لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
For a typical business, what percentage of data does the ARX usually move to a secondary tier?
A. 20-30%
B. 50-60%
C. 80-90%
D. 0-10%
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following statements is true about ARX's capacity balancing ability?
A. When new files are created, the ARX can determine in real time where to place each file based on the available space on each storage device
B. When configuring the ARX, customers can choose to implement either an age-based policy or a capacity-based policy, but are not able to run both policies at the same time
C. All files created at approximately the same time (within 10 minutes) will be stored on the same tier of storage to minimize latency and improve the user experience
D. The ARX balances capacity within tiers A storage, but cannot balance capacity across tiers of storage
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Match the five elements of the intelligent file virtualization with the appropriate ARX feature.
A. Real Time
B. Non-Disruptive
C. Heterogeneous
D. Data Integrity
E. Scale and Performance Build List and Reorder:
عرض الإجابة
اجابة صحيحة: A
السؤال #4
It is common for free storage space to exist somewhere in a business network that is not easy for storage administrators to utilize. What solution can the ARX provide in this situation?
A. The ARX identifies the exact location of the free storage, which allows network administrators to target those locations when provisioning additional storage
B. The ARX extends the capacity of each server by 10-15, through intelligent file virtualization
C. The ARX uses the extra storage for transaction logs and index files
D. The ARX allows the customer to pool storage from anywhere within the enterprise and capacity balance the overflow across devices
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Place the following items in the order that the BIG-IP device uses when processing a packet. Build List and Reorder:
Place the following items in the order that the BIG-IP device uses when processing a packet. Build List and Reorder:
عرض الإجابة
اجابة صحيحة: A
السؤال #6
True or false? Another name for the F5 OneConnect feature is TCP multiplexing
A. True
B. False
عرض الإجابة
اجابة صحيحة: BC
السؤال #7
Which of the following isNOTa logging option within an APM access control entry?
A. Packet
B. Verbose
C. Nominal
D. Summary
E. None
عرض الإجابة
اجابة صحيحة: D
السؤال #8
ASM provides antivirus protection by:
A. Extracting files being uploaded and sending them to an AV system via ICAP
B. Running a local antivirus program on the BIG-IP
C. None of the above
D. Using IP Penalty enforcement to block requests from hackers IPs
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which of the following doesNOTdescribe network performance management?
A. Updating software on various devices
B. Seeing graphs in near real-time
C. Visibility into multiple network devices
D. Being alerted to an issue as it happens
E. Viewing virtual server statistics
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which item is NOTa function of ASM?
A. Provides authentication and authorization services
B. Logs and reports full HTTP messages
C. Provides comprehensive Web application security
D. Provides application level performance information
عرض الإجابة
اجابة صحيحة: ABDF
السؤال #11
In the next few years, 75% of new storage capacity will shift to unstructured data (also known as file data). Which two of the following are examples of unstructured data?
A. CAD drawings
B. Location data in a GIS (geographic information system)
C. Customer records and product records in a CRM (customer relationship management) database
D. Microsoft Office and PDF documents
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which WOM feature replaces a long byte pattern, such as "100000111000110101", with a shorter reference to the pattern?
A. Symmetric adaptive compression
B. Symmetric data deduplication
C. Bandwidth allocation
D. Application protocol acceleration
E. TCP optimization
عرض الإجابة
اجابة صحيحة: B
السؤال #13
How does the ARX eliminate the disruption caused by re-provisioning storage?
A. By identifying data that has not been modified and moving it to a secondary tier
B. By reducing the time necessary to run a complete backup
C. By allowing system administrators to apply policy to specific types , data
D. By automating capacity balancing and allowing seamless introduction of file systems into the environment after the ARX is installed
عرض الإجابة
اجابة صحيحة: ABE
السؤال #14
Which four are GTM server static load balancing modes?
A. Return to DNS
B. CPU
C. Packet Rate
D. Drop Packet
E. Round Robin
F. Static Persist
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Brute force protection will:
A. Block a user after a specified number , unsuccessful login attempts
B. Block a user after a specified number of page requests are attempted
C. None of the above
D. Block a user from downloading too much content from the site
عرض الإجابة
اجابة صحيحة: B
السؤال #16
True or false? Using IP Geolocation, an organization can always direct a client request from France to a data center in Dublin.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #17
What is NOTa benefit of using a SNAT?
A. ASM can be deployed easily
B. No changes are needed on the servers
C. Higher performance than other configurations
D. Fail open is easy to add
عرض الإجابة
اجابة صحيحة: B
السؤال #18
A customer says his business wouldn't benefit from buying ARX because it already has block based storage virtualization in place. Is he right? Why or why not?
A. Yes
B. No
C. Yes
D. No
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which threeof the following are benefits of adding WebAccelerator to the network infrastructure?
A. It speeds up a secure Web site
B. It reduces the need to purchase additional bandwidth
C. It analyzes Web content, and caches and compresses it accordingly
D. It adds a layer of security to a Web site
E. It improves the performance of large object file transfers
عرض الإجابة
اجابة صحيحة: A
السؤال #20
True or false? In most cases, F5 recommends using round robin load balancing.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #21
True or false? A user's access to resources can change based on the computer they connect from.
A. True
B. False
عرض الإجابة
اجابة صحيحة: C
السؤال #22
True or false? The Device Inventory option in Enterprise Manager can replace an organization's staticExcelspreadsheet containing similar data.
A. True
B. False
عرض الإجابة
اجابة صحيحة: C
السؤال #23
The ARX can see ..... when a data modification takes place and will cue that file to be migrated back to the primary tier.
A. In real time
B. Nightly
C. Weekly
D. At the time of a system scan
E. When scheduled by administrator
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which fourof these scenarios will benefit from F5's WAN Optimization Module?
A. An international organization with data centers in different countries
B. An organization that does not want to rely on using tape backup
C. An organization with one site but hundreds of Web servers
D. An organization whose users create extremely large files
E. Anorganization that expects their Web site usage to double in the next year
F. An organization attempting to lower costs by reducing the number of data centers
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Select F5 platforms have which three certifications?
A. FIPS
B. SECG
C. NEBS
D. IEEE
E. Common Criteria
F. AFSSI
عرض الإجابة
اجابة صحيحة: B
السؤال #26
Which two F5 platforms include specialized compression hardware?
A. 4200
B. 3900
C. 1600
D. 11050
E. 6900
F. 8900
عرض الإجابة
اجابة صحيحة: ABD
السؤال #27
An administrator is planning on solving latency issues by placing the backup data center in a neighboring city to the primary data center. Why isn't this an effective solution?
A. It does not provide an acceptable disaster recovery solution
B. It won't improve latency between the data centers
C. It won't improve the backup time from the primary data center to the backup data center
D. Users near the data centers will find their connections going back and forth between the two site
E. It costs more to have the data centers close together than further apart
عرض الإجابة
اجابة صحيحة: C
السؤال #28
In order to ensure that a specific file type is never moved down to a secondary file tier, the administrator should:
A. set up an automated bot that accesses that file once a week
B. This is not possible on the ARX
C. set a policy that the file type remains on primary storage
D. Instruct the end users to put the file in a non-tiered directory
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which three of these are the potential ending options for branches in the Visual Policy Editor?
A. Reject
B. Fallback
C. Allow
D. Deny
E. Limit
F. Redirect
عرض الإجابة
اجابة صحيحة: S
السؤال #30
An inline ASM configuration requires:
A. Two network connections
B. None of the above
C. Two disk drives
D. Two power supplies
عرض الإجابة
اجابة صحيحة: B
السؤال #31
True or False. The F5 Application Delivery Firewall has the ability to outperform traditional and next generation firewalls during DDoS attacks by leveraging the performance and scalability of BIG-IP to handle extremely high loads, including high throughput, high connection count, and high number of connections per second.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #32
True or False? WOM speeds up large file data transfer across the WAN between a Windows client and a Windows file Server.
A. True
B. False
عرض الإجابة
اجابة صحيحة: BCEF
السؤال #33
Which three are GTM server dynamic load balancing modes:
A. Packet Rate
B. Virtual Server Score
C. CPU
D. Fallback IP
E. Ratio
عرض الإجابة
اجابة صحيحة: E
السؤال #34
What is the main cause of high latency in a Web application?
A. The version , the client's browser
B. The distance between the client and Web server
C. The number of CPUs on the Web server
D. The size of the objects on the page
عرض الإجابة
اجابة صحيحة: ABC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: