DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Expert-Designed F5 101 Practice Tests 2024, 101-Application Delivery Fundamentals | SPOTO

Preparing for the F5 101-Application Delivery Fundamentals exam can be a daunting task, but with the right resources, it can be a smooth and successful journey. SPOTO's expert-designed F5 101 practice tests for 2024 offer a comprehensive and effective way to prepare for the certification exam. These practice tests are meticulously crafted by experienced professionals, ensuring that you receive accurate and up-to-date exam materials. SPOTO's practice tests cover a wide range of topics, including exam questions, sample questions, exam answers, and mock exams. These resources provide you with a realistic experience, mimicking the actual exam environment, allowing you to gauge your knowledge and identify areas that need further attention. With SPOTO's exam preparation materials, you can confidently approach the certification exam, armed with the necessary knowledge and skills.
Take other online exams

Question #1
Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5 professionals and customers?
A. Modular Functionality
B. iApps
C. TMOS
D. DevCentral
View answer
Correct Answer: A
Question #2
A monitor has been defined using the HTTP monitor template. The send and receive stringswere customized, but all other settings were left at their defaults. Which resources can themonitor be assigned to?
A. only specific pool members
B. most virtual severs
C. most nodes
D. most pools
View answer
Correct Answer: C
Question #3
ARX will detect any modification to a file on the second tier because all clients are being .......... by the ARX to get to the storage.
A. Deleted
B. Copied
C. Backed up
D. Proxied
E. Moved
View answer
Correct Answer: A
Question #4
If your customer has a policy requirement that cannot be handled in the Visual Policy Editor, what would you use to supplement the Visual Policy Editor?
A. iApps
B. TMOS
C. iControl
D. iRules
View answer
Correct Answer: S
Question #5
Basic F5 IP Geolocation provides whichfourtypes of client information?
A. State
B. Continent
C. Postal code
D. City
E. Carrier
F. Country
View answer
Correct Answer: B
Question #6
Match the security-related term with the correct definition. 1. Demilitarized zone (DMZ) 2. Denial of service (DoS) 3. DNS Express 4. DNS Security Extensions (DNSSEC) 5. Endpoint inspection Build List and Reorder:
View answer
Correct Answer: A
Question #7
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?
A. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses
B. provides
C. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels
D. Provides industry-leading knowledge of application behavior as it travels through a *3, network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply-request process
View answer
Correct Answer: D
Question #8
True or false? To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
A. True
B. False
View answer
Correct Answer: D
Question #9
A monitor has been defined using the HTTP monitor template. The send and receive stringswere customized, but all other settings were left at their defaults. Which resources can themonitor be assigned to?
A. Only specific pool members
B. Most virtual severs
C. Most nodes
D. Most pools
View answer
Correct Answer: D
Question #10
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
A. An intrusion prevention system (IPS) is base on Packet Filtering
B. An IPS doesn't have the visibility into HTTPS traffic
C. An IPS only focus op operating system attacks; it doesn't understand what application are in the network
D. An IPS can only look at overall traffic patterns; it doesn't understand what applications are in the network
View answer
Correct Answer: D
Question #11
What percentage of storage in a typical environment is actively used and modified?
A. 5%
B. 50%
C. 25%
D. 10%
E. 90%
View answer
Correct Answer: B
Question #12
Which twoof the following statements are accurate descriptions of the ARX index?
A. The ARX index stores the bulk of its data as bit arrays and answers most questions by performing bitwise logical operations on these bitmaps
B. The ARX index contains the index keys in sorted order, with the leaf level of the index containing the pointer to the page and the row number in the data page
C. The ARX index is the key enabler of transparent data mobility because the ARX tracks where files reside at all times, from creation through migration and deletion
D. The ARX index is 100% disposable and can be rebuilt at any point in time without disrupting client or application access to data
View answer
Correct Answer: D
Question #13
True or false? The production version of BIG-IP Virtual Edition is limited to 200 Mbps throughput.
A. True
B. False
View answer
Correct Answer: D
Question #14
True or false? When installing LTM on different VIPRION performance blades, each instance of LTM needs to be licensed separately.
A. True
B. False
View answer
Correct Answer: B
Question #15
When using SNAT, which additional IP addresses will the BIG-IP system change? Select two.
A. The source IP address on the client to BIG-IP request packet
B. The source IP address on the BIG-IP to pool member request packet
C. The destination IP address on the BIG-IP to pool member request packet
D. The source IP address on the BIG-IP to client response packet
E. The destination IP address on the BIG-IP to client response packet
F. The destination IP address on the pool member to BIG-IP response packet
View answer
Correct Answer: B
Question #16
Which of these statements about a stream profile is false?
A. It is applied to an HTTP class profile
B. It is not recommended for telnet traffic
C. It can replace one data string for another for all traffic going through a virtual server
D. It applies to both inbound and outbound traffic
E. It will not inspect HTTP headers when an HTTP profile is present
View answer
Correct Answer: BCDE
Question #17
Which two of the following statements about how TMOS typically manages traffic between a client and server are accurate?
A. It changes the destination address before forwarding a request to the server
B. It changes the destination address before sending a response to the client
C. It changes the source address before sending a response to the client
D. It changes the source address before forwarding a request to the server
View answer
Correct Answer: D
Question #18
Select the two best questions you would use to ask your customer about their currentweb access management solution. Select two.
A. What impact are slow remote access connections having on productivity?
B. Are you using Google multi-factor authentication?
C. Is user authentication data sitting on partner systems outside your control,
D. Have you standardized on Androids or iPhones?
E. How are you planning to extend Exchange to your mobile users?
F. How do you think a blobal remote access deployment with integrated acceleration and avaibility services might benefit your business?
View answer
Correct Answer: A
Question #19
True or False? Although not all modules run on all platforms, each F5 hardware platform can run LTM plus at least one additional software module.
A. True
B. False
View answer
Correct Answer: BD
Question #20
Select the key question you would use to ask your customer related to DNS attacks?
A. Do you over-provision your DNS infrastructure?
B. Do you regularly update BIND or some other DNS application to the latest release?
C. Do you rely on your network firewall to protect your DNS server?
D. How do you secure your DNS infrastructure against attacks?
View answer
Correct Answer: A
Question #21
When DNS_REV is used as the probe protocol by the GTM System, which information isexpected in the response from the probe?
A. A reverse name lookup of the GTM System
B. The list of root servers known by the local DNS
C. The FQDN of the local DNS being probed for metric information
D. The revision number of BIND running on the requesting DNS server
View answer
Correct Answer: D
Question #22
Which of the following business benefits does storage tiering offer to customers?
A. Reduces time for backups because data on the secondary tier can have a less time-intensive backup policed applied to it
B. All of the above
C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data
D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage
View answer
Correct Answer: AD
Question #23
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP.............. service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
A. Edge Client
B. iRules
C. LTM
D. IP intelligence
E. iApps
View answer
Correct Answer: BEF
Question #24
A customer wants the best possible throughput but only has a maximum of 3RU rack space. Which F5 platform should you recommend?
A. BIG-IP 11050
B. VIPRION with only 1 performance blade
C. BIG-IP 8950
D. BIG-IP 8900
E. VIPRION with 4 performance blades
View answer
Correct Answer: C
Question #25
Select the best word or phrase to complete the following sentence. Using the.............feature in GTM, F5's Application Delivery Firewall solution can handle a significantly higher number of queries than traditional DNS servers.
A. DNS Express
B. BIND
C. Site availability request
D. Location-based routing
View answer
Correct Answer: BE
Question #26
Even though F5 is an application delivery controller, it can also effectively mitigate attacks directed at the network layer.
A. True
B. False
View answer
Correct Answer: B
Question #27
Which two processes are involved when BIGIP systems issue traps? (Choose two.)
A. bigd
B. alertd
C. smtpd
D. sysloging
View answer
Correct Answer: BD
Question #28
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request
A. A
B. C
C. D
D. B
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: