لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used too often.
A. The IP address of the server must be added to the wideip
B. The IP address of the server must be added to the syslog-ng
C. The IP address of the server and valid userid/password combination must be added to thehosts
D. The IP address of the server and valid userid/password combination must be added to the syslog-ng
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A GTM System would like to ensure that a given LTM System is reachable and iQuerycommunication is allowed prior to sending it client request. What would be the simplestmonitor template to use?
A. TCP
B. ICMP
C. HTTP
D. BIGIP
E. SNMP
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which of the following statements are correct regarding positive and negative securitymodels? (Choose 2)
A. Positive security model allows all transactions by default
B. Negative security model denies all transactions by default
C. Negative security model allows all transactions by default and rejects only transactionsthat contain attacks
D. Positive security model denies all transactions by default and uses rules that allow onlythose transactions that are considered safe and valid
عرض الإجابة
اجابة صحيحة: CDE
السؤال #4
GTM can sign a DNS response using DNSSEC only if the DNS request ...
A. Has the S-bit set
B. Is a part of a DNSSEC zone
C. Is for a Wide-IP name on the GTM
D. Is answered by BIND running on the GTM
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Flow login allows for more granular protection of login and logout URLs within webapplications. Which of the following are components of flow login? (Choose 3)
A. Schema
B. Login URLs
C. Login pages
D. Attack signatures
E. Access validation
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which three must be done so that Generic Host Servers can be monitored using SNMP?(Choose three.)
A. The SNMP monitor must be added to all BIG-IP Systems
B. The Generic Host Server must be running the big3d agent
C. The GTM System must be configured for the appropriate MIB
D. The Generic Host Server must be added to the GTM Configuration
E. The Generic Host Server must be enabled to answer SNMP queries
عرض الإجابة
اجابة صحيحة: CD
السؤال #7
The BIG-IP ASM System is configured with a virtual server that contains an HTTP classprofile and the protected pool members are associated within the HTTP class profile pooldefinition. The status of this virtual server is unknown (Blue). Which of the followingconditions will make this virtual server become available (Green)?
A. Assign a successful monitor to the virtual server
B. Assign a successful monitor to the members of the HTTP class profile pool
C. Associate a fallback host to the virtual server and assign a successful monitor to thefallback host
D. Associate a default pool to the virtual server and assign a successful monitor to the poolmembers
عرض الإجابة
اجابة صحيحة: ADE
السؤال #8
Which of the following are correct regarding Wildcard entities? (Choose 2)
A. Wildcard entities are the basis for positive security logic
B. Wildcard entities are the basis for negative security logic
C. Wildcard entities require the need to learn only from violations
D. Wildcard entities can be applied to file types, URLs, cookies and parameters
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A GTM System performs a name resolution that is not a Wide-IP. The name is in a domainfor which the GTM System is authoritative. Where does the information come from?
A. It comes from BIND database (zone) files on the GTM System
B. GTM System cannot resolve a host name that is not a Wide-IP
C. It comes from the database of previously cached name resolutions
D. It comes from a zone transfer initiated when the request was received
عرض الإجابة
اجابة صحيحة: B
السؤال #10
When configuring monitors for individual pool members, which three options can beselected? (Choose three.)
A. Inherit the pool's monitor
B. Choose a default monitor
C. Inherit the Wide-IP's monitor
D. Assign a monitor to the specific pool member
E. Do not assign any monitor to the specific pool member
عرض الإجابة
اجابة صحيحة: B
السؤال #11
When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
How do you support non-intelligent DNS resolution in an environment with GTM Systemsand standard DNS servers? (Choose two.)
A. The GTM System must be a secondary server in all of your zones
B. Your GTM System must delegate some DNS names to the DNS Servers
C. Your DNS servers may delegate some DNS names to the GTM Systems
D. The GTM System may have a Listener set for your DNS server's address
E. The GTM System may have a Listener set for the GTM's loopback address
عرض الإجابة
اجابة صحيحة: AB
السؤال #13
Which events are valid iRule events triggered by BIG-IP ASM processing? (Choose 2)
A. ASM_REQUEST_BLOCKING
B. ASM_REQUEST_ACCEPTED
C. ASM_REQUEST_VIOLATION
D. ASM_RESPONSE_BLOCKING
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Learning suggestions in the Policy Building pages allow for which of the following? (Choose2)
A. XML-based parameters and associated schema are automatically learned
B. Blocking response pages can be automatically generated from web site content
C. Flow level parameters are displayed when found and can be accepted into the currentpolicy
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or blockdetected violations
E. Maximum acceptable values for length violations are calculated and can be accepted intothe security policy by the administrator
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which two ports must be enabled to establish communication between GTM Systems andother BIG IP Systems? (Choose two.)
A. 22
B. 53
C. 443
D. 4353
E. 4354
عرض الإجابة
اجابة صحيحة: BDF
السؤال #16
Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)
A. LB_FAILED
B. DNS_REQUEST
C. HTTP REQUEST
D. CLIENT_ACCEPTED
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which two must be included in a Wide-lP definition for the Wide-lP to resolve a DNS query? (Choose two.)
A. a name
B. a monitor
C. a load balancing method
D. one or more virtual servers
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following does not pertain to protecting the Requested Resource (URI)element?
A. File type validation
B. URL name validation
C. Domain cookie validation
D. Attack signature validation
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
What is the advantage of specifying three load balancing methods when load balancingwithin pools?
A. Specifying three methods allows the GTM System to use all three methodssimultaneously
B. Specifying three methods allows the GTM System to choose the optimal method for eachname resolution
C. Specifying three methods allows the GTM System alternate methods if insufficient data isavailable for other methods
D. Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used too often
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: