لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Although not all modules run on all platforms, each F5 hardware platform can run LTM plus at least one additional software module.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #2
When using SNAT, which additional IP addresses will the BIG-IP system change? (Choose two.)
A. The source IP address on the client to BIG-IP request packet
B. The source IP address on the BIG-IP to pool member request packet
C. The destination IP address on the BIG-IP to pool member request packet
D. The source IP address on the BIG-IP to client response packet
E. The destination IP address on the BIG-IP to client response packet
F. The destination IP address on the pool member to BIG-IP response packet
عرض الإجابة
اجابة صحيحة: BE
السؤال #3
Which is NOT a function of ASM?
A. Attack signature enforcement
B. HTTP protocol enforcement
C. Network security
D. Parameter value enforcement
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which two of the following factors are often responsible for poor Web application performance? (Choose two.)
A. The time it takes to generate an HTTP request
B. The time it takes to deliver the HTTP response over the network
C. The time it takes to display the HTTP response in the browser
D. The time it takes to generate the HTTP response
عرض الإجابة
اجابة صحيحة: BD
السؤال #5
Which three of the following are some of the methods that F5 uses with its environmental stress screening chamber? (Choose three.)
A. Varying the voltage from extreme high to extreme low
B. Running a product 300 to 500 times on each cycle
C. Repairing failed components until they function properly
D. Alternate temperature from -5 degrees Celsius to 60 degrees Celsius
E. Ensuring continual functioning through fire or flooding conditions
عرض الإجابة
اجابة صحيحة: ABD
السؤال #6
The ARX is like a mini network manager. It is able to check the health of the environment and can raise alerts when thresholds are reached.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #7
The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this capability. Select the features that the VPE provides. Select two.
A. Determines antivirus patch levels
B. Customizes landing or login page
C. Provides vulnerability scanning
D. Checks operating system patch levels
E. Assigns a lease pool address
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
When installing LTM on different VIPRION performance blades, each instance of LTM needs to be licensed separately.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Select F5 platforms have which three certifications? (Choose three.)
A. FIPS
B. SECG
C. NEBS
D. IEEE
E. Common Criteria
F. AFSSI
عرض الإجابة
اجابة صحيحة: ACE
السؤال #10
The F5 Application Delivery Firewall has the ability to outperform traditional and next generation firewalls during DDoS attacks by leveraging the performance and scalability of BIG-IP to hand extremely high loads, including high throughput, high connection count, and high number of connections per second.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #11
When a business is hacked, they often lose more than money. What are the other consequences to a business as a result of being hacked? Select two.
A. Helpful third party reviews of the security needs of the customer's web applications
B. Valuable free press that occurs as companies address hacking incidents
C. Penalties related to non-compliance with laws and regulations
D. Final resolution of all security vulnerabilities of the business' web applications
E. Loss of customers when slow connections drive customers to competitor's site
عرض الإجابة
اجابة صحيحة: AD
السؤال #12
What is the main business driver for bringing Enterprise Manager into the network infrastructure?
A. Consolidate management of administrator and user accounts
B. Consolidate management of licenses
C. Consolidate management of SSL certificates
D. Consolidate management of BIG-IP devices
E. Consolidate management of access policies
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which four of these statements regarding object size and WebAccelerator performance are true? (Choose four.)
A. Large objects such as video cache well
B. Large objects allow fewer requests per second
C. Large objects result in higher throughput
D. Small objects result in higher throughput
E. Small objects such as images cache well
F. Small objects allow more requests per second
عرض الإجابة
اجابة صحيحة: BCEF
السؤال #14
Select the best word or phrase to complete the following sentence. Using the _______ feature in GTM, F5's Application Delivery Firewall solution can handle a significantly higher number of queries than traditional DNS servers.
A. DNS Express
B. BIND
C. Site availability requestD
عرض الإجابة
اجابة صحيحة: A
السؤال #15
The VIPRION provides hot-pluggable capabilities for which four of these types of hardware? (Choose four.)
A. LCD displays
B. Fan trays
C. Memory
D. Power supplies
E. Performance blades
F. CompactFlash
عرض الإجابة
اجابة صحيحة: BCDE
السؤال #16
Using file virtualization, what can the ARX do for customers?
A. Match data to the most appropriate tier of storage (e
B. All of the above
C. Move individual files or entire file systems in real-time without disruption of down-time
D. Automate many storage management tasks such as storage tiering, dynamic capacity balancing, and no disruptive data migration
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which of the following is NOT a logging option within an APM access control entry?
A. Packet
B. Verbose
C. Nominal
D. Summary
E. None
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A customer says his business wouldn't benefit from buying ARX because it already has block based storage virtualization in place. Is he right? Why or why not?
A. Yes
B. No
C. Yes
D. No
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which of the following statements is true about ARX's capacity balancing ability?
A. When new files are created, the ARX can determine in real time where to place each file based on the available space on each storage device
B. When configuring the ARX, customers can choose to implement either an age-based policy or a capacity based policy, but are not able to run both policies at the same time
C. All files created at approximately the same time (within 10 minutes) will be stored on the same tier of storage to minimize latency and improve the user experience
D. The ARX balances capacity within tiers A storage, but cannot balance capacity across tiers of storage
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Administrators can specify an APM access profile when defining a virtual server in LTM.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which two of the following statements about how TMOS typically manages traffic between a client and server are accurate? (Choose two.)
A. It changes the destination address before forwarding a request to the server
B. It changes the destination address before sending a response to the client
C. It changes the source address before sending a response to the client
D. It changes the source address before forwarding a request to the server
عرض الإجابة
اجابة صحيحة: BD
السؤال #22
The ARX can see ________ when a data modification takes place and will cue that file to be migrated back to the primary tier.
A. In real time
B. Nightly
C. Weekly
D. At the time of a system scan
E. When scheduled by administrator
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Replicating a large database between sites could take several hours without WOM, and only several minutes with WOM.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which four are GTM server static load balancing modes? (Choose four.)
A. Return to DNS
B. CPU
C. Packet Rate
D. Drop Packet
E. Round RobinF
عرض الإجابة
اجابة صحيحة: ADEF
السؤال #25
Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?
A. Modular Functionality
B. iApps
C. TMOS
D. DevCentral
عرض الإجابة
اجابة صحيحة: D
السؤال #26
Which of the following business benefits does storage tiering offer to customers?
A. Reduces time for backups because data on the secondary tier can have a less time intensive backup policed applied to it
B. All of the above
C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data
D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage
عرض الإجابة
اجابة صحيحة: B
السؤال #27
All members of a pool must share the same service port?
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which three of these are the potential ending options for branches in the Visual Policy Editor? (Choose three.)
A. Reject
B. Fallback
C. Allow
D. Deny
E. Limit
F. Redirect
عرض الإجابة
اجابة صحيحة: CDF
السؤال #29
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP _______ service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
A. Edge Client
B. iRules
C. LTM
D. IP intelligence
E. iApps
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
A. An intrusion prevention system (IPS) is based on Packet Filtering
B. An IPS doesn't have the visibility into HTTPS traffic
C. An IPS only focus on operating system attacks; it doesn't understand what application are in the network
D. An IPS can only look at overall traffic patterns; it doesn't understand what applications are in the network
عرض الإجابة
اجابة صحيحة: D
السؤال #31
What is the main cause of high latency in a Web application?
A. The version, the client's browser
B. The distance between the client and Web server
C. The number of CPUs on the Web server
D. The size of the objects on the page
عرض الإجابة
اجابة صحيحة: B
السؤال #32
Select the two best questions you would use to ask your customer about their current web access management solution. Select two.
A. What impact are slow remote access connections having on productivity?
B. Are you using Google multi-factor authentication?
C. Is user authentication data sitting on partner systems outside your control?
D. Have you standardized on Androids or iPhones?
E. How are you planning to extend Exchange to your mobile users?
F. How do you think a global remote access deployment with integrated acceleration and availability services might benefit your business?
عرض الإجابة
اجابة صحيحة: AF
السؤال #33
To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #34
In most cases, F5 recommends using round robin load balancing.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #35
An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
A. The end user is unaware that the data has been moved to secondary tier storage and is able to access the data without difficulty
B. The networking mapping window appears, allowing the end user to re-establish direct access to the data even though it has been moved to secondary storage
C. An error message appears saying "File is no longer unavailable
D. A message appears explaining that the file has been archived, and a link to the new secondary storage tier location is provided
عرض الإجابة
اجابة صحيحة: A
السؤال #36
The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each file in order to more efficiently sort and store end user data.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #37
Application trends and drivers that increase the need for application security are:
A. Intelligent Browsers
B. Webification
C. Targeted attacks
D. All the above
عرض الإجابة
اجابة صحيحة: D
السؤال #38
WebAccelerator uses three tiers to improve performance. What are the three tiers? (Choose three.)
A. Bandwidth offload
B. Client offload
C. Application offload
D. Protocol offload
E. Web server offloadF
عرض الإجابة
اجابة صحيحة: CEF
السؤال #39
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
A. The BIG-IP would drop the request since the traffic didn’t arrive destined to the NAT address
B. The source address would not change, but the destination address would be changed to the NAT address
C. The source address would be changed to the NAT address and destination address would be left unchanged
D. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP
عرض الإجابة
اجابة صحيحة: C
السؤال #40
What technology does ARX use to create a logical abstraction of the physical storage environment?
A. Data de-duplication
B. File virtualization
C. Server virtualization
D. SSL encryption
عرض الإجابة
اجابة صحيحة: B
السؤال #41
Mobile device browsers typically display Web pages more slowly than PC browsers.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #42
How does the ARX eliminate the disruption caused by re-provisioning storage?
A. By identifying data that has not been modified and moving it to a secondary tier
B. By reducing the time necessary to run a complete backup
C. By allowing system administrators to apply policy to specific types data
D. By automating capacity balancing and allowing seamless introduction of file systems into the environment after the ARX is installed
عرض الإجابة
اجابة صحيحة: D
السؤال #43
ARX will detect any modification to a file on the second tier because all clients are being _______ by the ARX to get to the storage.
A. Moved
B. Copied
C. Proxied
D. Backed up
E. Deleted
عرض الإجابة
اجابة صحيحة: C
السؤال #44
Which four of these scenarios will benefit from F5's WAN Optimization Module? (Choose four.)
A. An international organization with data centers in different countries
B. An organization that does not want to rely on using tape backup
C. An organization with one site but hundreds of Web servers
D. An organization whose users create extremely large files
E. An organization that expects their Web site usage to double in the next year
F. An organization attempting to lower costs by reducing the number of data centers
عرض الإجابة
اجابة صحيحة: ABDF
السؤال #45
In order to ensure that a specific file type is never moved down to a secondary file tier, the administrator should:
A. Set up an automated bot that accesses that file once a week
B. This is not possible on the ARX
C. Set a policy that the file type remains on primary storage
D. Instruct the end users to put the file in a non-tiered directory
عرض الإجابة
اجابة صحيحة: C
السؤال #46
A site wishes to perform source address translation on packets arriving from the Internet for clients sing some pools but not others. The determination is not based on the client's IP address, but on the pool they are load balanced to. What could best accomplish this goal?
A. A SNAT for all addresses could be defined, and then disable the SNAT processing for select pools
B. The decision to perform source address translation is always based on VLAN
C. For each virtual server, regardless their default load balancing pools, association with SNAT pools could vary dependent upon need
D. The decision to perform source address translation is always based on a client's address (or network)
عرض الإجابة
اجابة صحيحة: A
السؤال #47
In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the DNS request?
A. It sends a broadcast request to all GTM devices
B. It uses iQuery to request the information from LTM
C. It sends a request to its configured backup GTM device
D. It sends an un-resolvable error to the client
E. It sends the request to an external DNS
عرض الإجابة
اجابة صحيحة: E
السؤال #48
Which two of the following statements are accurate descriptions of the ARX index? (Choose two.)
A. The ARX index stores the bulk of its data as bit arrays and answers most questions by performing bitwise logical operations on these bitmaps
B. The ARX index contains the index keys in sorted order, with the leaf level of the index containing the pointer to the page and the row number in the data page
C. The ARX index is the key enabler of transparent data mobility because the ARX tracks where files reside at all times, from creation through migration and deletion
D. The ARX index is 100% disposable and can be rebuilt at any point in time without disrupting client or application access to data
عرض الإجابة
اجابة صحيحة: BD
السؤال #49
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?
A. A
B. C
C. D
D. B
عرض الإجابة
اجابة صحيحة: D
السؤال #50
To function properly, an Enterprise Manager device is required within each data center.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #51
The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this capability. Select the features that the VPE provides. Select two.
A. Develop customized reports on user access
B. Customize landing or login pages
C. Establish highly detailed policies based on customer business requirements
D. Configure authentication server objects
E. Perform multiple factors of authentication
عرض الإجابة
اجابة صحيحة: CE
السؤال #52
________% of F5 products are sent through thorough software testing before being sold to customers.
A. 100
B. 50
C. 60
D. 80
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: