DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Comprehensive F5 101 Exam Practice Questions & Answers, 101-Application Delivery Fundamentals | SPOTO

Delve into comprehensive F5 101 Exam Practice Questions & Answers with SPOTO. As the initial step towards becoming a Certified F5 BIG-IP Administrator, the F5 101-Application Delivery Fundamentals exam validates your proficiency in managing Application Delivery Networks (ADNs) effectively. SPOTO offers a wide array of resources including practice tests, exam dumps, sample questions, and free quizzes to enhance your preparation. Access expertly curated exam materials and exam simulators for thorough practice and mastery of exam topics. With a focus on exam questions and answers, SPOTO ensures you're well-prepared to ace the 101 exam. Elevate your exam practice and boost your confidence with SPOTO's comprehensive resources tailored for success in the F5 101 exam and beyond.

Take other online exams

Question #1
Which of the following is correct regarding User-defined Attack signatures?
A. User-defined signatures use an F5-supplied syntax
B. User-defined signatures may only use regular expressions
C. Attack signatures may be grouped within system-supplied signatures
D. User-defined signatures may not be applied globally within the entire policy
View answer
Correct Answer: AD

View The Updated F5 101 Exam Questions

SPOTO Provides 100% Real F5 101 Exam Questions for You to Pass Your F5 101 Exam!

Question #2
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it: when CLIENT_ACCEPTED { if {[TCP::local_port] equals 21 } { pool ftppool } elseif {[TCP::local_port] equals 23 } { pool telnetpool } If a user connects to 10.10.1.100 and port 22, which pool will receive the request?
A. ftppool
B. telnetpool
C. None
D. Unknown
View answer
Correct Answer: A
Question #3
Which of the following storage type combinations are configurable in an ASM loggingprofile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server
View answer
Correct Answer: D
Question #4
Which of the following methods of protection operates on server responses?
A. Dynamic parameter protection
B. Response code validation and response scrubbing
C. Response code validation and HTTP method validation
D. HTTP RFC compliancy check and meta-character enforcement
View answer
Correct Answer: C
Question #5
Which of the following methods of protection is not available within the Protocol SecurityManager for HTTP traffic?
A. Data guard B
C. Evasion techniques
D. File type enforcement
View answer
Correct Answer: BCE
Question #6
When building a policy based on live traffic using the automated policy builder, which of thefollowing elements will not be taken into account when analyzing the traffic?
A. The size of the response
B. The requested resource (URI)
C. The response code from the web server
D. The parameter values of static based parameters
View answer
Correct Answer: B
Question #7
Which method of protection is not provided by the Rapid Deployment policy template?
A. Data leakage
B. Buffer overflow
C. HTTP protocol compliance
D. Dynamic parameter validation
View answer
Correct Answer: BC
Question #8
Which events are valid iRule events triggered by BIG-IP ASM processing? (Choose 2)
A. ASM_REQUEST_BLOCKING
B. ASM_REQUEST_ACCEPTED C
D. ASM_RESPONSE_BLOCKING
View answer
Correct Answer: B
Question #9
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
A. The BIG-IP would drop the request since the traffic didn arrive destined to the NAT address
B. The source address would not change, but the destination address would be changed to the NAT address
C. The source address would be changed to the NAT address and destination address would be left unchanged
D. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP
View answer
Correct Answer: ABC
Question #10
Tightening is a feature of which type of entity? A. Explicit URLs
B. Attack signatures
C. Flow login URLs
D. Wildcard parameters
View answer
Correct Answer: AC
Question #11
Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server? A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
B. Terminating SSL at the BIG-IP eliminates all un-encrypted traffic from the nternal?network
C. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority
D. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network
View answer
Correct Answer: A
Question #12
Which of the following is not a configurable parameter data type?
A. Email
B. Array C
D. Decimal
View answer
Correct Answer: D
Question #13
A web client accesses a web application using what protocol? A. TCP
B. XML
C. HTML
D. HTTP
View answer
Correct Answer: B
Question #14
Which of the following are properties of an ASM logging profile? (Choose 2)
A. storage type
B. storage filter
C. storage policy D
View answer
Correct Answer: C
Question #15
A virtual server is defined using a source-address based persistence profile. The last five connections were A, B, C, A,
C. Given the conditions shown in the graphic, if a client with IP address 205
B. 10
C. 10
D. 10
E. 10
View answer
Correct Answer: B
Question #16
Which of the following is not a method of protection for user-input parameters?
A. Value extraction
B. Attack signatures
C. Length restriction
D. Meta character enforcement
View answer
Correct Answer: D
Question #17
Which of the following methods of protection are used by the BIG-IP ASM System tomitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check
View answer
Correct Answer: D
Question #18
Which of the following does not pertain to protecting the Requested Resource (URI)element?
A. File type validation
B. URL name validation
C. Domain cookie validation
D. Attack signature validation
View answer
Correct Answer: ADE
Question #19
Which cookie persistence method requires the fewest configuration changes on the web servers to be implemented correctly?
A. insert
B. rewrite
C. passive
D. session
View answer
Correct Answer: B
Question #20
There are many user roles configurable on the BIG-IP ASM System. Which of the followinguser roles have access to make changes to ASM policies? (Choose 3)
A. Guest
B. Operator
C. Administrator
D. Web Application Security Editor
E. Web Application Security Administrator
View answer
Correct Answer: D
Question #21
The BIG-IP ASM System sets two types of cookies to enforce elements in the securitypolicy. The two types are main and frame cookies. What is the purpose of the frame cookie?(Choose 2)
A. Validates domain cookies B
C. Stores dynamic parameters and values
D. Handles dynamic parameter names and flow extractions
View answer
Correct Answer: B
Question #22
Logging profiles are assigned to?
A. HTTP class
B. Security policies
C. Web applications
D. Attack signatures
View answer
Correct Answer: B

View The Updated F5 Exam Questions

SPOTO Provides 100% Real F5 Exam Questions for You to Pass Your F5 Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: