<< Prev Question Next Question >>

Question 37/233

GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM devices.
(Fill in)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (233q)
Question 1: Which of the following is not a method of protection for use...
Question 2: LTM runs on______F5's proprietary product platform. (Fill in...
Question 3: Which of the following is NOT included on the F5 DevCentral ...
Question 4: Which statement is true concerning SNATs using SNAT pools an...
Question 5: Drag and Drop Question Match the five elements of the intell...
Question 6: With standard DNS, assuming no DNS request failures, which p...
Question 7: Which is a potential result when a trunk is configured on a ...
Question 8: Which statement is correct if a TOPbased monitor is assigned...
Question 9: Which cookie persistence method requires the fewest configur...
Question 10: On a BIG-IP ASM 3600, in standalone mode, which of the follo...
Question 11: Using IP Geolocation, an organization can always direct a cl...
Question 12: If the GTM System receives a packet destined for one of its ...
Question 13: As a full TCP proxy, LTM acts as the termination point for b...
Question 14: What does the insert XForwarded option in an HTTP profile do...
Question 15: Which must be sent to the license server to generate a new l...
Question 16: Which file contains the list of events for which the GTM Sys...
Question 17: The BIG-IP ASM System sets two types of cookies to enforce e...
Question 18: A virtual server is defined per the charts. The last five cl...
Question 19: A customer says his business wouldn't benefit from buying AR...
Question 20: ASM provides antivirus protection by:...
Question 21: Which programming language is the basis for F5 iRules?...
Question 22: Which three of the following statements describe a data cent...
Question 23: Which of the following protocol protections is not provided ...
Question 24: A pool is using Global Availability as its load balancing me...
Question 25: Which of the following is not a configurable parameter data ...
Question 26: When using a redundant pair of LTMs, it is most advantageous...
Question 27: Which is NOT an ASM protection method for cross site scripti...
Question 28: The SNMP monitor can collect data based on which three metri...
Question 29: When configuring monitors for individual pool members, which...
Question 30: What is the expected difference between two source address p...
Question 31: When choosing Fundamental as the Policy Builder security pol...
Question 32: Using Fast Cache with ASM will:...
Question 33: Which of the following methods of protection is not availabl...
Question 34: Using file virtualization, what can the ARX do for customers...
Question 35: An HTTP class is available
Question 36: Match each persistence method with the correct statement des...
Question 37: GTM uses the F5 ___________ protocol to synchronize performa...
Question 38: An inline ASM configuration requires:...
Question 39: If LTM uses the round robin load balancing method, which poo...
Question 40: Which four of the following statements about LDNS probes are...
Question 41: When using SNAT, which additional IP addresses will the BIG-...
Question 42: Which level of parameter assumes the highest precedence in B...
Question 43: Brute force protection will:
Question 44: Where is persistence mirroring configured....
Question 45: Logging profiles are assigned to?...
Question 46: All members of a pool must share the same service port?...
Question 47: APM provides access control lists at which two 051 layers...
Question 48: Which statement is true concerning cookie persistence....
Question 49: You can use an HTTP class profile to forward traffic that ma...
Question 50: FastCache will NOT work with compressed objects....
Question 51: Which three of these software modules can you layer on top o...
Question 52: The following request is sent to the BIG-IP ASM System: GET ...
Question 53: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 54: Which facility logs messages concerning GTM System parameter...
Question 55: What is the purpose of Zonerunner?...
Question 56: What is the purpose of provisioning?...
Question 57: Under what condition must an appliance license be reactivate...
Question 58: Which of the following is a language used for content provid...
Question 59: A, steaming profile will do which of the following?...
Question 60: Which two F5 platforms include specialized compression hardw...
Question 61: How many events can be referenced in a given iRule?...
Question 62: Which of the following are four of the benefits of the TMOS ...
Question 63: ________% of F5 products are sent through thorough software ...
Question 64: What technology does ARX use to create a logical abstraction...
Question 65: Which statement concerning virtual servers is true?...
Question 66: For a typical business, what percentage of data does the ARX...
Question 67: What is the purpose of provisioning....
Question 68: Which item is NOT a function of ASM?...
Question 69: The default staging-tightening period for attack signatures ...
Question 70: Which four of these scenarios will benefit from F5's WAN Opt...
Question 71: Which statement is true concerning the default communication...
Question 72: Which WOM feature replaces a long byte pattern, such as "100...
Question 73: Which of the following business benefits does storage tierin...
Question 74: A BIG-IP has the following objects configured: - A SNAT pool...
Question 75: Which of the following violations cannot be learned by Traff...
Question 76: LTM runs on________F5's proprietary product platform. (Fill ...
Question 77: Which statement about root DNS servers is true?...
Question 78: What does the BIG-IP_add script do?...
Question 79: ARX will detect any modification to a file on the second tie...
Question 80: Which four F5 products are on the TMOS platform? (Choose fou...
Question 81: A site has six members in a pool. All of the servers have be...
Question 82: When configuring the BIG-IP ASM System in redundant pairs, w...
Question 83: Assume a virtual server is configured with a ClientSSL profi...
Question 84: Which process or system can be monitored by the BIG-IP syste...
Question 85: True or False, WOM speeds up large file data transfer across...
Question 86: Which is the result when multiple monitors are assigned to a...
Question 87: A site needs to terminate client HTTPS traffic at the BIG-IP...
Question 88: Which three can be a part of a pool's definition? (Choose th...
Question 89: Which of the following are methods BIG-IP ASM utilizes to mi...
Question 90: When an administrator creates a new access policy in the Vis...
Question 91: Which two of the following statements about how TMOS typical...
Question 92: GTM solves which three of these standard DNS limitations? (C...
Question 93: Assuming there are open connections through an active system...
Question 94: Which of the following methods are used by the BIG-IP ASM Sy...
Question 95: Assume a client's traffic is being processed only by a NAT; ...
Question 96: A virtual server is listening at 10.10.1.100:any and has the...
Question 97: When building a policy based on live traffic using the autom...
Question 98: The current status of a given pool is ffline.(red). Which co...
Question 99: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 100: Drag and Drop Question Match the security-related term with ...
Question 101: Which of the following is correct regarding Userdefined Atta...
Question 102: Which of the following user roles have access to make change...
Question 103: A BIG-IP has a virtual server at 150.150.10.10:80 with SNAT ...
Question 104: Which statement is true concerning packet filters?...
Question 105: The partial configuration below includes an iRule, a virtual...
Question 106: Listeners that correspond to nonfloating self lP addresses a...
Question 107: A virtual server is defined per the charts. The last five cl...
Question 108: use a proprietary syntax language. must contain at least one...
Question 109: A virtual server is listening at 10.10.1.100:any and has the...
Question 110: Adding more RAM to a GTM device drastically improves query p...
Question 111: What are two advantages of the Quality of Service (QoS) load...
Question 112: A monitor has been defined using the HTTP monitor template. ...
Question 113: Sensitive parameter is a feature used to hide sensitive info...
Question 114: Assume a virtual server is configured with a ClientSSL profi...
Question 115: Which of the following statements best describes the ARX arc...
Question 116: Information leakage is a major obstacle to achieving PCI DSS...
Question 117: A user's access to resources can change based on the compute...
Question 118: Which two must be included in a WidelP definition for the Wi...
Question 119: An LTM has the 3 virtual servers, 2 SNATs, four self IP addr...
Question 120: In order to improve GTM performance, administrators should u...
Question 121: Which three of these scenarios should you identify as being ...
Question 122: Network Security personnel are entirely responsible for web ...
Question 123: ASM offers the most extensive, effective, and simplest to co...
Question 124: To share device information with F5 technical support, a cus...
Question 125: A security audit has determined that your web application is...
Question 126: What feature of the F5 Exchange solution helps administrator...
Question 127: Which of the following statements are correct regarding Atta...
Question 128: There are many user roles configurable on the BIG-IP ASM Sys...
Question 129: Which of the following is correct regarding static parameter...
Question 130: How is MAC masquerading configured....
Question 131: Which of the following are default settings when using the P...
Question 132: A GTM System performs a name resolution that is not a WideIP...
Question 133: The APM Dashboard enables administrators to monitor which tw...
Question 134: Which three statements are true about SNATs? (Choose three.)...
Question 135: Even though F5 is an application delivery controller, it can...
Question 136: Which statement is true concerning SNATs using automap....
Question 137: The drawback to having BIG-IP act as a full application prox...
Question 138: Which statement is true regarding OneConnect processing?...
Question 139: APM provides access control lists at which two OSI layers? (...
Question 140: How is persistence configured. (Exhibit)...
Question 141: Select the key reasons F5 is able to handle DNS DDoS attacks...
Question 142: WebAccelerator uses three tiers to improve performance. What...
Question 143: How do you support nonintelligent DNS resolution in an envir...
Question 144: Which two of the following statements are accurate descripti...
Question 145: One reason APM beats the competition is its ability to perfo...
Question 146: A monitor has been defined using the HTTP monitor template. ...
Question 147: The BIG-IP determines the lowest connection speed between th...
Question 148: A _______ object maps a FQDN to virtual servers. (Fill in)...
Question 149: When an optimized TCP connection exists between LTM and the ...
Question 150: Which three of these are the potential ending options for br...
Question 151: Why would an administrator capture monitor traffic between a...
Question 152: A site has six members in a pool. Three of the servers are n...
Question 153: What is the advantage of specifying three load balancing met...
Question 154: Which two statements are true concerning capabilities of cur...
Question 155: An LTM has the 3 virtual servers, a SNAT, four self IP addre...
Question 156: A site would like to ensure that a given web server's defaul...
Question 157: What occurs when a save-config command is issued?...
Question 158: Why does the F5 Application Delivery Firewall solution mitig...
Question 159: Mobile device browsers typically display Web pages more slow...
Question 160: Which of the following can be accomplished using iRules?...
Question 161: The ARX saves customers time, money and frustration through ...
Question 162: Which three of these file types work well with HTTP compress...
Question 163: How is traffic flow through transparent virtual servers diff...
Question 164: In the next few years, 75% of new storage capacity will shif...
Question 165: Which of the following statements are incorrect regarding pr...
Question 166: The Flow Login feature prevents which web vulnerability from...
Question 167: Where do you configure GTM client persistence?...
Question 168: A site wishes to perform source address translation on packe...
Question 169: Which statement is true concerning packet filters?...
Question 170: Administrators can configure which three of the following lo...
Question 171: iQuery is a proprietary protocol that distributes metrics ga...
Question 172: Why does deploying LTM into an existing network immediately ...
Question 173: Assume a BIG-IP has no NATs or SNATs configured. Which two s...
Question 174: Monitors can be assigned to which three resources. (Choose t...
Question 175: When configuring a Virtual Server to use an iRule with an HT...
Question 176: When upgrading a BIG-IP redundant pair, what happens when on...
Question 177: When probing LDNSs, which protocol is used by default?...
Question 178: Which of the following storage type combinations are configu...
Question 179: Basic F5 IP Geo location provides which four types of client...
Question 180: Where is persistence mirroring configured....
Question 181: An age-based policy is set up on the ARX that retains only d...
Question 182: Where is connection mirroring configured....
Question 183: Which persistence method will always recognize a client when...
Question 184: Which two statements are true about SNATs. (Choose two.)...
Question 185: Which of the following TMOS feature enables BIG-IP to scale ...
Question 186: Which statement is true about the synchronization process, a...
Question 187: Select the best word or phrase to complete the following sen...
Question 188: Which statement is true concerning iRule context?...
Question 189: Which parameters are set to the same value when a pair of BI...
Question 190: Which method of protection is not provided by the Rapid Depl...
Question 191: Using IP Geolocation, an organization can always direct a cl...
Question 192: Customers can purchase LTM as a stand-alone product, or laye...
Question 193: Which two statements are true concerning the default communi...
Question 194: Which of the following is not a feature of a standalone BIG-...
Question 195: Given the configuration shown below, if a connection request...
Question 196: If the config tool is complete, which two access methods are...
Question 197: If a customer has an application that uses a customized prot...
Question 198: Which three statements describe a characteristic of profiles...
Question 199: Generally speaking, should the monitor templates be used as ...
Question 200: Flow login allows for more granular protection of login and ...
Question 201: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 202: Without creating a userdefined region, what is the most spec...
Question 203: The following iRule is being used within a persistence profi...
Question 204: Which of the following is NOT a logging option within an APM...
Question 205: The layer 3 security feature _______ Cookies that protects a...
Question 206: An F5 customer must install WebAccelerator on top of LTM:...
Question 207: The current status of a given pool member is nknown. Which c...
Question 208: A site is load balancing to a pool of web servers. Which sta...
Question 209: Assuming that systems are synchronized, which action could t...
Question 210: Which tool is used on BIG-IP systems to capture data packets...
Question 211: An administrator is planning on solving latency issues by pl...
Question 212: When a pool is created and saved to file, where is the defau...
Question 213: To make complex access policies easier to manage, an adminis...
Question 214: Which HTTP response code ranges indicate an error condition?...
Question 215: A site needs a virtual server that will use an iRule to pars...
Question 216: Which two of the following LTM load balancing methods requir...
Question 217: What is the primary benefit of associating Servers with Data...
Question 218: Which three of the following must be done in order for GTM t...
Question 219: GTM can load balance to LTM in addition to non-BIG-IP hosts....
Question 220: If a client's browser does not accept cookies, what occurs w...
Question 221: The F5 Visual Policy Editor (VPE) is unique to the F5 BIG-IP...
Question 222: If your customer has a policy requirement that cannot be han...
Question 223: Which four of these benefits does APM provide? (Choose four....
Question 224: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 225: What is NOT a benefit of using a SNAT?...
Question 226: Which are immediate results of entering the following comman...
Question 227: Which four of these statements regarding object size and Web...
Question 228: Similar to LTM monitors, GTM monitors use both an Interval a...
Question 229: Drag and Drop Question Place the following items in the orde...
Question 230: Although not all modules run on all platforms, each F5 hardw...
Question 231: Which three parameters could be used to determine whether a ...
Question 232: The incoming client IP address is 205.12.45.52. The last fiv...
Question 233: Which of the following is a client-side action in the Visual...