لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
The current status of a given pool member is nknown? Which condition could explain that state?The current status of a given pool member is ?nknown? Which condition could explain that state?
A. The member has no monitor assigned to it
C. The member has a monitor assigned to it and the monitor did not succeed during the most recent timeout period
D. The member's node has a monitor assigned to it and the monitor did not succeed during the most recent timeout period
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Windows PC clients are connecting to a virtual server over a high-speed, low-latency network with no packet loss. Which built-in client-side TCP profile provides the highest throughput for HTTP downloads?
A. tcp
B. tcp-legacy
C. tcp-lan-optimized
D. tcp-wan-optimized
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following is correct concerning HTTP classes?
A. A single web application can be used by several HTTP classes
B. A virtual server can only have one HTTP class associated with it
C. A single ASM enabled HTTP class can be used by multiple virtual servers
D. Each ASM enabled HTTP class can have several active security policies associated with it
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What is the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder?
A. Incoming requests with these IP addresses will never get blocked by BIG-IP ASM
B. Incoming requests with these IP addresses will not be taken into account as part of the learning process, they will be allowed to do anything
C. Incoming requests with these IP addresses will automatically be accepted into the security policy, Policy Builder will validate that future requests with this traffic will not create a violation
D. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more advanced security policy, this additional policy will not be enabled unless forced by the administrator
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which event is always triggered when the client sends data to a virtual server using TCP?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. VS_CONNECTED
عرض الإجابة
اجابة صحيحة: CE
السؤال #6
Assuming that systems are synchronized, which action could take place if the fail-over cable is connected correctly and working properly, but the systems cannot communicate over the network due to external network problems?
A. If network fail-over is enabled, the standby system will assume the active mode
B. Whether or not network fail-over is enabled, the standby system will stay in standby mode
C. Whether or not network fail-over is enabled, the standby system will assume the active mode
D. If network fail-over is enabled, the standby system will go into active mode but only until the network recovers
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Internet clients connecting to a virtual server to download a file are experiencing about 150 ms of latency and no packet loss. Which built-in client-side TCP profile provides the highest throughput?
A. tcp
B. tcp-legacy
C. tcp-lan-optimized
D. tcp-wan-optimized
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which statement is true concerning iRule events?
A. All iRule events relate to HTTP processes
B. All client traffic has data that could be used to trigger iRule events
C. All iRule events are appropriate at any point in the client-server communication
D. If an iRule references an event that doesn't occur during the client's communication, the client's connectionwill be terminated prematurely
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A OneConnect profile is applied to a virtual server. The LTM Specialist would like the client source IP addresses within the 10.10.10.0/25 range to reuse an existing server side connection. Which OneConnect profile source mask should the LTM Specialist use?
A. 0
B. 255
C. 255
D. 255
عرض الإجابة
اجابة صحيحة: AC
السؤال #10
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it: whenCLIENT_ACCEPTED { if {[TCP::local_port] equals 21 } { pool ftp pool } else if {[TCP::local_port]equals 23 } { pool telnet pool } If a user connects to 10.10.1.100 and port 22, which pool will receive therequest?
A. ftp pool
B. telnet pool
C. None
D. Unknown
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which three iRule events are likely to be seen in iRules designed to select a pool for load balancing? (Choose 3)
A. CLIENT_DATA
B. SERVER_DATA
C. HTTP_REQUEST
D. HTTP_RESPONSE
E. CLIENT_ACCEPTED
F. SERVER_SELECTED
G. SERVER_CONNECTED
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Users are experiencing low throughput when downloading large files over a high-speed WAN connection. Extensive packet loss was found to be an issue but CANNOT be eliminated. Which two TCP profile settings should be modified to compensate for the packet loss in the network? (Choose two.) A. slow start
B. proxy options
C. proxy buffer low
D. proxy buffer high
E. Nagle's algorithm
عرض الإجابة
اجابة صحيحة: A
السؤال #13
The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C,E, D and
B. The incoming client IP address is 195
B. Given the virtual server, pool, and persistence definitions and statistics shown inthe above graphic, which member will be used for the next connection? A
B. 10
C. 10
D. 10
E. 10
F. It cannot be determined with the information given
عرض الإجابة
اجابة صحيحة: D
السؤال #14
On a standalone BIG-IP ASM system, which of the following configuration is valid?
A. Pool named http_pool with 1 pool member, no persistence, and no load balancing method B
C. Pool named http_pool with 2 pool members, source IP persistence, and least connections load balancing method
D. Pool named http_pool with 3 pool members, cookie persistence, and least connections load balancing method
عرض الإجابة
اجابة صحيحة: D
السؤال #15
How is MAC masquerading configured? A. Specify the desired MAC address for each VLAN for which you want this feature enabled.
B. Specify the desired MAC address for each self-IP address for which you want this feature enabled
C. Specify the desired MAC address for each VLAN on the active system and synchronize the systems
D. Specify the desired MAC address for each floating self-IP address for which you want this feature enabled
عرض الإجابة
اجابة صحيحة: B
السؤال #16
When upgrading a BIG-IP redundant pair, what happens when one system has been updated but the other has not?
A. Synching should not be performed
B. The first system to be updated will assume the Active role
D. The older system will issue SNMP traps indicating a communication error with the partner
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
Which event is always triggered when a client initially connects to a virtual server configured with an HTTP profile?
A. HTTP_DATA B
C. HTTP_REQUEST
D. CLIENT_ACCEPTED
عرض الإجابة
اجابة صحيحة: AC
السؤال #18
Which VLANs must be enabled for a SNAT to perform as desired (translating only desired packets)?
A. The SNAT must be enabled for all VLANs
C. The SNAT must be enabled for the VLANs where desired packets arrive on the BIG-IP
D. The SNAT must be enabled for the VLANs where desired packets arrive and leave the BIG- IP
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Generally speaking, should the monitor templates be used as production monitors or should they be customized prior to use?
A. Most templates, such as http and tcp, are as effective as customized monitors
B. Monitor template customization is only a matter of preference, not an issue of effectiveness or performance
C. Most templates, such as https, should have the receive rule customized to make the monitor more robust
D. While some templates, such as ftp, must be customized, those that can be used without modification are not improved by specific changes
عرض الإجابة
اجابة صحيحة: C
السؤال #20
An LTM Specialist is working with an LTM device configured with 10 virtual servers on the same domain with a different key/cert pair per virtual. For examplE.www.example.com; ftp.example.com; ssh.example.com; ftps.example.com. What should the LTM Specialist do to reduce the number of objects on the LTM device?
A. create a 0 port virtual server and have it answer for all protocols
B. create a 0
C. create a transparent virtual server thus eliminating all virtual servers
D. create a wildcard certificate and use it on all *
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which of the following user roles have access to make changes to security policies? (Choose 2)
A. Guest B
C. Administrator
D. Web Application Security Editor
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Assuming other fail-over settings are at their default state, what would occur if the fail-over cable were to be disconnected for five seconds and then reconnected?
A. As long as network communication is not lost, no change will occur
B. Nothing
C. When the cable is disconnected, both systems will become active
D. When the cable is disconnected, both systems will become active
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: