DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Dominate F5 101 Mock Tests & Study Materials, 101-Application Delivery Fundamentals | SPOTO

Elevate your preparation for the F5 101-Application Delivery Fundamentals exam with SPOTO's comprehensive mock tests and study materials. This certification is the cornerstone for achieving Certified F5 BIG-IP Administrator status, demonstrating your proficiency in managing Application Delivery Networks (ADNs) effectively. Our study materials encompass a range of resources, including exam dumps, exam questions and answers, sample questions, free quizzes, and exam materials, enabling you to strengthen your knowledge base. Dive into our mock tests for a realistic exam experience and enhance your exam readiness. With SPOTO's focus on exam practice, preparation, and exam simulator tools, you'll be well-equipped to dominate the F5 101 exam and excel in the management of ADNs.
Take other online exams

Question #1
Which of the following is NOT included on the F5 DevCentral site?
A. Subscription purchasing options
B. Actual iRules written by othercustomers
C. iRules reference materials
D. Forums
E. The F5 iRule editor
View answer
Correct Answer: A
Question #2
By default, BIG-IP ASM allows which of the following HTTP methods in a client request? (Choose three.)
A. PUT
B. GET
C. POST
D. HEAD
E. TRACE
View answer
Correct Answer: A
Question #3
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client, What is the name of this feature?
A. HTTP caching
B. OneConnect
C. TCP connection queuing
D. Content spooling
E. Priority activation
View answer
Correct Answer: D
Question #4
Customers can purchase LTM as a stand-alone product, or layer it with additional software modules to increase the functionality of the BIG-IP device.
A. True
B. False
View answer
Correct Answer: A
Question #5
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers,
A. True
B. False
View answer
Correct Answer: B
Question #6
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the_______. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
View answer
Correct Answer: A
Question #7
Another name for the F5 OneConnect feature is TCP multiplexing,
A. True
B. False
View answer
Correct Answer: A
Question #8
After editing and saving changes to the configuration file containing virtual servers, what is the immediate result?
A. The new configuration is verified and loaded
B. The new configuration is verified not loaded
C. The new configuration is verified
D. The new configuration is loaded but not verified
E. The new configuration is neither verified not loaded
F. The new configuration is verified and loaded if is it syntactically correct
View answer
Correct Answer: B
Question #9
GTM can load balance to LTM in addition to non-BIG-IP hosts
A. True
B. False
View answer
Correct Answer: A
Question #10
SIMULATION A________object maps a FQDN to virtual servers. (Fill in) Your Response: type here
A. "Wide IP"
View answer
Correct Answer: A
Question #11
Which three methods can be used for initial access to a BIG-IP system. (Choose three.)
A. CLI access to the serial console port
B. SSH access to the management port
C. SSH access to any of the switch ports
D. HTTP access to the management port
E. HTTP access to any of the switch ports
F. HTTPS access to the management port
G. HTTPS access to any of the switch ports
View answer
Correct Answer: B
Question #12
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM
A. True
B. False
View answer
Correct Answer: A
Question #13
TMOS is an F5 software module that runs on the BIG-IP platform,
A. True
B. False
View answer
Correct Answer: B
Question #14
The least connections load balancing method functions best when all pool members share similar characteristics
A. True
B. False
View answer
Correct Answer: A
Question #15
Which three of these software modules can you layer on top of LTM on a BIG-IP device?
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
View answer
Correct Answer: ABD
Question #16
Which four of the following statements about LDNS probes are true?
A. Only GTM devices can act as aprober
B. They check each requesting LDNS that has made a request of the GTM
C. They can determine available cache size on the client
D. They are used to develop path metrics
E. They verify the link between a data center and an LDNS
F. Probing only takesplace if GTM is configured to use dynamic load balancing
View answer
Correct Answer: BDEF
Question #17
SIMULATION The layer 3 security feature__________Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in) Your Response: type here
A. "contain / include"
View answer
Correct Answer: A
Question #18
SIMULATION GTM uses the F5_____protocol to synchronize performance metrics between GTMdevices. (Fill in) Your Response: type here
A. iQuery
View answer
Correct Answer: A
Question #19
APM provides access control lists at which two OSI layers?
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
View answer
Correct Answer: BC
Question #20
When using a routed configuration, the real server must point to the LTM as the
A. NTP Server
B. DNS Server
C. Virtual IP
D. WINS server
E. Default gateway
View answer
Correct Answer: E
Question #21
Which three of the following must be done in order for GTM to properly communicate LTM?
A. Connect the GTM and LTM with a network crossover cable
B. Synchronize the big3d versions between GTM and LTM
C. Add the LTM object to the GTM configuration
D. Configure theGTM and LTM to we MAC masquerading
E. Ensure that GTM and LTM use the same floating IP address
F. Exchange SSL certificates between the two devices
View answer
Correct Answer: BCF
Question #22
DNSSEC is a GTM add-on licensing feature.
A. True
B. False
View answer
Correct Answer: A
Question #23
Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin,
A. True
B. False
View answer
Correct Answer: A
Question #24
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM
B. Alltraffic through LTM is checked for DDoS attacks
C. No traffic A allowed through LTM until it has been specified
D. All users must authenticate before accessing applications through LTM
E. Only LAN administrators can access resources through LTM
View answer
Correct Answer: C
Question #25
What are the two most common methods of placing a BIG-IP device into a network environment?
A. Channeled configuration
B. VLAN configuration
C. NAT configuration
D. SNAT configuration
E. Asymmetric configuration
F. Routed configuration
View answer
Correct Answer: DF
Question #26
In the following request, which portion represents a parameter name?
A. Yes
B. User
C. Week1
D. Financials
View answer
Correct Answer: D
Question #27
Which four of the monitoring methods listed below can GTM use to determine the status and performance ofBIG-IP and servers?
A. ping
B. Application monitors
C. Inband monitors
D. SSH
E. iQuery
F. SNMP
View answer
Correct Answer: ABEF
Question #28
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality fromother devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides enhanced support for DNS servers
C. Establishes highly detailed policies based on your customer’s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
View answer
Correct Answer: D
Question #29
On a standalone BIG-IP ASM system, which of the following configuration is valid?
A. Pool named http_pool with 1 pool member, no persistence, and no load balancing method
B. Pool named http_pool with 3 pool members, cookie persistence, and ratio load balancing method
C. Pool named http_pool with 2 pool members, source IP persistence, and least connections load balancing method
D. Pool named http_pool with 3 pool members, cookie persistence, and least connections load balancing method
View answer
Correct Answer: C
Question #30
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request? Pool Member D
A. A
B. B
C. C
D. D
View answer
Correct Answer: B
Question #31
FastCache will NOT work with compressed objects.
A. True
B. False
View answer
Correct Answer: A
Question #32
LTM can only load balance outbound traffic by using iRules
A. True
B. False
View answer
Correct Answer: A
Question #33
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value,
A. True
B. False
View answer
Correct Answer: A
Question #34
The BIG-IP determines the lowest connection speed between the client and the server and then uses that for both connections
A. True
B. False
View answer
Correct Answer: B
Question #35
Which of the following is NOT a benefit of using SSL offload?
A. it increases thebandwidth between the client and LTM
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member
C. The organization requires far less SSL certificates
D. The CPU processing load on backend servers isreduced
E. It enables iRules to be used on traffic arriving to LTM that is encrypted
View answer
Correct Answer: A
Question #36
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria?
A. Port
B. HTTP header
C. URI path
D. User name
E. Protocol
F. Host name
View answer
Correct Answer: BCF
Question #37
Under what condition must an appliance license be reactivated?
A. Licenses only have to be reactivated for RMAs no other situations
B. Licenses generally have to be reactivated during system software upgrades
C. Licenses only have to be reactivated when new features are added (IPv6, Routing Modules, etc
D. Never
View answer
Correct Answer: CE
Question #38
LTM runs on________F5's proprietary product platform. (Fill in the correct answer)
A. ARX
B. Firepass
C. Acopia
D. TMOS
View answer
Correct Answer: D
Question #39
When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose two.)
A. All client requests
B. All server responses
C. Specific client requests
D. Specific server responses
View answer
Correct Answer: ABF
Question #40
Learning suggestions in the Policy Building pages allow for which of the following? (Choose two.)
A. XML-based parameters and associated schema are automatically learned
B. Blocking response pages can be automatically generated from web site content
C. Flow level parameters are displayed when found and can be accepted into the current policy
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or block detected violations
E. Maximum acceptable values for length violations are calculated and can be accepted into the security policy by the administrator
View answer
Correct Answer: E
Question #41
Which two of these statements about OneConnect are true?
A. It decreases the CPU load on LTM
B. It aggregates multiple clientconnections into a single server connection
C. It decreases the amount of traffic between multiple clients and LTM
D. It requires SNAT to be configured
E. It decreases the CPU load on pool members
View answer
Correct Answer: BE
Question #42
GTM solves which three of these standard DNS limitations?
A. It can verify that a host is available before resolving a host name for a client
B. It can use HTTPS for the connection between itself and the client
C. It can ensure that clients remain at the same data center for stateful applications
D. It can verify that a client does not have any viruses before sending the IP address
E. It has more complex load balancing methods
View answer
Correct Answer: ACE
Question #43
The Policy Builder benefits include;
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
View answer
Correct Answer: C
Question #44
To make complex access policies easier to manage, an administrator can create a__________containing several policy actions, and then add instances of it within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator
View answer
Correct Answer: A
Question #45
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
A. They want GTM to examine all DNS queries
B. They want GTM to make load balancing decisions based on metrics
C. They have data centers in several countries
D. They are using several operating systems for the local DNSservers
View answer
Correct Answer: C
Question #46
What happens when the data center that GTM recommends for a client is unavailable?
A. GTM uses cached information to determine an alternate route
B. GTM queries thelocal DNS server
C. GTM sends subsequent queries to the next preferred data center
D. GTM directs the client to use its DNS cache to select an alternate location
E. The client continues to attempt to access the preferred data center
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: