DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare for F5 101 Exams Questions & Study Materials, 101-Application Delivery Fundamentals | SPOTO

Prepare for F5 101 Exams Questions & Study Materials with SPOTO, your trusted partner in achieving Certified F5 BIG-IP Administrator status. The F5 101-Application Delivery Fundamentals exam is a pivotal step in demonstrating your expertise in the day-to-day management of Application Delivery Networks, essential for IT professionals. With SPOTO's proven track record, you can prepare efficiently for the F5 101 exam, practice with confidence, and enhance your exam readiness. Our expertise and resources are tailored to help you pass the certification exam quickly, empowering you to excel in your IT career within a short timeframe. Trust SPOTO for your F5 101 exam preparation needs. SPOTO offers a comprehensive range of study materials to optimize your exam preparation. Access practice tests, exam dumps, and exam simulations to strengthen your understanding of F5 technologies. Our collection of sample questions, exam answers, and online exam resources ensures a thorough and effective study experience.

Take other online exams

Question #1
Which event is always triggered when a client initially connects to a virtual server configured with an HTTP profile?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. CLIENT_ACCEPTED
View answer
Correct Answer: ACE
Question #2
Which tool is used on BIG-IP systems to capture data packets?
A. tcpdump
B. snoop
C. ethereal
D. qkview
View answer
Correct Answer: B
Question #3
When defining a load balancing pool using the command line, if the load balancing method is not specified, what is the result?
A. The default load balancing method would be used
B. The load balancing method of the previous pool would be used
C. The system would prompt the user for a load balancing method
D. An error would be displayed since no load balancing method was specified
View answer
Correct Answer: B
Question #4
Which IP address will the client address be changed to when SNAT automap is specified within a Virtual Server configuration?
A. The floating self IP address on the VLAN where the packetleaves the system
B. The floating self IP address on the VLAN where the packet arrives on the system
C. It will alternate between the floating and nonfloating self IP address on the VLAN where the packet leaves the system so that port exhaustion is avoided
D. It will alternate between the floating and nonfloating self IP address on the VLAN where the packet arrives on the system so that port exhaustion is avoided
View answer
Correct Answer: A
Question #5
What occurs when a save-config command is issued?
A. The current configuration files are backed up
B. The current configuration files are verified for syntax, then the running configuration is installed in memory
C. The current configuration files are loaded into memory
D. The current configuration files are saved into an archive format
View answer
Correct Answer: A
Question #6
Which statement about root DNS servers is true?
A. Root servers have databases of all registered DNS servers
B. Root servers have databases of the DNS servers for top-level domains
C. Root servers have databases of DNS servers for each geographical area
D. Root servers have databases of commonly accessed sites
View answer
Correct Answer: C
Question #7
When upgrading a BIG-IP redundant pair, what happens when one system has been updated but the other has not?
A. Synching should not be performed
B. The first system to be updated will assume the Active role
C. This is not possible since both systems are updated simultaneously
D. The older system will issue SNMP traps indicating a communication error with the partner
View answer
Correct Answer: B
Question #8
When a virtual server has an HTTP profile with compression enabled, which traffic is compressed by the BIG-IP?
A. selected traffic from the BIG-IP to the client
B. all sever-side traffic for that virtual server
C. selected traffic from the pool member to the BIG-IP
D. all client-side traffic for that virtual server
View answer
Correct Answer: C
Question #9
Why would an administrator capture monitor traffic between a BIG-IP and servers?
A. Viewing monitor traffic could help the administrator to define a more robust monitor
B. If a client were having difficulty logging into a load balanced SSH server, viewing and analyzing the connection process would determine the reason
C. Only client traffic may be captured; monitor traffic may not be captured
D. If client traffic to servers was failing, viewing and analyzing monitor traffic would determine the reason
View answer
Correct Answer: A
Question #10
When is a Virtual Server hosted by an LTM System defined with two IP addresses?
A. Two addresses are used to define the Virtual Server when it is managed by redundant LTM Systems
B. Two addresses are used to define some Virtual Servers so that the GTM System can choose the better address when resolving the name
C. Two addresses are used to define Virtual Servers when the LTM System hosting it is behind a firewall that is translating the Virtual Server address
D. Two addresses are used to define a Virtual Server when the Wide-IP should resolve to a different address depending on which LTM System is active
View answer
Correct Answer: BC
Question #11
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it:
A. pool1
B. pool2
C. None
D. Unknown
View answer
Correct Answer: D
Question #12
Which three statements are true about SNATs? (Choose three.)
A. SNAT s provide bidirectional traffic initiation
B. SNAT s support UDP, TCP, and ICMP traffic
C. SNAT s provide a many-to-one mapping between IP addresses
D. SNAT addresses can be identical to virtual server IP addresses
View answer
Correct Answer: C
Question #13
Which three iRule events are likely to be seen in iRules designed to select a pool for load balancing. (Choose 3)
A. CLIENT_DATA
B. SERVER_DATA
C. HTTP_REQUEST
D. HTTP_RESPONSE
E. CLIENT_ACCEPTED
F. SERVER_SELECTED
G. SERVER_CONNECTED
View answer
Correct Answer: A
Question #14
Assume the bigd daemon fails on the active system. Which three are possible results? (Choose three.)
A. The active system will restart the bigd daemon and continue in active mode
B. The active system will restart the TMM daemon and continue in active mode
C. The active system will reboot and the standby system will go into active mode
D. The active system will failover and the standby system will go into active mode
E. The active system will continue in active mode but gather member and node state information from the standby system
View answer
Correct Answer: ACD
Question #15
Which statement is true concerning the default communication between a redundant pair of BIG-IP devices?
A. Communication between the systems cannot be effected by port lockdown settings
B. Data for both connection and persistence mirroring are shared through the same TCP connection
C. Regardless of the configuration, some data is communicated between the systems at regular intervals
D. Connection mirroring data is shared through the serial failover cable unless network failover is enabled
View answer
Correct Answer: C
Question #16
When DNS_REV is used as the probe protocol by the GTM System, which information is expected in the response from the probe?
A. a reverse name lookup of the GTM System
B. the list of root servers known by the local DNS
C. the FQDN of the local DNS being probed for metric information
D. the revision number of BIND running on the requesting DNS server
View answer
Correct Answer: D
Question #17
Given the configuration shown below, if a connection request arrived on the BIG-IP with a source address of 200.10.10.10:1050 and a destination of 150.10.10.75:80, what would the source IP address of the associated packet be when it arrived on the choosen member of the web_pool self 150.10.10.1 { netmask 255.255.255.0 unit I floating enable vlan external allow tcp https } self 10.10.1.1 { netmask 255.255.255.0 unit I floating enable vlan internal allow default } pool web_pool { member 10.10.1.11:80 member 1
A. 10
B. 200
C. 10
D. 150
View answer
Correct Answer: BC
Question #18
An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the graphic below. Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached. A connection attempt is made with a source IP and port of 10.20.10.50:2222 and a destination IP and port of 10.10.2.102:80. When the request is processed, what will be the source and destination IP addresses?
A. Source IP: 10
B. Source IP: 172316
C. Source IP: 192
D. The request will be dropped
E. Source IP: 10
F. Source IP: 182
G. Source IP: 192
H. Source IP:192
View answer
Correct Answer: CD
Question #19
Which statement is true concerning packet filters?
A. In addition to administrator-created filters, three always exists a "deny all" filter that processes traffic last
B. Filters cannot prevent access to the management port
C. The order of filters does not affect which traffic is accepted or denied
D. Filters cannot prevent the BIG_IP synching process from taking place
View answer
Correct Answer: A
Question #20
Which three parameters could be used to determine whether a connection request will have the source address translated as the request is processed? (Choose three.)
A. the client's router's IP address
B. the client's browser's preferred language
C. the client's IP netmask
D. the client's TCP port
E. the client's IP address
F. the client IP fragment offset
View answer
Correct Answer: A
Question #21
Assume a BIG-IP has no NATs or SNATs configured. Which two scenarios are possible when client traffic arrives on a BIG-IP that is NOT destined to a self-IP? (Choose two.)
A. If the destination of the traffic does not match a virtual server, the traffic will be discarded
B. If the destination of the traffic does not match a virtual server, the traffic will be forwarded based on routing tables
C. If the destination of the traffic matches a virtual server, the traffic will be processed per the virtual server definition
D. If the destination of the traffic matches a virtual server, the traffic will be forwarded, but it cannot be load balanced since no SNAT has been configured
View answer
Correct Answer: B
Question #22
What are two advantages of the Quality of Service (QoS) load balancing method? (Choose two.)
A. It resolves requests to the site with the highest QoS value in the IP header
B. It combines multiple load balancing metric values in a single load balancing method
C. It allows the GTM administrator to place relative values on each metric used to determine the optimum site
D. It allows the GTM System to select the optimum virtual server based on all available path and server metrics
View answer
Correct Answer: B
Question #23
Which action will take place when a failover trigger is detected by the active system?
A. The active device will take the action specified for the failure
B. The standby device also detects the failure and assumes the active role
C. The active device will wait for all connections to terminate and then failover
D. The standby device will begin processing virtual servers that have failed, but the active device will continue servicing the functional virtual servers
View answer
Correct Answer: A
Question #24
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B,
B. Given the conditions shown in the above graphic, if a client with IP address 205
A. 172
B. 172
C. 172
D. 172
E. 172
View answer
Correct Answer: D
Question #25
What are some changes that must be made on the GTM System so that log messages are sent to centralized System Log servers?
A. The IP address of the server must be added to the wideip
B. The IP address of the server must be added to the syslogng
C. The IP address of the server and valid user id/password combination must be added to the hosts
D. The IP address of the server and valid user id/password combination must be added to the syslog ng
View answer
Correct Answer: B
Question #26
The following iRule is being used within a persistence profile on a virtual server. Assuming the following HTTP requests are made within the same timeout window, what is the maximum number of persistence records that will be created iRule:
A. 4
B. 3
C. 10
D. It cannot be determined from the given data
E. 5
F. 1
G. 0
View answer
Correct Answer: B
Question #27
Assuming that systems are synchronized, which action could take place if the failover cable is connected correctly and working properly, but the systems cannot communicate over the network due to extern al network problems.
A. If network failover is enabled, the standby system will assume the active mode
B. Whether or not network failover is enabled, the standby system will stay in standby mode
C. Whether or not network failover is enabled, the standby system will assume the active mode
D. If network failover is enabled, the standby system will go into active mode but only until the network recovers
View answer
Correct Answer: A
Question #28
Which statement concerning virtual servers is true?
A. Virtual servers can keep idle server connections open indefinitely
B. Virtual servers can compress data between the BIG-IP and servers
C. Virtual servers cannot perform load balancing without performing address translation
D. Virtual servers can reuse connections between the BIG-IP and server for multiple HTTP GETs
E. Virtual server processing always translates the virtual server address to the address of the chosen pool member
View answer
Correct Answer: A
Question #29
The partial configuration below includes an iRule, a virtual server, and pools. When traffic from the client at 160.10.10.10:2056 connects to the virtual server Test_VS and sends an HTTP request, what will the client's source address be translated to as the traffic is sent to the chosen pool member?
A. 160
B. It could be either 10
C. 10
D. 200
E. 10
View answer
Correct Answer: F
Question #30
An LTM has the 3 virtual servers, a SNAT, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:80. When the request is processed, what will be the destination IP address?
A. Destination IP: 10
B. Destination IP: pool member in the 192
C. Destination IP: pool member in the 172
D. The request will be dropped
View answer
Correct Answer: C
Question #31
Which process or system can be monitored by the BIG-IP system and used as a failover trigger in a redundant pair configuration.
A. bandwidth utilization
B. duplicate IP address
C. CPU utilization percentage
D. VLAN communication ability
View answer
Correct Answer: D
Question #32
Listeners that correspond to nonfloating self IP addresses are stored in which configuration file?
A. /config/BIG-IP
B. /config/BIG-IP_base
C. /config/gtm/wideip
D. /config/BIG-IP_local
View answer
Correct Answer: B
Question #33
Given that VLAN failsafe is enabled on the external VLAN and the network that the active BIG-IP's external VLAN is connected to has failed, which statement is always true about the results?
A. The active system will note the failure in the HA table
B. The active system will reboot and the standby system will go into active mode
C. The active system will failover and the standby system will go into active mode
D. The active system will restart the traffic management module to eliminate the possibility that BIG-IP is the cause for the network failure
View answer
Correct Answer: A
Question #34
A site wishes to use an external monitor. Other than what is coded in the monitor script, what information must be configured on the BIG-IP for the monitor to be functional? (Choose two.)
A. BIG-IP services that are running on the system to be tested
B. BIG-IP the IP addresses of the devices that will be tested
C. BIG-IP node or member the result are to be applied to
D. BIG-IP must know the name of the program
E. BIG-IP must know which function the program is going to test
View answer
Correct Answer: A
Question #35
An LTM has the 3 virtual servers, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:80. When the request is processed, what will be the destination IP address?
A. Destination IP: 10
B. The request will be dropped
C. Destination IP: pool member in the 192
D. Destination IP: pool member in the 172
View answer
Correct Answer: A
Question #36
A GTM System performs a name resolution that is not a Wide-IP. The name is in a domain for which the GTM System is authoritative. Where does the information come from?
A. It comes from BIND database (zone) files on the GTM System
B. GTM System cannot resolve a host name that is not a Wide-IP
C. It comes from the database of previously cached name resolutions
D. It comes from a zone transfer initiated when the request was received
View answer
Correct Answer: D
Question #37
Which statement is true concerning cookie persistence.
A. Cookie persistence allows persistence independent of IP addresses
B. Cookie persistence allows persistence even if the data are encrypted from client to pool member
C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text
D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system
View answer
Correct Answer: C
Question #38
A monitor has been defined using the HTTP monitor template. The send and receive strings were customized, but all other settings were left at their defaults. Which resources can the monitor be assigned to?
A. only specific pool members
B. most virtual severs
C. most nodes
D. most pools
View answer
Correct Answer: D
Question #39
A pool is using Round Trip Time as its load balancing method (Alternate: Round Robin; Fallback:None). The last five resolutions have been C, D, C, D,
C. Given the current conditions shown in the table below, which address will be used for the next resolution?
A. A
B. B
C. C
D. D
View answer
Correct Answer: C
Question #40
The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C, E, D and
B. Given the virtual server, pool, and persistence definitions and statistics shown in the above graphic, which member will be used for the next connection?
A. 10
B. 10
C. 10
D. 10
E. 10
F. It cannot be determined with the information given
View answer
Correct Answer: C
Question #41
If a client's browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence?
A. The connection request is not processed
B. The connection request is sent to a pology
C. The connection request is load balanced to an available pool member
D. The connection request is refused and the client is sent a "server not available" message
View answer
Correct Answer: D
Question #42
What is the advantage of specifying three load balancing methods when load balancing within pools?
A. Specifying three methods allows the GTM System to use all three methods simultaneously
B. Specifying three methods allows the GTM System to choose the optimal method for each name resolution
C. Specifying three methods allows the GTM System alternate methods if insufficient data is available for other methods
D. Specifying three methods allows the GTM System to rotate between the three methods so that no one method is used too often
View answer
Correct Answer: B
Question #43
A site wishes to delegate the name .wmysite.com to a GTM System. Which entry would be appropriate in their current DNS servers?
A. vww
B. 15
C. iw
D. wwmysite
View answer
Correct Answer: A
Question #44
Which two statements are true concerning capabilities of current BIG-IP platforms? (Choose two.)
A. The 1600 hosts more ports than the 3900
B. All current BIG-IP platform use both an ASIC
C. All current BIG-IP platform can perform hardware compression
D. Only 2U BIG-IP Platform have an option of a second power supply
E. All BIG-IP have capacity to perform bulk encryption I decryption of SSL traffic independent of the CPU
View answer
Correct Answer: D
Question #45
A GTM System would like to ensure that a given LTM System is reachable and iQuery communication is allowed prior to sending it client request. What would be the simplest monitor template to use?
A. TCP
B. ICMP
C. HTTP
D. BIG-IP
E. SNMP
View answer
Correct Answer: BDF
Question #46
Which statement is true about the synchronization process, as performed by the Configuration Utility or by typing b config sync all?
A. The process should always be run from the standby system
B. The process should always be run from the system with the latest configuration
C. The two /config/BIG-IP
D. Multiple files, including /config/BIG-IP
View answer
Correct Answer: D
Question #47
What is the expected difference between two source address persistence profiles if profile A has a mask of 255.255.255.0 and profile B has a mask of 255.255.0.0?
A. Profile A will have more clients matching existing persistence records
B. There are no detectable differences
C. Profile B has a greater potential number of persistence records
D. Profile B will have fewer persistence records for the sane client base
View answer
Correct Answer: E
Question #48
A BIG-IP has the following objects configured: A virtual server at 150.10.30.30:80 that is associated with both the SNAT pool and the load balancing pool. If a client at IP address 200.10.10.10 initiates a connection to the virtual server, what will the source IP address be in the packets sent to the chosen pool member?
A. 150
B. 10
C. 10
D. 150
E. 200
F. It could be any of the addresses of the members of the load balancing pool
View answer
Correct Answer: BDE
Question #49
Which is the result when multiple monitors are assigned to a pool member?
A. The member is marked available if sufficient monitors succeed, and as unavailable if insufficient monitors succeed
B. The member is marked as available if any of the monitors succeed
C. The member is marked as unavailable if any of the monitors fails
D. The member is marked available if all monitors succeed, and as marginal if one or more monitors fail(s)
View answer
Correct Answer: BE
Question #50
Assuming there are open connections through an active system's virtual servers and a failover occurs, by default, what happens to the connections?
A. All open connections are lost
B. All open connections are maintained
C. When persistence mirroring is enabled, open connections are maintained even if a failover occurs
D. Long-lived connections such as Telnet and FTP are maintained, but short-lived connections such as HTTP are lost
E. All open connections are lost, but new connections are initiated by the newly active BIG-IP, resulting in minimal client downtime
View answer
Correct Answer: A
Question #51
Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?
A. host names
B. system clocks
C. profile definitions
D. VLAN failsafe settings
E. MAC masquerade addresses
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: