DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

F5 101 Exam Success: Mock Tests & Study Resources, 101-Application Delivery Fundamentals | SPOTO

Achieve F5 101 exam success with SPOTO's mock tests and study resources. As the first step towards becoming a Certified F5 BIG-IP Administrator, the F5 101-Application Delivery Fundamentals exam validates your skills in managing Application Delivery Networks. Our comprehensive study materials include practice tests, exam dumps, sample questions, and exam materials, ensuring thorough preparation. Benefit from our exam simulator for realistic exam practice and readiness. SPOTO stands out with up-to-date and real exam questions, providing a competitive advantage. Successful completion of the exam acknowledges your ability to handle day-to-day ADN management. Trust SPOTO for reliable study resources and mock exams to excel in the F5 101 exam and advance your career in application delivery management.
Take other online exams

Question #1
Which statement describes a typical purpose of iRules?
A. iRules can be used to add individual control characters to an HTTP data stream
B. iRules can be used to update the timers on monitors as a server load changes
C. iRules can examine a server response and remove it from a pool if the response is unexpectediRules can examine a server? response and remove it from a pool if the response is unexpected
D. iRules can be used to look at client requests and server responses to choose a pool member to select for load balancing
View answer
Correct Answer: A

View The Updated F5 101 Exam Questions

SPOTO Provides 100% Real F5 101 Exam Questions for You to Pass Your F5 101 Exam!

Question #2
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If a client were to initiate traffic to the NAT address, what changes, if any, would take place when the BIG-IP processes such packets?
A. The source address would not change, but the destination address would be translated to the origin address
B. The destination address would not change, but the source address would be translated to the origin address
C. The source address would not change, but the destination address would be translated to the NAT's address
D. The destination address would not change, but the source address would be translated to the NAT's address
View answer
Correct Answer: D
Question #3
A web client accesses a web application using what protocol?
A. TCP
B. XML
C. HTML
D. HTTP
View answer
Correct Answer: B
Question #4
Which two statements are true about SNATs? (Choose two.)
A. SNATs are enabled on all VLANs, by default
B. SNATs can be configured within a Profile definition
C. SNATs can be configured within a Virtual Server definition
D. SNAT's are enabled only on the VLAN where origin traffic arrives, by default
View answer
Correct Answer: A
Question #5
A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it: when HTTP_REQUEST { if { [HTTP::header User-Agent] contains "MSIE" } { pool MSIE_pool } else { pool Mozilla_pool } If a user connects to http://10.10.1.100/foo.html and their browser does not specify a User-Agent, which pool will receive the request?
A. MSIE_pool
B. Mozilla_pool
C. None
D. Unknown
View answer
Correct Answer: C
Question #6
Which of the following methods of protection are used by BIG-IP ASM to mitigate buffer overflow attacks?
A. HTTP RFC compliancy check
B. Length restrictions and attack signatures
C. Length restrictions and meta character enforcement
D. Meta character enforcement and HTTP RFC compliancy check
View answer
Correct Answer: AB
Question #7
Which of the following methods of protection are used by the BIG-IP ASM System tomitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check
View answer
Correct Answer: D
Question #8
Which statement is true concerning cookie persistence?
A. Cookie persistence allows persistence independent of IP addresses
B. Cookie persistence allows persistence even if the data are encrypted from client to pool member
C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text
D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system
View answer
Correct Answer: D
Question #9
Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the pool members?
A. No SSL certificates are required on the pool members
B. The pool members?SSL certificates must only exist
C. The pool members?SSL certificates must be issued from a certificate authority
D. The pool members?SSL certificates must be created within the company hosting the BIG-IPs
View answer
Correct Answer: B
Question #10
A site has six members in a pool. All of the servers have been designed, built, and configuredwith the sameapplications. It is known that each client's interactions vary significantly and can affect the performance of theservers. If traffic should be sent to all members on a regular basis, which load- balancing mode is mosteffective if the goal is to maintain a relatively even load across all servers?
A. Ratio
B. Priority
C. Observed
D. Round Robin
View answer
Correct Answer: ACD
Question #11
How is persistence configured?
A. Persistence is an option within each pool's definition
B. Persistence is a profile type; an appropriate profile is created and associated with virtual server
C. Persistence is a global setting; once enabled, load-balancing choices are superceded by the persistence method that is specified
D. Persistence is an option for each pool member
View answer
Correct Answer: BD
Question #12
Assuming there are open connections through an active system's NAT and a fail-over occurs, by default, what happens to those connections?
A. All open connections will be lost
B. All open connections will be maintained
C. The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the connection establishment
D. Long-lived connections such as Telnet and FTP will be maintained while short-lived connections such as HTTP will be lost
E. All open connections are lost, but new connections are initiated by the newly active BIG-IP, resulting in minimal client downtime
View answer
Correct Answer: C
Question #13
Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)
A. Synchronization occurs via a TCP connection using ports 683 and 684
B. Connection mirroring data is shared via a TCP connection using port 1028
C. Persistence mirroring data is shared via a TCP connection using port 1028
D. Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled
View answer
Correct Answer: B
Question #14
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B,
B. Given the conditions shown in the above graphic, if a client with IP address 205
A. 172
B. 172
C. 172
D. 172
E. 172
View answer
Correct Answer: D
Question #15
Which two can be a part of a pool's definition? (Choose two.)
A. rule(s)
B. profile(s)
C. monitor(s)
D. persistence type
E. load-balancing mode
View answer
Correct Answer: B

View The Updated F5 Exam Questions

SPOTO Provides 100% Real F5 Exam Questions for You to Pass Your F5 Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: