DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

F5 101 Practice Tests & Real Exam Dumps 2024 Updated, 101-Application Delivery Fundamentals | SPOTO

Prepare effectively for the F5 101 exam with SPOTO's updated practice tests and real exam dumps. As the initial step towards Certified F5 BIG-IP Administrator status, this certification validates your skills in managing Application Delivery Networks. Our study materials include practice tests, exam dumps, sample questions, and exam materials, ensuring thorough preparation. Benefit from SPOTO's advantage of up-to-date and authentic exam content. Our exam simulator provides a realistic exam environment for effective exam practice. SPOTO's resources can help you pass the certification exam quickly, enabling you to demonstrate the skills required for day-to-day ADN management. Trust SPOTO for reliable study resources and exam success in the F5 101-Application Delivery Fundamentals exam.
Take other online exams

Question #1
Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used too often.
A. The IP address of the server must be added to the wideip
B. The IP address of the server must be added to the syslog-ng
C. The IP address of the server and valid userid/password combination must be added to thehosts
D. The IP address of the server and valid userid/password combination must be added to the syslog-ng
View answer
Correct Answer: C
Question #2
A GTM System would like to ensure that a given LTM System is reachable and iQuerycommunication is allowed prior to sending it client request. What would be the simplestmonitor template to use?
A. TCP
B. ICMP
C. HTTP
D. BIGIP
E. SNMP
View answer
Correct Answer: C
Question #3
Which of the following statements are correct regarding positive and negative securitymodels? (Choose 2)
A. Positive security model allows all transactions by default
B. Negative security model denies all transactions by default
C. Negative security model allows all transactions by default and rejects only transactionsthat contain attacks
D. Positive security model denies all transactions by default and uses rules that allow onlythose transactions that are considered safe and valid
View answer
Correct Answer: CDE
Question #4
GTM can sign a DNS response using DNSSEC only if the DNS request ...
A. Has the S-bit set
B. Is a part of a DNSSEC zone
C. Is for a Wide-IP name on the GTM
D. Is answered by BIND running on the GTM
View answer
Correct Answer: C
Question #5
Flow login allows for more granular protection of login and logout URLs within webapplications. Which of the following are components of flow login? (Choose 3)
A. Schema
B. Login URLs
C. Login pages
D. Attack signatures
E. Access validation
View answer
Correct Answer: C
Question #6
Which three must be done so that Generic Host Servers can be monitored using SNMP?(Choose three.)
A. The SNMP monitor must be added to all BIG-IP Systems
B. The Generic Host Server must be running the big3d agent
C. The GTM System must be configured for the appropriate MIB
D. The Generic Host Server must be added to the GTM Configuration
E. The Generic Host Server must be enabled to answer SNMP queries
View answer
Correct Answer: CD
Question #7
The BIG-IP ASM System is configured with a virtual server that contains an HTTP classprofile and the protected pool members are associated within the HTTP class profile pooldefinition. The status of this virtual server is unknown (Blue). Which of the followingconditions will make this virtual server become available (Green)?
A. Assign a successful monitor to the virtual server
B. Assign a successful monitor to the members of the HTTP class profile pool
C. Associate a fallback host to the virtual server and assign a successful monitor to thefallback host
D. Associate a default pool to the virtual server and assign a successful monitor to the poolmembers
View answer
Correct Answer: ADE
Question #8
Which of the following are correct regarding Wildcard entities? (Choose 2)
A. Wildcard entities are the basis for positive security logic
B. Wildcard entities are the basis for negative security logic
C. Wildcard entities require the need to learn only from violations
D. Wildcard entities can be applied to file types, URLs, cookies and parameters
View answer
Correct Answer: B
Question #9
A GTM System performs a name resolution that is not a Wide-IP. The name is in a domainfor which the GTM System is authoritative. Where does the information come from?
A. It comes from BIND database (zone) files on the GTM System
B. GTM System cannot resolve a host name that is not a Wide-IP
C. It comes from the database of previously cached name resolutions
D. It comes from a zone transfer initiated when the request was received
View answer
Correct Answer: B
Question #10
When configuring monitors for individual pool members, which three options can beselected? (Choose three.)
A. Inherit the pool's monitor
B. Choose a default monitor
C. Inherit the Wide-IP's monitor
D. Assign a monitor to the specific pool member
E. Do not assign any monitor to the specific pool member
View answer
Correct Answer: B
Question #11
When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
View answer
Correct Answer: AC
Question #12
How do you support non-intelligent DNS resolution in an environment with GTM Systemsand standard DNS servers? (Choose two.)
A. The GTM System must be a secondary server in all of your zones
B. Your GTM System must delegate some DNS names to the DNS Servers
C. Your DNS servers may delegate some DNS names to the GTM Systems
D. The GTM System may have a Listener set for your DNS server's address
E. The GTM System may have a Listener set for the GTM's loopback address
View answer
Correct Answer: AB
Question #13
Which events are valid iRule events triggered by BIG-IP ASM processing? (Choose 2)
A. ASM_REQUEST_BLOCKING
B. ASM_REQUEST_ACCEPTED
C. ASM_REQUEST_VIOLATION
D. ASM_RESPONSE_BLOCKING
View answer
Correct Answer: B
Question #14
Learning suggestions in the Policy Building pages allow for which of the following? (Choose2)
A. XML-based parameters and associated schema are automatically learned
B. Blocking response pages can be automatically generated from web site content
C. Flow level parameters are displayed when found and can be accepted into the currentpolicy
D. The administrator may modify whether the BIG-IP ASM System will learn, alarm, or blockdetected violations
E. Maximum acceptable values for length violations are calculated and can be accepted intothe security policy by the administrator
View answer
Correct Answer: B
Question #15
Which two ports must be enabled to establish communication between GTM Systems andother BIG IP Systems? (Choose two.)
A. 22
B. 53
C. 443
D. 4353
E. 4354
View answer
Correct Answer: BDF
Question #16
Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)
A. LB_FAILED
B. DNS_REQUEST
C. HTTP REQUEST
D. CLIENT_ACCEPTED
View answer
Correct Answer: B
Question #17
Which two must be included in a Wide-lP definition for the Wide-lP to resolve a DNS query? (Choose two.)
A. a name
B. a monitor
C. a load balancing method
D. one or more virtual servers
View answer
Correct Answer: D
Question #18
Which of the following does not pertain to protecting the Requested Resource (URI)element?
A. File type validation
B. URL name validation
C. Domain cookie validation
D. Attack signature validation
View answer
Correct Answer: AD
Question #19
What is the advantage of specifying three load balancing methods when load balancingwithin pools?
A. Specifying three methods allows the GTM System to use all three methodssimultaneously
B. Specifying three methods allows the GTM System to choose the optimal method for eachname resolution
C. Specifying three methods allows the GTM System alternate methods if insufficient data isavailable for other methods
D. Specifying three methods allows the GTM System to rotate between the three methods sothat no one method is used too often
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: