<< Prev Question

Question 205/205

Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (205q)
Question 1: The SNMP monitor can collect data based on which three metri...
Question 2: A BIG-IP Administrator needs to create a route to send traff...
Question 3: An age-based policy is set up on the ARX that retains only d...
Question 4: When is a Virtual Server hosted by an LTM System defined wit...
Question 5: An administrator needs to load balance connections to the ap...
Question 6: What percentage of storage in a typical environment is activ...
Question 7: A site wishes to perform source address translation on packe...
Question 8: What are the two most common methods of placing a BIG-IP dev...
Question 9: Tightening is a feature of which type of entity?...
Question 10: Assuming there are open connections through an active system...
Question 11: To make complex access policies easier to manage, an adminis...
Question 12: How is persistence configured. (Exhibit)...
Question 13: Although APM can interoperate with LTM, it is unable to use ...
Question 14: A site needs to terminate client HTTPS traffic at the BIG-IP...
Question 15: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 16: Assume a virtual server is configured with a ClientSSL profi...
Question 17: Which three of the following are benefits of adding WebAccel...
Question 18: A BIG-IP has two load balancing virtual servers at 150.150.1...
Question 19: With standard DNS, assuming no DNS request failures, which p...
Question 20: What is the purpose of provisioning....
Question 21: GTM solves which three of these standard DNS limitations?...
Question 22: Which Datalink sublayer has the primary funcl.cn of proving ...
Question 23: What is the primary benefit of associating Servers with Data...
Question 24: A virtual server is listening at 10.10.1.100:any and has the...
Question 25: What is the purpose of the GTM Systems Address Exclusion Lis...
Question 26: Select the question you would ask your customer related to D...
Question 27: Which aspect of F5's Intelligent Services Platform helps you...
Question 28: Which service should be configured to allow BIG-IP devices t...
Question 29: Which statement is true concerning the default communication...
Question 30: Assume a virtual server is configured with a ClientSSL profi...
Question 31: It is common for free storage space to exist somewhere in a ...
Question 32: The ICMP monitor has been assigned to all nodes. In addition...
Question 33: Which of the following statements are correct regarding Atta...
Question 34: Which function does the Presentation Layer provide?...
Question 35: Which of the following statements about cookie persistence i...
Question 36: Assuming other failover settings are at their default state,...
Question 37: Drag and Drop Question Match the security-related term with ...
Question 38: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 39: What should a BIG-IP Administrator configure to minimize imp...
Question 40: In the following configuration, a virtual server has the fol...
Question 41: A BIG-IP has two load balancing virtual servers at 150.150.1...
Question 42: DRAG DROP Match the security-related term with the correct d...
Question 43: Which method of protection is not provided by the Rapid Depl...
Question 44: The ARX can see ________ when a data modification takes plac...
Question 45: Which four of the following items are physical objects used ...
Question 46: The ARX saves customers time, money and frustration through ...
Question 47: The current status of a given pool is ffline.(red). Which co...
Question 48: Similar to LTM monitors, GTM monitors use both an Interval a...
Question 49: Where is the load-balancing mode specified....
Question 50: A BIO IP Administrator is troubleshooting a slow web applica...
Question 51: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 52: Which statement concerning virtual servers is true?...
Question 53: An LTM has the 3 virtual servers, four self IP addresses def...
Question 54: Which of the following is NOT a method that TMOS uses to imp...
Question 55: To make complex access policies easier to manage, an adminis...
Question 56: Assume a virtual server is configured with a ClientSSL profi...
Question 57: ASM combined with LTM provides protection against:...
Question 58: Which of the following is correct regarding static parameter...
Question 59: A new virtual server is being tested to replace http://myapp...
Question 60: Select the key question you would use to ask your customer r...
Question 61: A BIG IP Administrator wants to add a new VLAN (VLAN 40) to ...
Question 62: LTM runs on________F5's proprietary product platform. (Fill ...
Question 63: Which protocol data unit (POU) is associated with the OSI mo...
Question 64: A Network Administrator needs a new networking device can pe...
Question 65: DNSSEC is a GTM add-on licensing feature....
Question 66: Basic F5 IP Geo location provides which four types of client...
Question 67: You can use an HTTP class profile to forward traffic that ma...
Question 68: An Administrator enables HTTP keep alive. How does this affe...
Question 69: Application trends and drivers that increase the need for ap...
Question 70: An administrator is planning on solving latency issues by pl...
Question 71: What will likely happen if you were to define a LTM System i...
Question 72: TCP Express is licensed separately from LTM...
Question 73: GTM uses Auto Discovery to add virtual servers from both LTM...
Question 74: iQuery is a proprietary protocol that distributes metrics ga...
Question 75: Select the best word or phrase to complete the following sen...
Question 76: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 77: Which statement is correct concerning differences between BI...
Question 78: Complete the statement below by choosing the correct word or...
Question 79: Assume a client's traffic is being processed only by a NAT; ...
Question 80: What is NOT a benefit of using a SNAT?...
Question 81: Which facility logs messages concerning GTM System parameter...
Question 82: After editing and saving changes to the configuration file c...
Question 83: Which three of these scenarios should you identify as being ...
Question 84: What is the main business driver for bringing Enterprise Man...
Question 85: An administrator is performing a capture from a lagged port ...
Question 86: Which four of these statements regarding object size and Web...
Question 87: Which event is always triggered when the client sends data t...
Question 88: It is common for free storage space to exist somewhere in a ...
Question 89: Which statement describes advanced shell access correctly? W...
Question 90: When using only LTM in redundant pairs, a customer can load ...
Question 91: ASM combined with LTM provides protection against:...
Question 92: Which of the following are the three main business drivers f...
Question 93: Which must be sent to the license server to generate a new l...
Question 94: Which three files/data items are included in a BIG-IP UCS ba...
Question 95: When initially configuring the GTM System using the config t...
Question 96: How is persistence configured? (Exhibit)...
Question 97: You can use an HTTP class profile to forward traffic that ma...
Question 98: An administrator connects two devices using an Ethernet cabl...
Question 99: Which two of the following LTM load balancing methods requir...
Question 100: To share device information with F5 technical support, a cus...
Question 101: Which of the following methods of protection is not availabl...
Question 102: When initially configuring the GTM System using the config t...
Question 103: The F5 Application Delivery Firewall has the ability to outp...
Question 104: A) (Exhibit) B) (Exhibit) C) (Exhibit)...
Question 105: What is the correct procedure to comply with the recommendat...
Question 106: Which of the following is a benefit of using iRules?...
Question 107: A BIG-IP has the following objects configured: A SNAT pool w...
Question 108: Which of the following business benefits does storage tierin...
Question 109: Match the five elements of the intelligent file virtualizati...
Question 110: When using SNAT, which additional IP addresses will the BIG-...
Question 111: Without decrypting, what portion of an HTTPS session is visi...
Question 112: An administrator needs to provide access to corporate resour...
Question 113: Using Fast Cache with ASM will:...
Question 114: LTM runs on________F5's proprietary product platform....
Question 115: The administrator must specify APM access control entries as...
Question 116: Which four of these scenarios will benefit from F5's WAN Opt...
Question 117: If your customer has a policy requirement that cannot be han...
Question 118: When installing LTM on different VIPRION performance blades,...
Question 119: Match these terms with their description. (Exhibit)...
Question 120: Since F5 built GTM on the TMOS platform it can exist on the ...
Question 121: Which two statements are true concerning the default communi...
Question 122: Which of the following statements about cookie persistence i...
Question 123: Which statement is true regarding fail-over?...
Question 124: Assuming there are open connections through an active system...
Question 125: Refer ex (Exhibit)
Question 126: On a BIG-IP ASM 3600, in standalone mode, which of the follo...
Question 127: Using WOM for vMotion transfers across the WAN prevents VMwa...
Question 128: DRAG DROP Match the five elements of the intelligent file vi...
Question 129: Assuming there are open connections through an active system...
Question 130: Click the Exhibit Button an LTM has the 3 virtual servers, a...
Question 131: Which statement is true regarding failover?...
Question 132: A site is load balancing to a pool of web servers. Which sta...
1 commentQuestion 133: CORRECT TEXT Place the following items in the order that the...
Question 134: DNSSEC is a GTM add-on licensing feature....
Question 135: What are the two most common methods of placing a BIG-IP dev...
Question 136: Which two protocol are used for the retrieval of email? (Cho...
Question 137: An administrator needs to do the following * install a load ...
Question 138: The APM Dashboard enables administrators to monitor which tw...
Question 139: APM provides access control lists at which two 051 layers...
Question 140: All members of a pool must share the same service port?...
Question 141: BIG-IP ASM is requesting automatic signature updates from th...
Question 142: A new VLAN segment has been added to the network. Only the e...
Question 143: What is an advantage of a packet forwarding architecture?...
Question 144: What is the purpose of the GTM Systems Address Exclusion Lis...
Question 145: Which two of the following statements about how TMOS typical...
Question 146: You can use an HTTP class profile to forward traffic that ma...
Question 147: GTM solves which three of these standard DNS limitations? (C...
Question 148: You need to terminate client SSL traffic at the BIG-IP and a...
Question 149: What is a characteristic of iQuery?...
Question 150: Which aspect of F5's Intelligent Services Platform helps you...
Question 151: Learning suggestions in the Policy Building pages allow for ...
Question 152: An LTM has the 3 virtual servers, a SNAT, four self IP addre...
Question 153: Which is NOT an ASM protectionmethod for cross site scriptin...
Question 154: Which two of the following factors are often responsible for...
Question 155: In the next few years, 75% of new storage capacity will shif...
Question 156: An administrator needs to rapidly deter e newly discovered s...
Question 157: Very low administrative impact:...
Question 158: Which HTTP response code ranges indicate an error condition?...
Question 159: Which of the following are correct regarding Wildcard entiti...
Question 160: In order to ensure that a specific file type is never moved ...
Question 161: Which of the following are four of the benefits of the TMOS ...
Question 162: Using WOM for vMotion transfers across the WAN prevents VMwa...
Question 163: Monitors can be assigned to which three resources? (Choose t...
Question 164: DRAG DROP Match the five elements of the intelligent file vi...
Question 165: ASM can detect Layer 7 DoS attacks by which four ways of mon...
Question 166: When an administrator creates a new access policy in the Vis...
Question 167: Which three files/data items are included in a BIG-IP UCS ba...
Question 168: When choosing Fundamental as the Policy Builder security pol...
Question 169: Match each persistence method with the correct statement des...
Question 170: An LTM object contains both IP address and port combinations...
Question 171: How does file caching affect the web application?...
Question 172: To function properly, an Enterprise Manager device is requir...
Question 173: An administrator needs to protect a web application from cro...
Question 174: Which file contains the list of events for which the GTM Sys...
Question 175: How do you support non-intelligent DNS resolution in an envi...
Question 176: A BIG-IP administrator is interested in using some of the vC...
Question 177: The ARX saves customers time, money and frustration through ...
Question 178: Which three parameters can be specified within the Setup Uti...
Question 179: When using a redundant pair of LTMs, it is most advantageous...
Question 180: A site wishes to delegate the name .wmysite.com to a GTM Sys...
Question 181: Which of the following storage type combinations are configu...
Question 182: Which of the following user roles have access to make change...
Question 183: What is a common use of an iRule?...
1 commentQuestion 184: Which are immediate results of entering the following comman...
Question 185: A website is using source address persistence with a 30 seco...
Question 186: Which two of the following are costs businesses may face in ...
Question 187: Why is BIG-IP ASM ideally suited to protect against layer 7 ...
Question 188: Given the configuration shown below, if a connection request...
Question 189: Which is the result when multiple monitors are assigned to a...
Question 190: APM provides access control lists at which two 051 layers...
Question 191: An organization needs to protect its data center from layer ...
Question 192: The F5 Application Delivery Firewall has the ability to outp...
Question 193: Drag and Drop Question Match the five elements of the intell...
Question 194: The Protected Workspace client-side action provides more cli...
Question 195: TMOS is an F5 software module that runs on the BIG-IP platfo...
Question 196: Learning suggestions can be the result of:...
Question 197: An administrator needs to selectively compress HTTP traffic ...
Question 198: When a pool is created and saved to file, where is the defau...
Question 199: Which of the following methods of protection is not availabl...
Question 200: Which protocol data unit (PDU) is associated with the OSI mo...
Question 201: Select the key reasons F5 is able to handle DNS DDoS attacks...
Question 202: In which FTP mode is the serve, responsible for initiating t...
Question 203: CORRECT TEXT A_______object maps a FQDN to virtual servers. ...
Question 204: Which of the following statements about cookie persistence i...
Question 205: Which aspect of F5's Intelligent Services Platform helps you...