لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
ARX will detect any modification to a file on the second tier because all clients are being ...... by the ARX to get to the storage.
A. Moved
B. Copied
C. Proxied
D. Backed up
E. Deleted
عرض الإجابة
اجابة صحيحة: A
السؤال #2
True or false? TMOS is an F5 software module that runs on the BIG-IP platform.
A. True
B. False
عرض الإجابة
اجابة صحيحة: ABCE
السؤال #3
............% of F5 products are sent through thorough software testing before being sold to customers
A. 100
B. 50
C. 60
D. 80
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which threeof the following must be done in order for GTM to properly communicate LTM?
A. Ensure that GTM and LTM use the same floating IP address
B. Exchange SSL certificates between the two
C. Configure the GTM and LTM to use MAC masquerading
D. Connect the GTM and LTM with a network crossover cable
E. Synchronize the big3d versions between GTM and LTM
F. Add the LTM object to the GTM configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #5
APM can verify whichfourof the following details before granting a user access to a resource?
A. The user's Web brower
B. The user's computer
C. User's hard drive encryption software
D. Groups the user is a member of
E. The network speed
F. The user's username
عرض الإجابة
اجابة صحيحة: CDF
السؤال #6
True or False? Identifying users by their IP address is a sufficient method of performing authentication and authorization.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #7
True or false? All members of a pool must share the same service port?
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which is NOT a function of ASM:
A. Attack signature enforcement
B. HTTP protocol enforcement
C. Network security
D. Parameter value enforcement
عرض الإجابة
اجابة صحيحة: ACEF
السؤال #9
The VIPRION provides hot-pluggable capabilities for which four of these types of hardware?
A. LCD displays
B. Fan trays
C. Memory
D. Power supplies
E. Performance blades
F. CompactFlash
عرض الإجابة
اجابة صحيحة: EF
السؤال #10
Which item is NOTa function of a properly deployed and configured ASM?
A. Detects attacks
B. Stops hackers from attacking
C. Provides protection visibility
D. Provides security agility
عرض الإجابة
اجابة صحيحة: ABDF
السؤال #11
Match these terms with their description. A.Disaster recovery SLA B.Recovery point objective C.Recovery time objective Build List and Reorder:
Match these terms with their description. A
عرض الإجابة
اجابة صحيحة: ADEF
السؤال #12
True or false? To function properly, an Enterprise Manager device is required within each data center.
A. True
B. False
عرض الإجابة
اجابة صحيحة: ACE
السؤال #13
Which four of these statements regarding object size and WebAccelerator performance are true?
A. Large objects such as video cache well
B. Large objects allow fewer requests per second
C. Large objects result in higher throughput
D. Small objects result in higher throughput
E. Small objects such as images cache well
F. Small objects allow more requests per second
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which of the following statements is true about ARX's capacity balancing ability?
A. When new files are created, the ARX can determine in real time where to place each file based on the available space on each storage device
B. When configuring the ARX, customers can choose to implement either an age-based policy or a capacity-based policy, but are not able to run both policies at the same time
C. All files created a approximately the same time (within 10 minutes) will be stored on the same tier of storage to minimize latency and improve the user experience
D. The ARX balances capacity within tiers of storage, but cannot balance capacity across tiers of storage
عرض الإجابة
اجابة صحيحة: D
السؤال #15
True or false? The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each file in order to more efficiently sort and store end user data.
A. True
B. False
عرض الإجابة
اجابة صحيحة: C
السؤال #16
An age-based policy is set up on the ARX that retains only data modified in the Iast 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
A. The end user is unaware that the data has been moved to secondary tier storage and is able to access the data without difficulty
B. The networking mapping window appears, allowing the end user to re-establish direct access to the data even though it has been moved to secondary storage
C. An error message appears saying "File is no longer unavailable
D. A message appears explaining that the file has been archived, and a link to the new secondary storage tier location is provided
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which four of these benefits does APM provide?
A. Enables remote access by several thousand simultaneous users
B. Basic Web application firewall capabilities
C. User authentication based on identity
D. Acceleration of Web content to the client
E. Granular authorization to resources
F. Client workstation security checking
عرض الإجابة
اجابة صحيحة: A
السؤال #18
True or False? Network Security personnel are entirely responsible for web application security.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Using file virtualization, what can the ARX do for customers?
A. Match data to the most appropriate tier of storage (e
B. All of the above
C. Move individual files or entire file systems in real-time without disruption of down-time
D. Automate many storage management tasks such as storage tiering, dynamic capacity balancing, and non-disruptive data migration
عرض الإجابة
اجابة صحيحة: S
السؤال #20
True or false? Administrators can specify an APM access profile when defining a virtual server in LTM.
A. True
B. False
عرض الإجابة
اجابة صحيحة: ABC
السؤال #21
Using Fast Cache with ASM will:
A. Improve user experience
B. Improve server performance
C. All of the above
D. Improve BIG-IP ASM performance
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Which is NOTanASM protection method for cross site scripting:
A. Signatures
B. URl chacactsr set limiting
C. Token injection
D. Parameter character set limiting
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Which threeof the following are some of the methods that F5 uses with its environmental stress screening chamber?
A. Varying the voltage from extreme high to extreme low
B. Running a product 300 to 500 times on each cycle
C. Repairing failed components until they function properly
D. Alternate temperature from -5 degrees Celsius to 60 degrees Celsius
E. Ensuring continual functioning through fire or flooding conditions
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: