DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

2024 Updated F5 101 Exam Questions & Practice Tests, 101-Application Delivery Fundamentals | SPOTO

Unlock your pathway to success with F5 101 Practice Questions from SPOTO. As the initial step toward becoming a Certified F5 BIG-IP Administrator, the 101-Application Delivery Fundamentals exam validates your expertise in managing Application Delivery Networks (ADNs) effectively. Accessing practice tests, exam dumps, and sample questions is crucial for mastering exam topics. Utilize free quizzes and online exam questions to enhance your readiness and confidence. SPOTO provides comprehensive exam materials and exam simulators to facilitate thorough preparation. Enhance your exam practice and refine your skills with SPOTO's expertly crafted resources. Prepare efficiently and excel in the 101 exam with SPOTO's focus on exam questions and answers, exam practice, and mock exams, ensuring your success in achieving certification.
Take other online exams

Question #1
In a routed configuration, what does LTM do with the packet before sending it to the pool member?
A. Change the source IP and the destination IP address
B. Leave it unchanged and forward it
C. Change the source IP address
D. Change the destination IP address
View answer
Correct Answer: D
Question #2
In the following configuration, a virtual server has the following HTTP class configuration: HTTP Class 1 = Host pattern www.f5.com HTTP Class 2 = No filters A request arriving for WWW.F5.COM will be matched by which class(es)?
A. Class 1
B. Class 2
C. Both Class 1 and Class 2
D. The request will be dropped
View answer
Correct Answer: A
Question #3
Application templates save the time it typically takes to create nodes, pools, pool members, virtual servers, and monitors.
A. True
B. False
View answer
Correct Answer: A
Question #4
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP
View answer
Correct Answer: ABEF
Question #5
If the BIG-IP device is NOT always located between the client and the server, it will NOT provide full optimization and security.
A. True
B. False
View answer
Correct Answer: A
Question #6
Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)
A. An organization using Novell Netware for authentication
B. An organization that has been recently fined for failing security compliance
C. An organization with a traveling sales force
D. An organization with a single location and no remote employees
E. An organization that needs to ensure users are using Symantec antivirus software
F. An organization sharing a public Web site for all Internet users
View answer
Correct Answer: BCE
Question #7
When using a routed configuration, the real server must point to the LTM as the ________.
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway
View answer
Correct Answer: E
Question #8
Which of the following methods are used by the BIGIP ASM System to protect againstSQL injections?
A. HTTP RFC compliancy checks
B. Meta-character enforcement and attack signatures
C. HTTP RFC compliancy checks and length restrictions
D. Response scrubbing, HTTP RFC compliancy checks, and meta-character enforcement
View answer
Correct Answer: A
Question #9
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
View answer
Correct Answer: A
Question #10
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides enhanced support for DNS servers
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
View answer
Correct Answer: D
Question #11
The Policy Builder benefits include:
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
View answer
Correct Answer: C
Question #12
Which of the following is not a feature of a standalone BIG-IP ASM System?
A. Attack signatures
B. Multiple pool members
C. Positive security model
D. Real-time traffic policy builder
E. Pre-defined security policy templates
View answer
Correct Answer: B
Question #13
An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?
A. Self IP
B. Virtual Server
C. Pool
D. Node
E. Pool Member
View answer
Correct Answer: E
Question #14
In order to further accelerate applications, the external router can direct subsequent client traffic to bypass LTM and communicate directly with the server.
A. True
B. False
View answer
Correct Answer: B
Question #15
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
A. True
B. False
View answer
Correct Answer: A
Question #16
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
A. True
B. False
View answer
Correct Answer: B
Question #17
A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all other factors are equal and traffic should be sent to all members, which two load-balancing methods are most appropriate? (Choose two.)
A. Ratio
B. Priority
C. Observed
D. Round Robin
View answer
Correct Answer: C
Question #18
What is NOT a benefit of using a SNAT?
A. ASM can be deployed easily
B. No changes are needed on the servers
C. Fail open is easy to add
D. Higher performance than other configuration
View answer
Correct Answer: D
Question #19
Adding more RAM to a GTM device drastically improves query performance.
A. True
B. False
View answer
Correct Answer: B
Question #20
A failover event is recorded in the following log messages: Jan 01 00:56:56 BIG-IP notice mcpd[5318]: 01070727:5: Pool /Common/my-pool member /Common/10.0.0.10:80 monitor status down. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0045:5: Leaving active, group score 10 peer group score 20. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0052:5: Standby for traffic group /Common/traffic-group-1. Jan 01 00:56:56 BIG-IP notice sod[5855]: 010c0018:5: Standby Jan 01 00:57:06 BIG-IP notice logger: /usr/bin/tmipsecd --
A. The HA group score changed
B. No traffic is seen on traffic-group-1
C. The peer device left the traffic group
View answer
Correct Answer: ACD
Question #21
One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.
A. True
B. False
View answer
Correct Answer: A
Question #22
Which four F5 products are on the TMOS platform? (Choose four.)
A. ARX
B. GTM
C. WOM
D. APM
E. ASM
F. Firepass
View answer
Correct Answer: BCDE
Question #23
ASM offers the most extensive, effective, and simplest to configure CSRF protection in the WAF market.
A. True
B. False
View answer
Correct Answer: A
Question #24
Which of the following statements about Web server offload is NOT true?
A. It performs rate shaping to reduce overflow
B. It forces the client browser to use multiple connections streams
C. It uses OneConnect to reduce multiple TCP connections
D. It utilizes cached content to prevent unnecessary trips for the same content
E. It uses specialized hardware for SSL offload
View answer
Correct Answer: B
Question #25
CSRF is difficult to detect because:
A. The attacks are requests a user should be allowed to make
B. The attacks always utilize obfuscation
C. The attacks are always encrypted
D. All of the above
View answer
Correct Answer: A
Question #26
Which level of parameter assumes the highest precedence in BIG-IP ASM Systemprocessing logic?
A. Flow
B. Object
C. Global
D. URL
View answer
Correct Answer: AB
Question #27
Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention
B. Cross-site request forgery prevention
C. Web scraping attack prevention
D. Parameter tampering prevention
View answer
Correct Answer: BD
Question #28
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
View answer
Correct Answer: ABD
Question #29
Information leakage is a major obstacle to achieving PCI DSS compliance.
A. True
B. False
View answer
Correct Answer: A
Question #30
Which of the following is not a configurable parameter data type?
A. Email
B. Array
C. Binary
D. Decimal
View answer
Correct Answer: C
Question #31
IP Enforcer blocks IP addresses that have repeatedly and regularly attacked the site.
A. True
B. False
View answer
Correct Answer: A
Question #32
A network administrator tells you that they do NOT need WebAccelerator because their Web application is fine. What is your best response?
A. Challenge them to run performance testing on their Web site
B. Access their Web site with them to display its response
C. Request a follow up meeting within the next three months
D. Ask for an opportunity to speak with the CIO or a member of their Web application team
View answer
Correct Answer: D
Question #33
LTM can only load balance outbound traffic by using iRules
A. True
B. False
View answer
Correct Answer: A
Question #34
Which of the following is NOT a benefit of using SSL offload?
A. It increases the bandwidth between the client and LTM
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member
C. The organization requires far less SSL certificates
D. The CPU processing load on backend servers is reduced
E. It enables iRules to be used on traffic arriving to LTM that is encrypted
View answer
Correct Answer: A
Question #35
When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacity.
A. True
B. False
View answer
Correct Answer: B
Question #36
Which three of these file types work well with HTTP compression? (Choose three.)
A. MP4 videos
B. Digital photos
C. Text files
D. Static HTML Web pages
E. CD quality songs
F. Microsoft Word documents
View answer
Correct Answer: CDF
Question #37
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria? (Choose three.)
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name
View answer
Correct Answer: BCF
Question #38
What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration
View answer
Correct Answer: DF
Question #39
Which of the following statements about cookie persistence is NOT true?
A. The cookie's timeout value can be customized
B. They are F5'spreferred persistence method
C. No persistence information is placed on LTM
D. Web servers must be configured to send cookies to clients
E. They do not add a performance impact on LTM
View answer
Correct Answer: D
Question #40
A virtual server is defined using a source-address based persistence profile. The last five connections were A, B, C, A,
C. Given the conditions shown in the graphic, if a client with IP address 205
A. 10
B. 10
C. 10
D. 10
E. 10
View answer
Correct Answer: A
Question #41
GTM can load balance to LTM in addition to non-BIG-IP hosts.
A. True
B. False
View answer
Correct Answer: A
Question #42
When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Active scenario because this provides additional load balancing capabilities.
A. True
B. False
View answer
Correct Answer: B
Question #43
Which of the following is a client-side action in the Visual Policy Editor that prevents external access and deletes any files created during a secure access session?
A. Windows Group Policy
B. Resource Assign
C. Protected Workspace
D. Virtual Keyboard
E. Browser Cache and Session Control
View answer
Correct Answer: C
Question #44
Which of the following are four of the security benefits of TMOS? (Choose four.)
A. It verifies traffic based on antivirus signatures
B. It provides protection against DDoS
C. It uses SYN cookies and dynamic connection reapers
D. It supplies guidance for poorly developed applications
E. It denies all traffic that hasn't been defined
F. It can hide confidential information from outbound traffic
View answer
Correct Answer: BCEF
Question #45
Which of the following are four of the benefits of the TMOS architecture? (Choose four.)
A. User authentication
B. Server-side optimization
C. Dynamic DDoS protection
D. Web application security
E. Client-side optimization
F. Antivirus checking
View answer
Correct Answer: BCDE
Question #46
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
View answer
Correct Answer: BC
Question #47
An LTM device pair is configured for failover and connection mirroring. The LTM devices are configured with virtual servers for HTTP, HTTPS with SSL offload, and SSH. An event occurs that causes a failover. HTTP and SSH sessions active at the time of failover remain active, but HTTPS sessions are dropped. What is the root cause of this problem?
A. The SSL certificates on the LTM devices do NOT match
B. Connection mirroring is incompatible with clientssl profiles
C. SNAT automap was NOT enabled for the HTTPS virtual servers
D. Connection mirroring was NOT enabled for the HTTPS virtual servers
View answer
Correct Answer: C
Question #48
TCP Express is licensed separately from LTM
A. True
B. False
View answer
Correct Answer: B
Question #49
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation
View answer
Correct Answer: D
Question #50
Which of the following is NOT a profile type on the BIG-IP?
A. Protocol
B. Application
C. Persistence
D. Authentication
E. SSL
View answer
Correct Answer: B
Question #51
Which four of the following statements about LDNS probes are true? (Choose four.)
A. Only GTM devices can act as a prober
B. They check each requesting LDNS that has made a request of the GTM
C. They can determine available cache size on the client
D. They are used to develop path metrics
E. They verify the link between a data center and an LDNS
F. Probing only takes place if GTM is configured to use dynamic load balancing
View answer
Correct Answer: BDEF
Question #52
-- Exhibit -- Exhibit -- An LTM Specialist is reviewing the virtual server configuration on an LTM device. Which two actions should the LTM Specialist perform to minimize the virtual server configuration? (Choose two.)
A. Remove 'snat automap' from the virtual server
B. Remove the 'http' profile from the virtual server
C. Remove the 'default_class' from the virtual server
D. Combine 'acct_class' and 'marketing_class' into one class and update associations on the virtual server
E. Combine 'marketing_class' and 'default_class' into one class and update associations on the virtual server
View answer
Correct Answer: D
Question #53
The administrator must specify APM access control entries as either L4 or L7.
A. True
B. False
View answer
Correct Answer: B
Question #54
Which of the following are default settings when using the Policy Builder to build a securitypolicy based on the QA lab deployment scenario? (Choose 2)
A. All learned entities are placed in staging
B. Attack signatures are not placed in staging
C. The security policy is placed in blocking mode
D. Tightening is enabled only on file types and parameters
View answer
Correct Answer: CD
Question #55
Which two of these statements about OneConnect are true? (Choose two.)
A. It decreases the CPU load on LTM
B. It aggregates multiple client connections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members
View answer
Correct Answer: BE
Question #56
As a full TCP proxy, LTM acts as the termination point for both requests from the client and responses from the server.
A. True
B. False
View answer
Correct Answer: A
Question #57
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM
B. All traffic through LTM is checked for DDoS attacks
C. No traffic A allowed through LTM until it has been specified
D. All users must authenticate before accessing applications through LTM
E. Only LAN administrators can access resources through LTM
View answer
Correct Answer: C
Question #58
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries
B. They want GTM to make load balancing decisions based on metrics
C. They have data centers in several countries
D. They are using several operating systems for the local DNS servers
View answer
Correct Answer: C
Question #59
Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing interruptions.
A. True
B. False
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: