<< Prev Question Next Question >>

Question 37/131

An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.251:80 and host the same Web application. What is this object?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (131q)
Question 1: Select the two best questions you would use to ask your cust...
Question 2: Match the security-related term with the correct definition....
Question 3: Since F5 built GTM on the TMOS platform it can exist on the ...
Question 4: Which two of the following LTM load balancing methods requir...
Question 5: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 6: To function properly, an Enterprise Manager device is requir...
Question 7: What does the insert X-Forwarded option in an HTTP profile d...
Question 8: The default staging-tightening period for attack signatures ...
Question 9: Which two daemons only run after the entire license process ...
Question 10: Monitors can be assigned to which three resources? (Choose t...
Question 11: Which four of the monitoring methods listed below can GTM us...
Question 12: In the following configuration, a virtual server has the fol...
Question 13: What is the purpose of the GTM Systems Address Exclusion Lis...
Question 14: A request is sent to the BIG-IP ASM System that generates a ...
Question 15: When users are created, which three access levels can be gra...
Question 16: Which three of these are the potential ending options for br...
Question 17: TMOS is an F5 software module that runs on the BIG-IP platfo...
Question 18: An administrator is adding GTM to the network infrastructure...
Question 19: Which of the following are properties of an ASM logging prof...
Question 20: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 21: Which of the following storage type combinations are configu...
Question 22: Which protocol Authenticates network traffic between hosts e...
Question 23: A site has six members in a pool. All of the servers have be...
Question 24: An administrator needs to selectively compress HTTP traffic ...
Question 25: The incoming client IP address is 205.12.45.52. The last fiv...
Question 26: A company recently opened a new branch site. The site needs ...
Question 27: What is used to provide mutual authentication for TLS/SSL?...
Question 28: An F5 customer must install WebAccelerator on top of LTM:...
Question 29: It is common for free storage space to exist somewhere in a ...
Question 30: A user's access to resources can change based on the compute...
Question 31: What occurs when a save-config command is issued?...
Question 32: The administrator must specify APM access control entries as...
Question 33: A pool is using Global Availability as its load balancing me...
Question 34: What is a primary reason to choose hardware over virtual dev...
Question 35: What is the main business driver for bringing Enterprise Man...
Question 36: As a full TCP proxy, LTM acts as the termination point for b...
Question 37: An LTM object contains both IP address and port combinations...
Question 38: Select the key question you would use to ask your customer r...
Question 39: Which is NOT a function of ASM?...
Question 40: What is NOT a benefit of using a SNAT?...
Question 41: ARP provides translation between which two address types?...
Question 42: Which tool is used on BIG-IP systems to capture data packets...
Question 43: Which two processes are involved when BIG-IP systems issue t...
Question 44: An application uses a proprietary protocol running over TCP ...
Question 45: Basic F5 IP Geo location provides which four types of client...
Question 46: Another name for the F5 OneConnect feature is TCP multiplexi...
Question 47: The current status of a given pool is offline (red). Which c...
Question 48: In the current version of BIG-IP, what happens if the GTM do...
Question 49: ASM can detect Layer 7 DoS attacks by which four ways of mon...
Question 50: Which two must be included in a Wide-lP definition for the W...
Question 51: Which three parameters could be used to determine whether a ...
Question 52: DRAG DROP Match these terms with their description. Select a...
Question 53: A pool is using Round Trip Time as its load balancing method...
Question 54: FastCache will NOT work with compressed objects....
Question 55: Where do you configure GTM client persistence? Case Study Ti...
Question 56: Which of the following methods of protection is not availabl...
Question 57: Using IP Geolocation, an organization can always direct a cl...
Question 58: Which of the following is NOT a benefit of using SSL offload...
Question 59: When configuring a pool member's monitor, which three associ...
Question 60: You have a pool of servers that need to be tested. All of th...
Question 61: Which must be sent to the license server to generate a new l...
Question 62: Which statement is correct concerning differences between BI...
Question 63: Which statement is true concerning iRule context?...
Question 64: Which three properties can be assigned to nodes? (Choose thr...
Question 65: A customer says his business wouldn't benefit from buying AR...
Question 66: The partial configuration below includes an iRule, a virtual...
Question 67: Which of the following are methods BIG-IP ASM utilizes to mi...
Question 68: As a full TCP proxy, LTM acts as the termination point for b...
Question 69: A BIG-IP Administrator needs to make sure that requests from...
Question 70: A BIG IP Administrator is trying to reach the internal web s...
Question 71: A company deploys F5 load balancers to manage number of secu...
Question 72: Which device type in the topology will forward network packe...
Question 73: IP Enforcer blocks IP addresses that have repeatedly and reg...
Question 74: What is the primary function of a certificate authority?...
Question 75: Assume a client's traffic is being processed only by a NAT; ...
Question 76: Which four of the following items are physical objects used ...
Question 77: An F5 customer must install WebAccelerator on top of LTM:...
Question 78: Which statement describes advanced shell access correctly? W...
Question 79: The following iRule is being used within a persistence profi...
Question 80: What is used to resolve IP address to MAC address mappings?...
Question 81: Which three of the metrics listed below can GTM use when mak...
Question 82: Which facility logs messages concerning GTM System parameter...
Question 83: LTM runs on______F5's proprietary product platform. (Fill in...
Question 84: To make complex access policies easier to manage, an adminis...
Question 85: Which parameters are set to the same value when a pair of BI...
Question 86: Exhibit. (Exhibit) the Web application Server made a query t...
Question 87: When an administrator creates a new access policy in the Vis...
Question 88: A site is load balancing to a pool of web servers. Which sta...
Question 89: Learning suggestions in the Policy Building pages allow for ...
Question 90: Which type of certificate is pre-installed in a web browser'...
Question 91: How is persistence configured. (Exhibit)...
Question 92: WebAccelerator uses three tiers to improve performance. What...
Question 93: On a BIG-IP ASM 3600, in standalone mode, which of the follo...
Question 94: The current status of a given pool member is nknown. Which c...
Question 95: An administrator is planning on solving latency issues by pl...
Question 96: Administrators can configure which three of the following lo...
Question 97: What is the purpose of Zonerunner?...
Question 98: TMOS is an F5 software module that runs on the BIG-IP platfo...
Question 99: Which three of the following are benefits of adding WebAccel...
Question 100: In the next few years, 75% of new storage capacity will shif...
Question 101: To function properly, an Enterprise Manager device is requir...
Question 102: An LTM has the 3 virtual servers, 2 SNATs, four self IP addr...
Question 103: A monitor has been defined using the HTTP monitor template. ...
Question 104: Which three properties can be assigned to nodes. (Choose thr...
Question 105: Another name for the F5 OneConnect feature is TCP multiplexi...
Question 106: The APM Dashboard enables administrators to monitor which tw...
Question 107: An administrator needs to provide access to corporate resour...
Question 108: Which two must be included in a Wide-IP definition for the W...
Question 109: When can a single virtual server be associated with multiple...
Question 110: Which three of these file types work well with HTTP compress...
Question 111: Which two statements are true concerning the default communi...
Question 112: A user fails to provide credentials when requesting a web re...
Question 113: Complete the statement below by choosing the correct word or...
Question 114: Adding more RAM to a GTM device drastically improves query p...
Question 115: An administrator suspects that a BIG IP appliance is experie...
Question 116: A pool is using Global Availability as its load balancing me...
Question 117: When a virtual server has an HTTP profile with compression e...
Question 118: A virtual server is listening at 10.10.1.100:any and has the...
Question 119: Generally speaking, should the monitor templates be used as ...
Question 120: The production version of BIG-IP Virtual Edition is limited ...
Question 121: An administrator needs to lower .he amount of new TCP connec...
Question 122: Which WOM feature replaces a long byte pattern, such as "100...
Question 123: Which three of these scenarios should you identify as being ...
Question 124: If LTM uses the round robin load balancing method, which poo...
Question 125: Data centers often rely on either traditional firewalls or n...
Question 126: The users in a company are unable to send and receive SMTP e...
Question 127: TCP Express is licensed separately from LTM...
Question 128: Which statement is true regarding failover?...
Question 129: LTM can only load balance outbound traffic by using iRules...
Question 130: The APM Dashboard enables administrators to monitor which tw...
Question 131: Using file virtualization, what can the ARX do for customers...