<< Prev Question Next Question >>

Question 47/213

Which three of these are the potential ending options for branches in the Visual Policy Editor?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (213q)
Question 1: Requests that do not meet the ASM security policies can:...
Question 2: Which item is NOT a function of a properly deployed and conf...
Question 3: Which three are GTM server dynamic load balancing modes?...
Question 4: Which two of these statements about OneConnect are true?...
Question 5: Which of the following is NOT a logging option within an APM...
Question 6: A customer says his business wouldn't benefit from buying AR...
Question 7: GTM solves which three of these standard DNS limitations?...
Question 8: True or False, WOM speeds up large file data transfer across...
Question 9: IP Enforcer blocks IP addresses that have repeatedly and reg...
Question 10: What technology does ARX use to create a logical abstraction...
Question 11: In order to further accelerate applications, the external ro...
Question 12: Brute force protection will:
Question 13: The ARX can see ________ when a data modification takes plac...
Question 14: An age-based policy is set up on the ARX that retains only d...
Question 15: What feature of the F5 Exchange solution helps administrator...
Question 16: Which four F5 products are on the TMOS platform?...
Question 17: Which aspect of F5's Intelligent Services Platform helps you...
Question 18: Which three of these software modules can you layer on top o...
Question 19: If a customer has an application that uses a customized prot...
Question 20: Which of these statements about a stream profile is false?...
Question 21: ASM offers the most extensive, effective, and simplest to co...
Question 22: All members of a pool must share the same service port?...
Question 23: The production version of BIG-IP Virtual Edition is limited ...
Question 24: WebAccelerator uses three tiers to improve performance. What...
Question 25: APM provides access control lists at which two 051 layers...
Question 26: A top-level DNS zone uses a CNAME record to point to a sub-z...
Question 27: What is NOT a benefit of using a SNAT?...
Question 28: DRAG DROP Match the security-related term with the correct d...
Question 29: Select the key reasons F5 is able to handle DNS DDoS attacks...
Question 30: Adding more RAM to a GTM device drastically improves query p...
Question 31: The Policy Builder benefits include:...
Question 32: The VIPRION provides hot-pluggable capabilities for which fo...
Question 33: How does the ARX eliminate the disruption caused by re-provi...
Question 34: An administrator is adding GTM to the network infrastructure...
Question 35: SIMULATION GTM uses the F5 ___________ protocol to synchroni...
Question 36: Organizations are moving towards a cloud solution are good c...
Question 37: Basic F5 IP Geo location provides which four types of client...
Question 38: When a business is hacked, they often lose more than money. ...
Question 39: DRAG DROP Place the following items in the order that the BI...
Question 40: If LTM uses the round robin load balancing method, which poo...
Question 41: The Device Inventory option in Enterprise Manager can replac...
Question 42: The Protected Workspace client-side action provides more cli...
Question 43: A customer wants the best possible throughput but only has a...
Question 44: To make complex access policies easier to manage, an adminis...
Question 45: Which of the following is NOT a benefit of using SSL offload...
Question 46: Which two of the following LTM load balancing methods requir...
Question 47: Which three of these are the potential ending options for br...
Question 48: What percentage of storage in a typical environment is activ...
Question 49: A user's access to resources can change based on the compute...
Question 50: ARX will detect any modification to a file on the second tie...
Question 51: Which of the following are four of the security benefits of ...
Question 52: Select the question you would ask your customer related to D...
Question 53: In order to ensure that a specific file type is never moved ...
Question 54: DRAG DROP Match the security-related term with the correct d...
Question 55: The Rapid Deployment Policy is used to:...
Question 56: Which three of the following are unique differentiators for ...
Question 57: Which three of the following are benefits of adding WebAccel...
Question 58: When using only LTM in redundant pairs, a customer can load ...
Question 59: Select the best word or phrase to complete the following sen...
Question 60: Which four of these statements regarding object size and Web...
Question 61: APM provides access control lists at which two OSI layers?...
Question 62: Application trends and drivers that increase the need for ap...
Question 63: Information leakage is a major obstacle to achieving PCI DSS...
Question 64: Mobile device browsers typically display Web pages more slow...
Question 65: An administrator is planning on solving latency issues by pl...
Question 66: Which of the following does NOT describe network performance...
Question 67: Which four are GTM server static load balancing modes?...
Question 68: SIMULATION A _______ object maps a FQDN to virtual servers. ...
Question 69: Customers can purchase LTM as a stand-alone product, or laye...
Question 70: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 71: In most cases, F5 recommends using round robin load balancin...
Question 72: The APM Dashboard enables administrators to monitor which tw...
Question 73: Which of the following is NOT included on the F5 DevCentral ...
Question 74: When using SNAT, which additional IP addresses will the BIG-...
Question 75: Which four of the following items are physical objects used ...
Question 76: If LTM uses the least connections load balancing method, whi...
Question 77: What is the main cause of high latency in a Web application?...
Question 78: The Policy Builder benefits include:...
Question 79: Which four of these scenarios will benefit from F5's WAN Opt...
Question 80: LTM runs on______F5's proprietary product platform. (Fill in...
Question 81: When an optimized TCP connection exists between LTM and the ...
Question 82: To function properly, an Enterprise Manager device is requir...
Question 83: Which two F5 platforms include specialized compression hardw...
Question 84: The LTM "Manager" authentication role can create iRules....
Question 85: Which of the following statements about Web server offload i...
Question 86: Which of the following statements best describes the ARX arc...
Question 87: ASM Geolocation reporting provides information regarding:...
Question 88: Although not all modules run on all platforms, each F5 hardw...
Question 89: Even though F5 is an application delivery controller, it can...
Question 90: When using only LTM in redundant pairs, a customer can load ...
Question 91: Why does deploying LTM into an existing network immediately ...
Question 92: If the BIG-IP device is NOT always located between the clien...
Question 93: Administrators can customize APM to resemble other internal ...
Question 94: The F5 Application Delivery Firewall has the ability to outp...
Question 95: When using a routed configuration, the real server must poin...
Question 96: Another name for the F5 OneConnect feature is TCP multiplexi...
Question 97: Which three of the following are benefits of adding WebAccel...
Question 98: In the current version of BIG-IP, what happens if the GTM do...
Question 99: Which of the following is NOT a profile type on the BIG-IP?...
Question 100: ASM provides antivirus protection by:...
Question 101: Administrators can specify an APM access profile when defini...
Question 102: Which of the following is a benefit of using iRules?...
Question 103: Which three of the following statements describe a data cent...
Question 104: ARX will detect any modification to a file on the second tie...
Question 105: An LTM object represents a downstream server that hosts a se...
Question 106: You can use an HTTP class profile to forward traffic that ma...
Question 107: Which of the following statements is true about ARX's capaci...
Question 108: Application templates save the time it typically takes to cr...
Question 109: ASM can detect Layer 7 DoS attacks by which four ways of mon...
Question 110: Identifying users by their IP address is a sufficient method...
Question 111: WebAccelerator uses three tiers to improve performance. What...
Question 112: An LTM object contains both IP address and port combinations...
Question 113: The main drawback to using an APM Deployment Wizard is that ...
Question 114: Using IP Geolocation, an organization can always direct a cl...
Question 115: Which WOM feature replaces a long byte pattern, such as "100...
Question 116: Which of the following are the three main business drivers f...
Question 117: Which is NOT an ASM protection method for cross site scripti...
Question 118: If your customer has a policy requirement that cannot be han...
Question 119: Which item is NOT a function of ASM?...
Question 120: Replicating a large database between sites could take severa...
Question 121: TMOS is an F5 software module that runs on the BIG-IP platfo...
Question 122: TCP Express enables LTM to use different TCP settings for th...
Question 123: In order to improve GTM performance, administrators should u...
Question 124: LTM can only load balance outbound traffic by using iRules...
Question 125: Which two of the following are costs businesses may face in ...
Question 126: Which three of the following must be done in order for GTM t...
Question 127: GTM can load balance to LTM in addition to non-BIG-IP hosts....
Question 128: When using a routed configuration, the real server must poin...
Question 129: ASM combined with LTM provides protection against:...
Question 130: DRAG DROP Match the five elements of the intelligent file vi...
Question 131: A network administrator tells you that they do NOT need WebA...
Question 132: FastCache will NOT work with compressed objects....
Question 133: The drawback to having BIG-IP act as a full application prox...
Question 134: Which of the following are four of the benefits of the TMOS ...
Question 135: What is NOT a benefit of using a SNAT?...
Question 136: Network Security personnel are entirely responsible for web ...
Question 137: The PCI compliance report is proof that a company is secure....
Question 138: ASM's Web Scraping protection:
Question 139: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 140: When installing LTM on different VIPRION performance blades,...
Question 141: The least connections load balancing method functions best w...
Question 142: Which three of the following are some of the methods that F5...
Question 143: Which three of these file types work well with HTTP compress...
Question 144: Which two of the following statements about how TMOS typical...
Question 145: Which four of these benefits does APM provide?...
Question 146: Which two of the following statements are accurate descripti...
Question 147: To share device information with F5 technical support, a cus...
Question 148: Using Fast Cache with ASM will:...
Question 149: Which of the following can be accomplished using iRules?...
Question 150: Which of the following is a benefit of using iRules?...
Question 151: SIMULATION The layer 3 security feature _______ Cookies that...
Question 152: Poor Web application performance contributes to which four o...
Question 153: TMOS is an F5 software module that runs on the BIG-IP platfo...
Question 154: CSRF is difficult to detect because:...
Question 155: Which of the following is NOT a method that TMOS uses to imp...
Question 156: GTM uses Auto Discovery to add virtual servers from both LTM...
Question 157: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 158: Which of the following TMOS feature enables BIG-IP to scale ...
Question 159: Why does the F5 Application Delivery Firewall solution mitig...
Question 160: Using file virtualization, what can the ARX do for customers...
Question 161: Using IP Geolocation, an organization can always direct a cl...
Question 162: Which two of these statements about OneConnect are true?...
Question 163: The ARX saves customers time, money and frustration through ...
Question 164: An LTM object that represents a downstream server contains t...
Question 165: Which four of the monitoring methods listed below can GTM us...
Question 166: The ARX is like a mini network manager. It is able to check ...
Question 167: Which of the following business benefits does storage tierin...
Question 168: Which four of the following statements about LDNS probes are...
Question 169: What are the two most common methods of placing a BIG-IP dev...
Question 170: In the next few years, 75% of new storage capacity will shif...
Question 171: Select the key question you would use to ask your customer r...
Question 172: Since F5 built GTM on the TMOS platform it can exist on the ...
Question 173: When an administrator creates a new access policy in the Vis...
Question 174: The BIG-IP determines the lowest connection speed between th...
Question 175: Similar to LTM monitors, GTM monitors use both an Interval a...
Question 176: Over the years, F5 has led the industry in which of the four...
Question 177: Which two of the following options can LTM use when all of t...
Question 178: When sizing a WebAccelerator deployment, you should base the...
Question 179: Which three of these software modules can you layer on top o...
Question 180: Although APM can interoperate with LTM, it is unable to use ...
Question 181: Complete the statement below by choosing the correct word or...
Question 182: For a typical business, what percentage of data does the ARX...
Question 183: The administrator must specify APM access control entries as...
Question 184: To make complex access policies easier to manage, an adminis...
Question 185: Match these terms with their description. Select and Place: ...
Question 186: ________% of F5 products are sent through thorough software ...
Question 187: The least connections load balancing method functions best w...
Question 188: It is common for free storage space to exist somewhere in a ...
Question 189: As a full TCP proxy, LTM acts as the termination point for b...
Question 190: Learning suggestions can be the result of:...
Question 191: The BIG-IP full proxy architecture has full visibility from ...
Question 192: Match each persistence method with the correct statement des...
Question 193: Which three of the following must be done in order for GTM t...
Question 194: The Protected Workspace client-side action provides more cli...
Question 195: Which of the following is NOT a profile type on the BIG-IP?...
Question 196: In a routed configuration, what does LTM do with the packet ...
Question 197: Using WOM for vMotion transfers across the WAN prevents VMwa...
Question 198: When using a redundant pair of LTMs, it is most advantageous...
Question 199: ARX can classify data based on all of the following EXCEPT:...
Question 200: An F5 customer must install WebAccelerator on top of LTM:...
Question 201: What happens when the data center that GTM recommends for a ...
Question 202: Which two of the following factors are often responsible for...
Question 203: APM administrators can configure access policies granting us...
Question 204: Which of the following is NOT a benefit of using SSL offload...
Question 205: Administrators can configure which three of the following lo...
Question 206: Which is NOT a function of ASM?...
Question 207: What are the two most common methods of placing a BIG-IP dev...
Question 208: Which of the following statements about cookie persistence i...
Question 209: One reason APM beats the competition is its ability to perfo...
Question 210: Which of the following is a client-side action in the Visual...
Question 211: Which three of these scenarios should you identify as being ...
Question 212: Select F5 platforms have which three certifications?...
Question 213: DNSSEC is a GTM add-on licensing feature....