<< Prev Question Next Question >>

Question 45/231

What feature of the F5 Exchange solution helps administrators to streamline implementation for added security and granular control?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (231q)
Question 1: The F5 Application Delivery Firewall has the ability to outp...
Question 2: If the config tool is complete, which two access methods are...
Question 3: What are two advantages of the Quality of Service (QoS) load...
Question 4: ARX will detect any modification to a file on the second tie...
Question 5: If LTM uses the round robin load balancing method, which poo...
Question 6: What is the difference between primary and secondary DNS ser...
Question 7: Brute force protection will:
Question 8: The production version of BIG-IP Virtual Edition is limited ...
1 commentQuestion 9: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 10: When installing LTM on different VIPRION performance blades,...
Question 11: Without creating a user defined region, what is the most spe...
Question 12: Which of the following statements best describes the ARX arc...
Question 13: iQuery is a proprietary protocol that distributes metrics ga...
Question 14: Which two are events that can be used to trigger GTM iRule d...
Question 15: DRAG DROP Match the five elements of the intelligent file vi...
Question 16: How is persistence configured?
Question 17: Which of the following is correct concerning HTTP classes?...
Question 18: Which two can be a part of a virtual server's definition? (C...
Question 19: Which statement is true concerning SSL termination....
Question 20: Which statement is correct if a TOP-based monitor is assigne...
Question 21: In order to ensure that a specific file type is never moved ...
Question 22: Which two of the following are costs businesses may face in ...
Question 23: To function properly, an Enterprise Manager device is requir...
Question 24: Which of the following statements is true about ARX's capaci...
Question 25: Assume the bigd daemon fails on the active system. Which thr...
Question 26: Which two of the following statements are accurate descripti...
Question 27: The Protected Workspace client-side action provides more cli...
Question 28: Which IP address will the client address be changed to when ...
Question 29: What is the purpose of MAC masquerading?...
Question 30: The ARX saves customers time, money and frustration through ...
Question 31: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 32: A virtual server is listening at 10.10.1.100:any and has the...
Question 33: What is the purpose of floating self-IP addresses?...
Question 34: For a typical business, what percentage of data does the ARX...
Question 35: As a part of the Setup Utility, the administrator sets the h...
Question 36: The current status of a given pool member is unknown. Which ...
Question 37: Using Fast Cache with ASM will:...
Question 38: Which statement is true concerning SNATs using automap?...
Question 39: Basic F5 IP Geo location provides which four types of client...
Question 40: Identifying users by their IP address is a sufficient method...
Question 41: What will likely happen if you were to define a LTM System i...
Question 42: The incoming client IP address is 195.64.45.52 and the last ...
Question 43: How does the ARX eliminate the disruption caused by re-provi...
Question 44: Which of the following statements are correct regarding posi...
Question 45: What feature of the F5 Exchange solution helps administrator...
Question 46: Which is an advantage of terminating SSL communication at th...
Question 47: What is the advantage of specifying three load balancing met...
Question 48: APM can verify which four of the following details before gr...
Question 49: There are multiple HTTP class profiles assigned to a virtual...
Question 50: The SNMP monitor can collect data based on which three metri...
Question 51: A pool is using Global Availability as its load balancing me...
Question 52: Which facility logs messages concerning GTM System parameter...
Question 53: Which three can be a part of a pool's definition? (Choose th...
Question 54: A security audit has determined that your web application is...
Question 55: Which of the following is NOT a logging option within an APM...
Question 56: Where is persistence mirroring configured?...
Question 57: Which of the following statements are incorrect regarding pr...
Question 58: Select the two best questions you would use to ask your cust...
Question 59: Generally speaking, should the monitor templates be used as ...
Question 60: You have a pool of servers that need to be tested. All of th...
Question 61: A GTM System would like to ensure that a given LTM System is...
Question 62: What is the expected difference between two source address p...
Question 63: When probing LDNSs, which protocol is used by default?...
Question 64: When is a Virtual Server hosted by an LTM System defined wit...
Question 65: Which statement accurately describes the difference between ...
Question 66: A client sends a request to a virtual server http://www.foo....
Question 67: In most cases, F5 recommends using round robin load balancin...
Question 68: A virtual server is defined per the charts. The last five cl...
Question 69: A BIG-IP has two SNATs, a pool of DNS servers and a virtual ...
Question 70: When configuring a pool member's monitor, which three associ...
Question 71: ARX can classify data based on all of the following EXCEPT:...
Question 72: All members of a pool must share the same service port?...
Question 73: Which of the following are default settings when using the P...
Question 74: The BIG-IP ASM System sets two types of cookies to enforce e...
Question 75: What are some changes that must be made on the GTM System so...
Question 76: A virtual server is listening at 10.10.1.100:any and has the...
Question 77: A BIG-IP has two load balancing virtual servers at 150.150.1...
Question 78: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 79: The Protected Workspace client-side action provides more cli...
Question 80: Which aspect of F5's Intelligent Services Platform helps you...
Question 81: What is the purpose of provisioning?...
Question 82: ASM provides antivirus protection by:...
Question 83: Which four of these statements regarding object size and Web...
Question 84: An F5 customer must install WebAccelerator on top of LTM:...
Question 85: Which VLANs must be enabled for a SNAT to perform as desired...
Question 86: Which statement describes a typical purpose of iRules?...
Question 87: Which of the following statements are correct regarding Atta...
Question 88: What is a characteristic of iQuery?...
Question 89: A site wishes to delegate the name .wmysite.com to a GTM Sys...
Question 90: Which process or system can be monitored by the BIG-IP syste...
Question 91: Which of the following methods of protection is not availabl...
Question 92: Logging profiles are assigned to?...
Question 93: An inline ASM configuration requires:...
Question 94: DRAG DROP Match these terms with their description. Select a...
Question 95: Which of the following methods of protection operates on ser...
Question 96: Assuming there are open connections through an active system...
Question 97: What percentage of storage in a typical environment is activ...
Question 98: Although not all modules run on all platforms, each F5 hardw...
Question 99: A monitor has been defined using the HTTP monitor template. ...
Question 100: Administrators can specify an APM access profile when defini...
Question 101: When configuring the BIG-IP ASM System in redundant pairs, w...
Question 102: DRAG DROP Match the security-related term with the correct d...
Question 103: Which two F5 platforms include specialized compression hardw...
Question 104: Assume a client's traffic is being processed only by a NAT; ...
Question 105: Which four are GTM server static load balancing modes? (Choo...
Question 106: Replicating a large database between sites could take severa...
Question 107: Which of the following is correct regarding static parameter...
Question 108: Why does the F5 Application Delivery Firewall solution mitig...
Question 109: Select F5 platforms have which three certifications? (Choose...
Question 110: Which statement is true concerning iRule events....
Question 111: Which is NOT a function of ASM?...
Question 112: When we have a * wildcard entity configured in the File Type...
Question 113: The partial configuration below includes an iRule, a virtual...
Question 114: Select the question you would ask your customer related to D...
Question 115: An age-based policy is set up on the ARX that retains only d...
Question 116: Which two ports must be enabled to establish communication b...
Question 117: A customer says his business wouldn't benefit from buying AR...
Question 118: A pool is using Round Trip Time as its load balancing method...
Question 119: Which three iRule events are likely to be seen in iRules des...
Question 120: Which four of the following items are physical objects used ...
Question 121: The ARX is like a mini network manager. It is able to check ...
Question 122: ________% of F5 products are sent through thorough software ...
Question 123: Monitors can be assigned to which three resources? (Choose t...
Question 124: Which three of the following are some of the methods that F5...
Question 125: With standard DNS, assuming no DNS request failures, which p...
Question 126: Which of the following does NOT describe network performance...
Question 127: Complete the statement below by choosing the correct word or...
Question 128: Assume a virtual server is configured with a ClientSSL profi...
Question 129: Which statement is correct concerning differences between BI...
Question 130: A customer wants the best possible throughput but only has a...
Question 131: Which of the following is not a configurable parameter data ...
Question 132: An administrator is planning on solving latency issues by pl...
Question 133: When initially configuring the GTM System using the config t...
Question 134: Which of the following business benefits does storage tierin...
Question 135: Use a proprietary syntax language. Must contain at least one...
Question 136: True or False, WOM speeds up large file data transfer across...
Question 137: Which three of the following statements describe a data cent...
Question 138: DRAG DROP Place the following items in the order that the BI...
Question 139: If your customer has a policy requirement that cannot be han...
Question 140: Which of the following is correct regarding User-defined Att...
Question 141: Select the key question you would use to ask your customer r...
Question 142: When using a single BIG-IP with APM, an organization can sup...
Question 143: A request is sent to the BIG-IP ASM System that generates a ...
Question 144: Which three of these are the potential ending options for br...
Question 145: Which WOM feature replaces a long byte pattern, such as "100...
Question 146: Where is the load balancing mode specified?...
Question 147: The default staging-tightening period for attack signatures ...
Question 148: Which three are GTM server dynamic load balancing modes? (Ch...
Question 149: Where is connection mirroring configured?...
Question 150: The Device Inventory option in Enterprise Manager can replac...
Question 151: DRAG DROP Match the security-related term with the correct d...
Question 152: Which statement is true regarding failover?...
Question 153: Which item is NOT a function of ASM?...
Question 154: There are many user roles configurable on the BIG-IP ASM Sys...
Question 155: Using IP Geolocation, an organization can always direct a cl...
Question 156: Which is NOT an ASM protection method for cross site scripti...
Question 157: Tightening is a feature of which type of entity?...
Question 158: In the next few years, 75% of new storage capacity will shif...
Question 159: What is the main business driver for bringing Enterprise Man...
Question 160: Which four of these scenarios will benefit from F5's WAN Opt...
Question 161: You have created a custom profile named TEST2. The parent pr...
Question 162: Which two must be included in a Wide-IP definition for the W...
Question 163: A BIG-IP has a virtual server at 150.150.10.10:80 with SNAT ...
Question 164: Using file virtualization, what can the ARX do for customers...
Question 165: When DNS_REV is used as the probe protocol by the GTM System...
Question 166: An HTTP class is available
Question 167: Assume a BIG-IP has no NATs or SNATs configured. Which two s...
Question 168: Which of these statements about a stream profile is false?...
Question 169: A site needs a virtual server that will use an iRule to pars...
Question 170: A site wishes to perform source address translation on packe...
Question 171: When a business is hacked, they often lose more than money. ...
Question 172: Which of the following does not pertain to protecting the Re...
Question 173: A GTM System performs a name resolution that is not a Wide-I...
Question 174: Assume a client's traffic is being processed only by a NAT; ...
Question 175: A standard virtual server is defined with a pool and a SNAT ...
Question 176: Which events are valid iRule events triggered by BIG-IP ASM ...
Question 177: Even though F5 is an application delivery controller, it can...
Question 178: A user's access to resources can change based on the compute...
Question 179: Which event is always triggered when a client initially conn...
Question 180: Which three must be done so that Generic Host Servers can be...
Question 181: To share device information with F5 technical support, a cus...
Question 182: A site wishes to perform source address translation on packe...
Question 183: Which statement about root DNS servers is true?...
Question 184: In the current version of BIG-IP, what happens if the GTM do...
Question 185: Which of the following is a language used for content provid...
Question 186: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 187: If a client's browser does not accept cookies, what occurs w...
Question 188: When using SNAT, which additional IP addresses will the BIG-...
Question 189: ASM Geolocation reporting provides information regarding:...
Question 190: Which of the following platforms support both standalone and...
Question 191: Which of the following methods of protection is not availabl...
Question 192: Network Security personnel are entirely responsible for web ...
Question 193: What is the primary benefit of associating Servers with Data...
Question 194: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 195: Which of the following mitigation techniques is based on ano...
Question 196: Which three properties can be assigned to nodes? (Choose thr...
Question 197: Which two statements are true about SNATs? (Choose two.)...
Question 198: Which event is always triggered when the client sends data t...
Question 199: What is the main cause of high latency in a Web application?...
Question 200: How is persistence configured? (Exhibit)...
Question 201: Which two statements are true about NATs? (Choose two.)...
Question 202: Which two methods can be used to determine which BIG-IP is c...
Question 203: The BIG-IP ASM System is configured with a virtual server th...
Question 204: Which parameters are set to the same value when a pair of BI...
Question 205: Which four of these benefits does APM provide? (Choose four....
Question 206: When users are created, which three access levels can be gra...
Question 207: Select the best word or phrase to complete the following sen...
Question 208: The ARX can see ________ when a data modification takes plac...
Question 209: Which cookie persistence method requires the fewest configur...
Question 210: Which item is NOT a function of a properly deployed and conf...
Question 211: How do you support non intelligent DNS resolution in an envi...
Question 212: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 213: Which two of the following statements about how TMOS typical...
Question 214: A, steaming profile will do which of the following?...
Question 215: Which of the following can be associated with an XML profile...
Question 216: It is common for free storage space to exist somewhere in a ...
Question 217: When can a single virtual server be associated with multiple...
Question 218: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 219: Which statement is true concerning cookie persistence....
Question 220: Which of the following protocol protections is not provided ...
Question 221: Learning suggestions can be the result of:...
Question 222: What technology does ARX use to create a logical abstraction...
Question 223: Listeners that correspond to nonfloating self IP addresses a...
Question 224: Data centers often rely on either traditional firewalls or n...
Question 225: What is the purpose of the GTM Systems Address Exclusion Lis...
Question 226: The VIPRION provides hot-pluggable capabilities for which fo...
Question 227: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 228: When network failover is enabled, which of the following is ...
Question 229: Sensitive parameter is a feature used to hide sensitive info...
Question 230: Which two statements are true concerning the default communi...
Question 231: Which of the following methods are used by the BIG-IP ASM Sy...