Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

F5 101 Application Delivery Fundamentals Exam Practice Test

Page: 1 / 24
Total 240 questions

Application Delivery Fundamentals Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?

Options:

A.

negative security model

B.

Closed security model

C.

positive Security model

D.

ACL Security model

Question 2

Ping and Traceroute outputs are provided for a connectivity issue.

What is the cause of these results?

Options:

A.

routing loop

B.

packets that are routed with a high metric

C.

multiple paths toward the destination

Question 3

A company deploys F5 load balancers to manage a large number of secure applications. The company manage certificates. Which F5 provides this functionality?

Options:

A.

iHealthy

B.

BIG-IQ

C.

GTM

D.

LTM

Question 4

What advantage does an active-standby configuration have over an active-active configurations?

Options:

A.

Active-standby configuration allows for the backup of the peer configuration

B.

Active-standby utilizes the hardware more efficiently

C.

Active standby Uses significantly less power consumption than active-active

D.

Active-standby is less complex to troubleshoot

Question 5

A BIG IP Administrator needs to create a virtual server for a new secure end-to-end web application After change in configuration the virtual server .3 still marked down. The configuration of the virtual server and the pool member are correct. A quick server shows the status.

To fix the issue, what should the BIG-IP Administrator inform the web server administrator to do?

Options:

A.

change web server configuration to use SSL/TLS

B.

reboot the server

C.

restart the web service

D.

change web server configuration lo use SSH/SCP

Question 6

Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?

Options:

A.

Segment

B.

Datagram

C.

Packet

D.

Bit

Question 7

A VoIP application requires that data payloads will NOT be fragmented. Which protocol controls network behavior in this situation?

Options:

A.

RTSP

B.

UDP

C.

TCP

D.

IP

Question 8

Tl SISSL prides which functionary when a web browser connects to web site using the HTTPS protocol?

Options:

A.

delivers secure communication over a network connection

B.

prevents the web server from being compromised

C.

protects network packets from interception by intermedianes

D.

stop the web browser from automatically downloading malware

Question 9

In which scenario is a packet forwarding architecture required?

Options:

A.

when HTTP header must be modified

B.

when cookie persistency is demanded

C.

when the server responds directly to the client

D.

when the number of TCP connections on the server should be reduced

Question 10

Which two destination pods should be used in a default active FTP Session? (Choose two)

Options:

A.

UDP 20

B.

TCP 20

C.

TCP 22

D.

TCP 21

E.

UDP 21

Question 11

Which high availability feature allows two different BIG-IP devices to use the MAC address for the same server IP?

Options:

A.

HSRP virtual MAC address

B.

Device group

C.

Sync- failover

D.

MAC masquerade

Question 12

10:20: 37 .00749:IP 199.16.255.254.36664>10.0.1.10 http : flags (s) seq 700424862, Win 29200

A website is fronted by a toad balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there are bro nodes Node 1 and node2

She administrator is debugging an issue on node 1 using icpdump and records the above out about a received packet o watch device does the IP address 192 168 265 254" belong?

Options:

A.

node2

B.

node 1

C.

load balancer

D.

web Client

Question 13

Which type of certificate is pre-installed in a web browser’s trusted store?

Options:

A.

Root Certificate

B.

Server Certificate

C.

Client Certificate

D.

intermediate Certificate

Question 14

What are the two primary functions of the OSI 7 layer model (Choose two)

Options:

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors

Question 15

ARP provides translation between which two address types?

Options:

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Question 16

The BIG IP device is connected to the same network as a server

Which communication protocol will the BIG IP device use to discover the link layer address of the server?

Options:

A.

Ping

B.

ICMP

C.

RARP

D.

ARP

Question 17

What describes the third ‘’A’’ in the common authentication acronym AAA?

Options:

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Question 18

ICMP is used by which command line tool?

Options:

A.

curt

B.

tcpdump

C.

traceroute

D.

nslookup

Question 19

A company is creating a new department for Security Engineering and needs to create a segregated network segment with only 24 IPS.

What should be configured?

Options:

A.

configure a new VLAN and assign a netmask of /29

B.

use an existing VLAN and assign a netmask of /28

C.

use an existing VLAN and assign a netmask of /30

D.

configure a new VLAN and assign a netmask of /27

Question 20

Which support service is required to synchrony the time stamps in system logs from these devices?

Options:

A.

SNMP

B.

Syslong

C.

SMTP

D.

DNS

Question 21

In which FTP mode is the serve, responsible for initiating the data correction back to the client?

Options:

A.

Protected FTP

B.

Active FTP

C.

Secure FTP

D.

Passive FTP

Question 22

An administrator is currently designing the IP addressing scheme for a small company. They have been asked to use the 192. 168. 100 x block of addresses with a /27 network prefix. How many networks and hosts per network will be available when using the 27-bit network prefix.

Options:

A.

255 networks each with 224 hosts

B.

30 networks each with 8 hosts

C.

8 networks each with 30 hosts

D.

27networks each with 30 hosts

Question 23

HTTPs traffic is not working properly.

What is the likely reason for the issue?

Options:

A.

0. 0 0.0 0 is an invalid address in netstat.

B.

0. 0. 0. 0.0 80 should be in an active stale

C.

The server is not listening on TCP 443

D.

The server is not listening on UDP 80

Question 24

In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic

What should be used for this task?

Options:

A.

Big-IP Global Traffic Manager appliance

B.

Big-lP standard virtual edition

C.

Big-IP Local Traffic Manager appliance

D.

Big-IP virtual edition with FIPS

Question 25

A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192.168.0.0/24 net. What is required to enable the several and BIG-IP device to communicate properly?

Options:

A.

Firewall

B.

Switch

C.

Router

D.

Hub

Question 26

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

Options:

A.

Use HTTP keep-alive

B.

set a larger receive window

C.

Enable delayed ACKs

D.

use an indefinite timeout

Question 27

Where is the MAC masquerade address configured?

Options:

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Question 28

An application has a mix of both and short and long lived connections. Which algorithm would provide and event distributionof all connections across the pool?

Options:

A.

Priority group activate

B.

Least connections

C.

Static ration

D.

Round robin

Question 29

What does the HTTP status code 404 mean?

Options:

A.

Not Acceptable

B.

Forbidden

C.

Request Timeout

D.

Not found

Question 30

Given the service list of a server shown, the administrator needs to determine why users are unable to resolve the IP address .

What is the causing this issue?

Options:

A.

bigd is down

B.

named is down

Question 31

A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?

Options:

A.

Public Key

B.

SSL extension

C.

A negotiated security algorithm

D.

private Key

Question 32

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

Options:

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Question 33

Web application at 10.10.1.1.110, is unresponsive. A recent change migrated DNS to a new platform

Options:

A.

telnet www example com 80

B.

curl http //www example com

C.

dig www example com

D.

telnet 10.10.1. 110. 80

Question 34

in which scenario is a full proxy TCP connection required?

Options:

A.

when SSL offloading is used

B.

when Traffic is routed

C.

when administrators manage the servers directly

D.

when 3 server responds directly to the client

Question 35

A BIG-IP administrator is interested in using some of the vCMP

What should impact the administrator's decision?

Options:

A.

vCMP is available on all F5 hardware platforms.

B.

vCMP is only available on the virtual edition

C.

vCMP is hardware independent

D.

vCMP is only available on certain F5 platforms

Question 36

Which protocol data unit (PDU) is associated with the OSI model Network layer?

Options:

A.

Frame

B.

Packet

C.

Segment

D.

Bit

Page: 1 / 24
Total 240 questions