic to the DNS servers. One SNAT's address is 64.100.130.10; this SNATis defined for all addresses. The second SNAT's address is 64.100.130.20; this SNAT isdefined for three specific addresses, 172.16.3.54, 172.16.3.55, and 172.16.3.56. The virtualserver's destination is 64.100.130.30:53. The SNATs and virtual server have default VLANassociations. If a client with IP address 172.16.3.55 initiates a request to t
A. 64
B. 172
C. 64
D. 64
عرض الإجابة
اجابة صحيحة: D
السؤال #7
When configuring a Virtual Server to use an iRule with an HTTP_REQUEST event, which listsrequired stepsin a proper order to create all necessary objects?
A. create profiles, create the iRule, create required pools, create the Virtual Server
B. create the Virtual Server, create required pools, create the iRule, edit the Virtual Server
C. create a custom HTTP profile, create required pools, create the Virtual Server, create the iRule
D. create required pools, create a custom HTTP profile, create the iRule, create the Virtual Server
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose 2)
A. Monitors mouse and keyboard events
B. Detects excessive failures to authenticate
C. Injects JavaScript code on the server side
D. Verifies the client supports JavaScript and cookies
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which two statements are true concerning capabilities of current BIG-IP platforms? (Choosetwo.)
A. The 1600 hosts more ports than the 3900
B. All current BIG-IP platform use both an ASIC
C. All current BIG-IP platform can perform hardware compression
D. Only 2U BIG-IP Platform have an option of a second power supply
E. All BIG-IP have capacity to perform bulk encryption I decryption of SSL traffic independentof the CPU
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C,E, D and
B. The incoming client IP address is 195
B. Given the virtual server, pool, and persistence definitions and statistics shown inthe above graphic, which member will be used for the next connection?
A. 10
B. 10
C. 10
D. 10
E. 10
F. It cannot be determined with the information given
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following user roles have access to make changes to security policies? (Choose 2)
A. Guest
B. Operator
C. Administrator
D. Web Application Security Editor
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which statement describes advanced shell access correctly?
A. Users with advanced shell access can always change, add, or delete LTM objects in allpartition
B. Users with advance shell access are limited to changing, adding, or deleting LTM object inany single partition
D. All Users can be given advanced shell access
عرض الإجابة
اجابة صحيحة: A
السؤال #13
What does the bigip_add script do?
A. Add BIG-IP servers to the wideip
B. Add an existing GTM System to a sync group
C. Synchronize configuration files between BIG-IP Systems
D. Exchange web certificates and keys between BIG-IP Systems
عرض الإجابة
اجابة صحيحة: CDE
السؤال #14
The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned custom monitors. If a pool eb?is marked vailable?The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned custom monitors. If a pool ?eb?is marked ?vailable (green) which situation is sufficient to cause this?
A. All of the eb?pool member nodes are responding to the ICMP monitor as expected
B. Less than 50% of the eb?pool member nodes responded to the ICMP echo request
C. All of the members of the eb?pool have had their content updated recently and their responses no longer match the monitor receiveAll of the members of the ?eb?pool have had their content updated recently and their responses no longer match the monitor? receive rule
D. Over 25% of the eb?pool members have had their content updated and it no longer matches the receive rule of the custom monitor
عرض الإجابة
اجابة صحيحة: AC
السؤال #15
After editing and saving changes to the configuration file containing virtual servers, what isthe immediate result?
A. The new configuration is verified and loaded
B. The new configuration is verified not loaded
C. The new configuration is verified
D. The new configuration is loaded but not verified
F. The new configuration is verified and loaded if is it syntactically correct
عرض الإجابة
اجابة صحيحة: E
السؤال #16
You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2?
A. All changes to TEST1 are propagated to TEST2
B. Some of the changes to TEST1 may propagate to TEST2
C. Changes to TEST1 cannot affect TEST2 once TEST2 is saved
D. When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes to TEST2
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which file contains the list of events for which the GTM System will send traps to an SNMPmanager?
A. /etc/snmpd
B. /etc/syslog-ng
C. /etc/alertd/alert
D. /etc/gtm_snmptrap
عرض الإجابة
اجابة صحيحة: D
السؤال #18
If the GTM System receives a packet destined for one of its Listener addresses the GTM willprocess the request ...
A. either through Wide-IP processing or BIND processing
B. through Wide-IP processing and may process it through BIND processing
C. through BIND processing and may process it through Wide-IP processing
D. through Wide-IP processing and BIND processing and choose the best answer betweenthe two
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
A GTM System performs a name resolution that is not a Wide-IP. The name is in a domainfor which the GTM System is authoritative. Where does the information come from? A. It comes from BIND database (zone) files on the GTM System.
B. GTM System cannot resolve a host name that is not a Wide-IP
C. It comes from the database of previously cached name resolutions
D. It comes from a zone transfer initiated when the request was received
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: