Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

101 Application Delivery Fundamentals Questions and Answers

Questions 4

Layer 2 mapping information is announced by an interface without receiving a request for the mapping first.

Which term describes this event?

Options:

A.

ICMP

B.

STP

C.

gratuitous ARP

D.

ARP

Buy Now
Questions 5

A BIG-IP administrator is interested in using some of the vCMP

What should impact the administrator's decision?

Options:

A.

vCMP is available on all F5 hardware platforms.

B.

vCMP is only available on the virtual edition

C.

vCMP is hardware independent

D.

vCMP is only available on certain F5 platforms

Buy Now
Questions 6

In an active/standby high-availability mode, what causes a standby unit to assume the active role?

Options:

A.

Hashed unit iD

B.

management MAC address

C.

resource utilization

D.

heartbeat detection

Buy Now
Questions 7

A BIG IP Administrator reviews the Virtual Server configuration and sees the object status represented by a blue square tor an unknown status.How should the administrator change the unknown status?

Options:

A.

restart the BIG-IP device

B.

assign a monitor to the pool

C.

restart the backend webserver

D.

run a packet capture on the BIG-IP device

Buy Now
Questions 8

Which security model provides protection from unknown attacks?

Options:

A.

ACL Security model

B.

closed security model

C.

Negative security model

D.

Positive security model

Buy Now
Questions 9

A new virtual server is being tested to replace http://myapp.mydomain.com. The original virtual server is still on use. And the new virtual server is on a different ip address. What should be done to test this new virtual server using the fully quailed domain name for this application?

Options:

A.

add a DNS record for the fully qualified domain name

B.

add the fully qualified domain name to the browser cache

C.

make an entry in the client host file

D.

make an entry in the web server services file

Buy Now
Questions 10

Which Datalink sublayer has the primary funcl.cn of proving node lo node flow and error control?

Options:

A.

LLC

B.

ARP

C.

MAC

D.

UDP

Buy Now
Questions 11

A web administrator has added content to a web application, but users are unable to access the new content What could be preventing them from accessing the content?

Options:

A.

The webapp uses negative security, and the attack signature is using an invalid regular expression

B.

The webapp uses positive security. and the nourishes database has not been updated

C.

The webapp uses positive security, and the new content has not been defined as allowed behavior

D.

The webapp uses negative security. and the denial of service signatures have not been updated

Buy Now
Questions 12

HTTP pool attached to a Virtual Server has three members

Pool member A default HTTP monitor in red

Pool member 6 custom HTTP monitor in green

Pool member C does not monitor

Which pool members participate in the load balancing?

Options:

A.

Pool members A and C

B.

Pool members A B and C

C.

Pool members B and C

D.

Pool members A and B

Buy Now
Questions 13

A Network Administrator needs a new networking device can perform NAT to connect several devices on a computer network.

What is the most appropriate device for this requirement?

Options:

A.

Switch

B.

Router

C.

Bridges

D.

Hub

Buy Now
Questions 14

What describes the third ‘’A’’ in the common authentication acronym AAA?

Options:

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Buy Now
Questions 15

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

Options:

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Buy Now
Questions 16

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG IP device, Multiple other VLANs exist on LACP01.Which TMSH command should the BIG IP Administrator issue to add the new VLAN lo the existing LAC?

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named IACP01) connected to the BIG IP device Multiple other VLANs exist on LACP01. Which TMSH command should the BIG IP Administrator issue to add the new VLAN to the existing LAC?

Options:

A.

create net vlan VIAN40 (interfaces replace all with {LACP01 (untagged } } lag 40 )

B.

create net vian VLAN40 (interfaces add { LACP01 {tagged} tag JO J

C.

create net vian VLAN40 {interfaces add ( LACP01 {untagged)) tag 40}

D.

create net wan VLAN40 {interfaces replace all with {LACP01 {tagged ]} lag 40 }

Buy Now
Questions 17

An application has a mix of both and short and long lived connections. Which algorithm would provide and event distributionof all connections across the pool?

Options:

A.

Priority group activate

B.

Least connections

C.

Static ration

D.

Round robin

Buy Now
Questions 18

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

Options:

A.

Positive

B.

Context-based

C.

Negative

D.

Role-based

Buy Now
Questions 19

An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality?

Options:

A.

iCall

B.

iRules

C.

iSession

D.

iControl

Buy Now
Questions 20

An organization needs to cryptographically sign its domains. Which F5 product provides this functionality?

Options:

A.

GTM

B.

LTM

C.

ASM

D.

APM

Buy Now
Questions 21

Which three security controls are used in an SSL transaction? (Choose three.)

Options:

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Buy Now
Questions 22

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

Options:

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Buy Now
Questions 23

A company is creating a new department for Security Engineering and needs to create a segregated network segment with only 24 IPS.

What should be configured?

Options:

A.

configure a new VLAN and assign a netmask of /29

B.

use an existing VLAN and assign a netmask of /28

C.

use an existing VLAN and assign a netmask of /30

D.

configure a new VLAN and assign a netmask of /27

Buy Now
Questions 24

An administrator is given the IP Address of 192.168.100.124 and needs 64 subnets.

How many hosts per network are allowed?

Options:

A.

4

B.

8

C.

6

D.

2

Buy Now
Questions 25

A user fails to provide credentials when requesting a web resource that requires authentication. Which HTTP response code does the server send?

Options:

A.

HTTP 200

B.

HTTP 302

C.

HTTP 401

D.

HTTP 502

Buy Now
Questions 26

BIG-IP Administrator runs the command ITconfig from the BIG-IP command the line end sees a high number of collisions. What is the likely cause?

Options:

A.

There is a duplicate IP address on the network

B.

A crossover cable has been used

C.

The interface is set to hall duplex

D.

Spanning Tree Protocols biochang the con

Buy Now
Questions 27

An administrate receives an error message when attempting to create a self-IP address on a BIG-IP appliance Which address should the administrator use to resolve the issue?

A 2001 0db8.85a3 0000 0000 8a2e 0370 7334

B. 2001:db8:85a3 Bd3.Ba2e.370 7334

C. 2001:0db8:85i3:0000:0000: : 8a2i:0370:7334

Options:

Buy Now
Questions 28

What should a BIG-IP Administrator configure to minimize impact during a failure?

Options:

A.

MAC masquerading

B.

Clone pool

C.

External monitors

D.

One Connect profile

Buy Now
Questions 29

An administrator notices the following log message generated by a BIG IP system " diskmonitor 011d005: Disk partition shared has less than 30% tree" Which command should the administrator use to troubleshoot the problem?

Options:

A.

parted-1

B.

fdisk-1

C.

isbik

D.

df-h

Buy Now
Questions 30

A client’s operating system needs to make sure that data received from a server is mapped to the application that requested it.

How does it complete this mapping?

Options:

A.

using the TCP sequence number

B.

using the client source port

C.

using the TCP acknowledgement number

D.

using the server source port

Buy Now
Questions 31

A BIG-IP Administrator needs to make sure that requests from a single user are directed to the server that was initially selected (unless that server is marked down). What should the administrator configure?

Options:

A.

caching profile

B.

TCP profile

C.

persistence profile

D.

security policy

Buy Now
Questions 32

A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connections over the Internet using only a standard browser and common ports and protocols. Which solution should the administrator select?

Options:

A.

GRE Tunnel

B.

iPsec VPN

C.

SSH Tunnel

D.

SSL VPN

Buy Now
Questions 33

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.

11. Times exceeded

What does this mean?

Options:

A.

A faulty router on the network is unable to process the packet in a timely manner

B.

A switch on the network the frame due to an incorrect checksum

C.

The TTL field of the IP header was set to 255. and this was consequently dropped by a router

D.

The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router

Buy Now
Questions 34

A server is capable of handling more connections than other servers in the same pool. Which load distribution method should the administrator choose?

Options:

A.

Least Connections

B.

Fastest

C.

Ratio

D.

Round Robin

Buy Now
Questions 35

What should the administrator investigate first to address this traffic slownes

Options:

A.

The virtual server indicates 14 slow connections killed

B.

The pool member is unchecked

C.

Interface 1.2 shows 9.2K errors

D.

The pool shows no current connections.

Buy Now
Questions 36

Which of the following is a valid IP address and prefix length?

Options:

A.

192. 168.:0 177/25

B.

192 168:0. 129/25

C.

192.168:0 128/25

D.

192 168 :0 255/25

Buy Now
Exam Code: 101
Exam Name: Application Delivery Fundamentals
Last Update: May 1, 2024
Questions: 240
101 pdf

101 PDF

$28  $80
101 Engine

101 Testing Engine

$33.25  $95
101 PDF + Engine

101 PDF + Testing Engine

$45.5  $130