DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare F5 101 Exam Questions & Practice Tests, 101-Application Delivery Fundamentals | SPOTO

Prepare F5 101 Exam Questions & Practice Tests with SPOTO to unlock your journey toward achieving Certified F5 BIG-IP Administrator status. The F5 101-Application Delivery Fundamentals exam marks the initial step in demonstrating proficiency in the daily management of Application Delivery Networks, a crucial skill set for IT professionals. SPOTO offers a comprehensive suite of resources designed to streamline your exam preparation process. Access practice tests, exam dumps, and real-world exam simulations to gain a deep understanding of F5 technologies. Our collection of sample questions, exam answers, and online exam materials ensures a well-rounded approach to exam readiness. With SPOTO's expertise, you can confidently tackle the F5 101 exam, hone your skills through exam practice, and enhance your overall exam preparation. Trust SPOTO to provide the tools and support needed to pass the certification exam quickly, empowering you to advance in your career within a short timeframe.

Take other online exams

Question #1
Although not all modules run on all platforms, each F5 hardware platform can run LTM plus at least one additional software module.
A. True
B. False
View answer
Correct Answer: A
Question #2
When using SNAT, which additional IP addresses will the BIG-IP system change? (Choose two.)
A. The source IP address on the client to BIG-IP request packet
B. The source IP address on the BIG-IP to pool member request packet
C. The destination IP address on the BIG-IP to pool member request packet
D. The source IP address on the BIG-IP to client response packet
E. The destination IP address on the BIG-IP to client response packet
F. The destination IP address on the pool member to BIG-IP response packet
View answer
Correct Answer: BE
Question #3
Which is NOT a function of ASM?
A. Attack signature enforcement
B. HTTP protocol enforcement
C. Network security
D. Parameter value enforcement
View answer
Correct Answer: C
Question #4
Which two of the following factors are often responsible for poor Web application performance? (Choose two.)
A. The time it takes to generate an HTTP request
B. The time it takes to deliver the HTTP response over the network
C. The time it takes to display the HTTP response in the browser
D. The time it takes to generate the HTTP response
View answer
Correct Answer: BD
Question #5
Which three of the following are some of the methods that F5 uses with its environmental stress screening chamber? (Choose three.)
A. Varying the voltage from extreme high to extreme low
B. Running a product 300 to 500 times on each cycle
C. Repairing failed components until they function properly
D. Alternate temperature from -5 degrees Celsius to 60 degrees Celsius
E. Ensuring continual functioning through fire or flooding conditions
View answer
Correct Answer: ABD
Question #6
The ARX is like a mini network manager. It is able to check the health of the environment and can raise alerts when thresholds are reached.
A. True
B. False
View answer
Correct Answer: A
Question #7
The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this capability. Select the features that the VPE provides. Select two.
A. Determines antivirus patch levels
B. Customizes landing or login page
C. Provides vulnerability scanning
D. Checks operating system patch levels
E. Assigns a lease pool address
View answer
Correct Answer: AD
Question #8
When installing LTM on different VIPRION performance blades, each instance of LTM needs to be licensed separately.
A. True
B. False
View answer
Correct Answer: B
Question #9
Select F5 platforms have which three certifications? (Choose three.)
A. FIPS
B. SECG
C. NEBS
D. IEEE
E. Common Criteria
F. AFSSI
View answer
Correct Answer: ACE
Question #10
The F5 Application Delivery Firewall has the ability to outperform traditional and next generation firewalls during DDoS attacks by leveraging the performance and scalability of BIG-IP to hand extremely high loads, including high throughput, high connection count, and high number of connections per second.
A. True
B. False
View answer
Correct Answer: A
Question #11
When a business is hacked, they often lose more than money. What are the other consequences to a business as a result of being hacked? Select two.
A. Helpful third party reviews of the security needs of the customer's web applications
B. Valuable free press that occurs as companies address hacking incidents
C. Penalties related to non-compliance with laws and regulations
D. Final resolution of all security vulnerabilities of the business' web applications
E. Loss of customers when slow connections drive customers to competitor's site
View answer
Correct Answer: AD
Question #12
What is the main business driver for bringing Enterprise Manager into the network infrastructure?
A. Consolidate management of administrator and user accounts
B. Consolidate management of licenses
C. Consolidate management of SSL certificates
D. Consolidate management of BIG-IP devices
E. Consolidate management of access policies
View answer
Correct Answer: D
Question #13
Which four of these statements regarding object size and WebAccelerator performance are true? (Choose four.)
A. Large objects such as video cache well
B. Large objects allow fewer requests per second
C. Large objects result in higher throughput
D. Small objects result in higher throughput
E. Small objects such as images cache well
F. Small objects allow more requests per second
View answer
Correct Answer: BCEF
Question #14
Select the best word or phrase to complete the following sentence. Using the _______ feature in GTM, F5's Application Delivery Firewall solution can handle a significantly higher number of queries than traditional DNS servers.
A. DNS Express
B. BIND
C. Site availability requestD
View answer
Correct Answer: A
Question #15
The VIPRION provides hot-pluggable capabilities for which four of these types of hardware? (Choose four.)
A. LCD displays
B. Fan trays
C. Memory
D. Power supplies
E. Performance blades
F. CompactFlash
View answer
Correct Answer: BCDE
Question #16
Using file virtualization, what can the ARX do for customers?
A. Match data to the most appropriate tier of storage (e
B. All of the above
C. Move individual files or entire file systems in real-time without disruption of down-time
D. Automate many storage management tasks such as storage tiering, dynamic capacity balancing, and no disruptive data migration
View answer
Correct Answer: B
Question #17
Which of the following is NOT a logging option within an APM access control entry?
A. Packet
B. Verbose
C. Nominal
D. Summary
E. None
View answer
Correct Answer: C
Question #18
A customer says his business wouldn't benefit from buying ARX because it already has block based storage virtualization in place. Is he right? Why or why not?
A. Yes
B. No
C. Yes
D. No
View answer
Correct Answer: D
Question #19
Which of the following statements is true about ARX's capacity balancing ability?
A. When new files are created, the ARX can determine in real time where to place each file based on the available space on each storage device
B. When configuring the ARX, customers can choose to implement either an age-based policy or a capacity based policy, but are not able to run both policies at the same time
C. All files created at approximately the same time (within 10 minutes) will be stored on the same tier of storage to minimize latency and improve the user experience
D. The ARX balances capacity within tiers A storage, but cannot balance capacity across tiers of storage
View answer
Correct Answer: A
Question #20
Administrators can specify an APM access profile when defining a virtual server in LTM.
A. True
B. False
View answer
Correct Answer: A
Question #21
Which two of the following statements about how TMOS typically manages traffic between a client and server are accurate? (Choose two.)
A. It changes the destination address before forwarding a request to the server
B. It changes the destination address before sending a response to the client
C. It changes the source address before sending a response to the client
D. It changes the source address before forwarding a request to the server
View answer
Correct Answer: BD
Question #22
The ARX can see ________ when a data modification takes place and will cue that file to be migrated back to the primary tier.
A. In real time
B. Nightly
C. Weekly
D. At the time of a system scan
E. When scheduled by administrator
View answer
Correct Answer: A
Question #23
Replicating a large database between sites could take several hours without WOM, and only several minutes with WOM.
A. True
B. False
View answer
Correct Answer: A
Question #24
Which four are GTM server static load balancing modes? (Choose four.)
A. Return to DNS
B. CPU
C. Packet Rate
D. Drop Packet
E. Round RobinF
View answer
Correct Answer: ADEF
Question #25
Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?
A. Modular Functionality
B. iApps
C. TMOS
D. DevCentral
View answer
Correct Answer: D
Question #26
Which of the following business benefits does storage tiering offer to customers?
A. Reduces time for backups because data on the secondary tier can have a less time intensive backup policed applied to it
B. All of the above
C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data
D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage
View answer
Correct Answer: B
Question #27
All members of a pool must share the same service port?
A. True
B. False
View answer
Correct Answer: B
Question #28
Which three of these are the potential ending options for branches in the Visual Policy Editor? (Choose three.)
A. Reject
B. Fallback
C. Allow
D. Deny
E. Limit
F. Redirect
View answer
Correct Answer: CDF
Question #29
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP _______ service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
A. Edge Client
B. iRules
C. LTM
D. IP intelligence
E. iApps
View answer
Correct Answer: D
Question #30
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
A. An intrusion prevention system (IPS) is based on Packet Filtering
B. An IPS doesn't have the visibility into HTTPS traffic
C. An IPS only focus on operating system attacks; it doesn't understand what application are in the network
D. An IPS can only look at overall traffic patterns; it doesn't understand what applications are in the network
View answer
Correct Answer: D
Question #31
What is the main cause of high latency in a Web application?
A. The version, the client's browser
B. The distance between the client and Web server
C. The number of CPUs on the Web server
D. The size of the objects on the page
View answer
Correct Answer: B
Question #32
Select the two best questions you would use to ask your customer about their current web access management solution. Select two.
A. What impact are slow remote access connections having on productivity?
B. Are you using Google multi-factor authentication?
C. Is user authentication data sitting on partner systems outside your control?
D. Have you standardized on Androids or iPhones?
E. How are you planning to extend Exchange to your mobile users?
F. How do you think a global remote access deployment with integrated acceleration and availability services might benefit your business?
View answer
Correct Answer: AF
Question #33
To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
A. True
B. False
View answer
Correct Answer: B
Question #34
In most cases, F5 recommends using round robin load balancing.
A. True
B. False
View answer
Correct Answer: B
Question #35
An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
A. The end user is unaware that the data has been moved to secondary tier storage and is able to access the data without difficulty
B. The networking mapping window appears, allowing the end user to re-establish direct access to the data even though it has been moved to secondary storage
C. An error message appears saying "File is no longer unavailable
D. A message appears explaining that the file has been archived, and a link to the new secondary storage tier location is provided
View answer
Correct Answer: A
Question #36
The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each file in order to more efficiently sort and store end user data.
A. True
B. False
View answer
Correct Answer: B
Question #37
Application trends and drivers that increase the need for application security are:
A. Intelligent Browsers
B. Webification
C. Targeted attacks
D. All the above
View answer
Correct Answer: D
Question #38
WebAccelerator uses three tiers to improve performance. What are the three tiers? (Choose three.)
A. Bandwidth offload
B. Client offload
C. Application offload
D. Protocol offload
E. Web server offloadF
View answer
Correct Answer: CEF
Question #39
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
A. The BIG-IP would drop the request since the traffic didn’t arrive destined to the NAT address
B. The source address would not change, but the destination address would be changed to the NAT address
C. The source address would be changed to the NAT address and destination address would be left unchanged
D. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP
View answer
Correct Answer: C
Question #40
What technology does ARX use to create a logical abstraction of the physical storage environment?
A. Data de-duplication
B. File virtualization
C. Server virtualization
D. SSL encryption
View answer
Correct Answer: B
Question #41
Mobile device browsers typically display Web pages more slowly than PC browsers.
A. True
B. False
View answer
Correct Answer: A
Question #42
How does the ARX eliminate the disruption caused by re-provisioning storage?
A. By identifying data that has not been modified and moving it to a secondary tier
B. By reducing the time necessary to run a complete backup
C. By allowing system administrators to apply policy to specific types data
D. By automating capacity balancing and allowing seamless introduction of file systems into the environment after the ARX is installed
View answer
Correct Answer: D
Question #43
ARX will detect any modification to a file on the second tier because all clients are being _______ by the ARX to get to the storage.
A. Moved
B. Copied
C. Proxied
D. Backed up
E. Deleted
View answer
Correct Answer: C
Question #44
Which four of these scenarios will benefit from F5's WAN Optimization Module? (Choose four.)
A. An international organization with data centers in different countries
B. An organization that does not want to rely on using tape backup
C. An organization with one site but hundreds of Web servers
D. An organization whose users create extremely large files
E. An organization that expects their Web site usage to double in the next year
F. An organization attempting to lower costs by reducing the number of data centers
View answer
Correct Answer: ABDF
Question #45
In order to ensure that a specific file type is never moved down to a secondary file tier, the administrator should:
A. Set up an automated bot that accesses that file once a week
B. This is not possible on the ARX
C. Set a policy that the file type remains on primary storage
D. Instruct the end users to put the file in a non-tiered directory
View answer
Correct Answer: C
Question #46
A site wishes to perform source address translation on packets arriving from the Internet for clients sing some pools but not others. The determination is not based on the client's IP address, but on the pool they are load balanced to. What could best accomplish this goal?
A. A SNAT for all addresses could be defined, and then disable the SNAT processing for select pools
B. The decision to perform source address translation is always based on VLAN
C. For each virtual server, regardless their default load balancing pools, association with SNAT pools could vary dependent upon need
D. The decision to perform source address translation is always based on a client's address (or network)
View answer
Correct Answer: A
Question #47
In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the DNS request?
A. It sends a broadcast request to all GTM devices
B. It uses iQuery to request the information from LTM
C. It sends a request to its configured backup GTM device
D. It sends an un-resolvable error to the client
E. It sends the request to an external DNS
View answer
Correct Answer: E
Question #48
Which two of the following statements are accurate descriptions of the ARX index? (Choose two.)
A. The ARX index stores the bulk of its data as bit arrays and answers most questions by performing bitwise logical operations on these bitmaps
B. The ARX index contains the index keys in sorted order, with the leaf level of the index containing the pointer to the page and the row number in the data page
C. The ARX index is the key enabler of transparent data mobility because the ARX tracks where files reside at all times, from creation through migration and deletion
D. The ARX index is 100% disposable and can be rebuilt at any point in time without disrupting client or application access to data
View answer
Correct Answer: BD
Question #49
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?
A. A
B. C
C. D
D. B
View answer
Correct Answer: D
Question #50
To function properly, an Enterprise Manager device is required within each data center.
A. True
B. False
View answer
Correct Answer: B
Question #51
The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP APM module; no other access management tool has this capability. Select the features that the VPE provides. Select two.
A. Develop customized reports on user access
B. Customize landing or login pages
C. Establish highly detailed policies based on customer business requirements
D. Configure authentication server objects
E. Perform multiple factors of authentication
View answer
Correct Answer: CE
Question #52
________% of F5 products are sent through thorough software testing before being sold to customers.
A. 100
B. 50
C. 60
D. 80
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: