DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Best F5 101 Practice Questions and Exam Preparation Resources, 101-Application Delivery Fundamentals | SPOTO

Prepare for success in the F5 101 Certification Exam with SPOTO's premier practice questions and exam preparation resources. As the initial step toward attaining Certified F5 BIG-IP Administrator status, the F5 101-Application Delivery Fundamentals exam validates your expertise in efficiently managing Application Delivery Networks (ADNs). SPOTO offers a comprehensive range of resources, including practice tests, exam dumps, and sample questions, meticulously crafted to enhance your skills and knowledge. Access free quizzes and online exam questions to assess your readiness and boost confidence levels. Dive into SPOTO's extensive exam materials and exam simulators for thorough preparation and mastery of exam topics. Elevate your exam practice with SPOTO's emphasis on exam questions and answers, ensuring you're well-prepared to excel in the 101 exam and beyond.
Take other online exams

Question #1
Which twoof the following LTM load balancing methods require the least amount of resources?
A. Round robin
B. Ratio
C. Observed
D. Fastest
E. Predictive
F. Least connections
View answer
Correct Answer: AB
Question #2
The APM Dashboard enables administrators to monitor which two of these metrics?
A. Number of active sessions
B. Number of new sessions
C. Number of denied users
D. Number of users from each country
View answer
Correct Answer: A
Question #3
True or false, In order to improve GTM performance, administrators should use multiple complex monitors to ensure resources are functioning properly
A. True
B. False
View answer
Correct Answer: DEF
Question #4
True or false? TCP Express enables LTM to use different TCP settings for the connection between the client and LTM, and the connection between LTM and the pool member.
A. True
B. False
View answer
Correct Answer: A
Question #5
True or false? Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing interruptions.
A. True
B. False
View answer
Correct Answer: ACE
Question #6
What are the two most common methods of placing a BIG-IP device into a network environment?
A. VLAN configuration
B. Asymmetric configuration
C. SNAT configuration
D. Routed configuration
E. NAT configuration
F. Channeled configuration
View answer
Correct Answer: DEF
Question #7
ASM's Web Scraping protection:
A. Is simple to configure
B. Cannot accommodate good scrapers
C. Will protect the site by blocking all requests
D. Is difficult to configure
View answer
Correct Answer: D
Question #8
True or false? Although APM can interoperate with LTM, it is unable to use iRules for advanced processing.
A. True
B. false
View answer
Correct Answer: AB
Question #9
Over the years, F5 has led the industry in which of the four following areas?
A. Security
B. Acceleration
C. Application availability
D. Application scalability
E. Application design
F. Remote access
View answer
Correct Answer: ABD
Question #10
True or false? Similar to LTM monitors, GTM monitors use both an Intervaland aTimeoutvalue.
A. True
B. False
C.
D.
View answer
Correct Answer: B
Question #11
Which three of these file types work well with HTTP compression?
A. MP4 videos
B. Digital photos
C. Text files
D. Static HTML Web pages
E. CD quality songs
F. Microsoft Word documents
View answer
Correct Answer: CDF
Question #12
When an administrator creates a new access policy in the Visual Policy Editor, whichthreeoptions are included by default?
A. A fallback option
B. An Allow Ad box
C. A Deny End box
D. An empty Resource Assign item
E. A Start box
F. A Block All option
View answer
Correct Answer: A
Question #13
True or false? Organizations rnoving towards a cloud solution are good candidates for F5 WOM solutions.
A. True
B. False
View answer
Correct Answer: BCE
Question #14
Requests that do not meet the ASM security policies can:
A. Generate learning suggestions
B. Be blocked
C. All of the above
D. Be logged
View answer
Correct Answer: A
Question #15
APM provides access control lists at which two 051 layers
A. Layer 6
B. Layer 5
C. Layer 7
D. Layer 4
E. Layer 3
F. Layer 2
View answer
Correct Answer: B
Question #16
The Rapid Deployment Policy is used to:
A. Improve web site performance
B. Quickly protect web sites for most common attacks
C. Improve ASM performance
D. Provide wizard functionality for quick policy creation
View answer
Correct Answer: CEF
Question #17
Which three of the metrics listed below can GTM use when making load balancing decisions for a client?
A. TCP payload
B. IP geolocation
C. Hop count
D. Round trip time
E. Browser user agent
View answer
Correct Answer: B
Question #18
True or false? Application templates save the time it typically takes to create nodes, pools, pool members, virtual servers, and monitors.
A. True
B. False
View answer
Correct Answer: B
Question #19
WebAccelerator uses threetiers to improve performance. What are the threetiers?
A. Bandwidth offload
B. Client offload
C. Application offload
D. Protocol offload
E. Web server offload
F. Network offload
View answer
Correct Answer: B
Question #20
Match each persistence method with the correct statement describing it:
A. Cookie persistence
B. Source address persistence
C. SSL persistence
D. Universal persistence Build List and Reorder:
View answer
Correct Answer: S
Question #21
Which threeof the following are benefits of adding WebAccelerator to the network infrastructure?
A. It adds a layer , security to a Web site
B. It speeds up a secure Web site
C. It reduces the need to purchase additional bandwidth
D. It analyzes Web content, and caches and compresses it accordingly
E. It improves the performance , large object file transfers
View answer
Correct Answer: D
Question #22
Which of the following TMOS feature enables BIG-IP to scale performance based to the available CPU cores?
A. Clustered multi-processing
B. OneConnect
C. HTTP class
D. Session persistence
E. Auto Last Hop
View answer
Correct Answer: A
Question #23
Which threeof these software modules can you layer on top of LTM on a BIG-IP device?
A. Enterprise Manage
B. ARX
C. APM
D. FirePass
E. Web Accelerator
F. GTM
View answer
Correct Answer: CEF
Question #24
Application trends and drivers that increase the need for application security are
A. Intelligent Browsers
B. Webification
C. Targeted attacks
D. All the above
View answer
Correct Answer: BD
Question #25
ASM can detect Layer 7 DoS attacks by whichfourways of monitoring:
A. Monitoring for a threshold of increased number of transactions per second per URL
B. Monitoring for a % change in transactions per second per URL
C. Monitoring for a % change in server latency or TPS
D. Monitoring for a threshold of increased server latency or TPS
E. Monitoring ASM policy builder performance
F. Monitoring BIG-IP CPU utilization
G. Deep Packet inspection
View answer
Correct Answer: A
Question #26
True or false? When using a single BIG-IP with APM, an organization can support up to 60,000 concurrent remote access users.
A. True
B. False
View answer
Correct Answer: D
Question #27
When using a routed configuration, the real server must point to the LTM as the.........
A. Default gateway
B. Virtual IP
C. DNS server
D. NTP server
E. WINS server
View answer
Correct Answer: E
Question #28
True or False? Information leakage is a major obstacle to achieving PCI DSS compliance.
A. True
B. False
View answer
Correct Answer: A
Question #29
An LTM object that represents a downstream server contains the IP address 192.168.9.250 and no port. What is this object?
A. Pool member
B. Virtual server
C. Pool
D. Self IP
E. Node
View answer
Correct Answer: BCD
Question #30
Which of the following are thethreemain business drivers for placing LTM into a network?
A. Secure the connection between WAN sites
B. Authenticate and authorize users
C. Act as a Web application firewall
D. Include application security
E. Boost application performance
F. Improve application availability and scalability
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: