<< Prev Question Next Question >>

Question 25/103

Which tool is used on BIG-IP systems to capture data packets?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
Question 1: Which statement is true concerning iRules?...
Question 2: Monitors can be assigned to which three resources? (Choose t...
Question 3: A BIG-IP has the following objects configured: A SNAT pool w...
Question 4: What is the purpose of MAC masquerading....
Question 5: You have created a custom profile named TEST2. The parent pr...
Question 6: What is the advantage of specifying three load balancing met...
Question 7: What is the primary benefit of associating Servers with Data...
Question 8: Which of the following statements are incorrect regarding pr...
Question 9: When initially configuring the GTM System using the config t...
Question 10: Which of the following storage type combinations are configu...
Question 11: Logging profiles are assigned to?...
Question 12: Which must be sent to the license server to generate a new l...
Question 13: Which statement accurately describes the difference between ...
Question 14: There are many user roles configurable on the BIG-IP ASM Sys...
Question 15: Which three must be done so that Generic Host Servers can be...
Question 16: An HTTP class is available
Question 17: How is persistence configured. (Exhibit)...
Question 18: Assume a virtual server has a ServerSSL profile. What SSL ce...
Question 19: Which of the following methods of protection is not availabl...
Question 20: Which action will take place when a failover trigger is dete...
Question 21: Which of the following is not a configurable parameter data ...
Question 22: What are the best reasons for using the Deployment Wizard? (...
Question 23: Which statement is true concerning the default communication...
Question 24: A site wishes to perform source address translation on packe...
Question 25: Which tool is used on BIG-IP systems to capture data packets...
Question 26: Which three methods can be used for initial access to a BIG-...
Question 27: Could an iRule perform persistence based on a cookie?...
Question 28: Which statement is true regarding OneConnect processing?...
Question 29: If the config tool is complete, which two access methods are...
Question 30: Assuming other fail-over settings are at their default state...
Question 31: Which two statements are true concerning the default communi...
Question 32: Which of the following statements are correct regarding posi...
Question 33: When configuring a pool member's monitor, which three associ...
Question 34: Which two statements describe differences between the active...
Question 35: A monitor has been defined using the HTTP monitor template. ...
Question 36: How is traffic flow through transparent virtual servers diff...
Question 37: Which two statements are true about NATs. (Choose two.)...
Question 38: A site needs a virtual server that will use an iRule to pars...
Question 39: An LTM has the 3 virtual servers, 2 SNATs, four self IP addr...
Question 40: You need to terminate client SSL traffic at the BIGElIP and ...
Question 41: How do you support non-intelligent DNS resolution in an envi...
Question 42: Which of the following is correct regarding User-defined Att...
Question 43: What does the bigip_add script do?...
Question 44: A BIG-IP has a virtual server at 150.150.10.10:80 with SNAT ...
Question 45: Which statement is true concerning packet filters?...
Question 46: Assume a client's traffic is being processed only by a NAT; ...
Question 47: Which of the following statements are correct regarding Atta...
Question 48: A site wishes to perform source address translation on packe...
Question 49: After editing and saving changes to the configuration file c...
Question 50: Which of the following methods of protection are used by the...
Question 51: What is the purpose of Zonerunner?...
Question 52: If a client's browser does not accept cookies, what occurs w...
Question 53: Listeners that correspond to non-floating self lP addresses ...
Question 54: An LTM has the 3 virtual servers, four self IP addresses def...
Question 55: Which statement is correct concerning differences between BI...
Question 56: What is the purpose of provisioning....
Question 57: What is a characteristic of iQuery?...
Question 58: What will likely happen if you were to define a LTM System i...
Question 59: Which level of parameter assumes the highest precedence in B...
Question 60: Which is the result when multiple monitors are assigned to a...
Question 61: An LTM has the 3 virtual servers, a SNAT, four self IP addre...
Question 62: Which of the following is not a feature of a standalone BIG-...
Question 63: Which statement is true regarding fail-over?...
Question 64: Which of the following methods of protection is not availabl...
Question 65: When network fail-over is enabled, which of the following is...
Question 66: An LTM has the 3 virtual servers, 2 SNATs, four self IP addr...
Question 67: Which two methods can be used to determine which BIG-IP is c...
Question 68: Which facility logs messages concerning GTM System parameter...
Question 69: Which statement about root DNS servers is true?...
Question 70: Where is connection mirroring configured....
Question 71: On a BIG-IP ASM 3600, in standalone mode, which of the follo...
Question 72: Which HTTP response code ranges indicate an error condition?...
Question 73: When DNS_REV is used as the probe protocol by the GTM System...
Question 74: A virtual server is listening at 10.10.1.100:80 and has the ...
Question 75: Assume the bigd daemon fails on the active system. Which thr...
Question 76: A user is building a security policy using the Deployment Wi...
Question 77: use a proprietary syntax language. must contain at least one...
Question 78: A virtual server at 10.10.1.100:80 has the rule listed below...
Question 79: Which method of protection is not provided by the Rapid Depl...
Question 80: Which statement is true concerning SNATs using automap....
Question 81: Which event is always triggered when a client initially conn...
Question 82: Which of the following is correct regarding static parameter...
Question 83: When users are created, which three access levels can be gra...
Question 84: In the following configuration, a virtual server has the fol...
Question 85: Which event is always triggered when the client sends data t...
Question 86: Which two ports must be enabled to establish communication b...
Question 87: Which statement about Generic Host Servers is true?...
Question 88: Under what condition must an appliance license be reactivate...
Question 89: A virtual server is defined using a source-address based per...
Question 90: A site has six members in a pool. All of the servers have be...
Question 91: A GTM System would like to ensure that a given LTM System is...
Question 92: What occurs when a load?command is issued?What occurs when a...
Question 93: What are some changes that must be made on the GTM System so...
Question 94: You have a pool of servers that need to be tested. All of th...
Question 95: Which of the following are properties of an ASM logging prof...
Question 96: Which cookie persistence method requires the fewest configur...
Question 97: Where is connection mirroring configured....
Question 98: What is the difference between primary and secondary DNS ser...
Question 99: Which of the following protocol protections is not provided ...
Question 100: How is persistence configured.
Question 101: Click the Exhibit Button an LTM has the 3 virtual servers, a...
Question 102: Assuming there are open connections through an active system...
Question 103: A BIG-IP has the following objects configured: A SNAT pool w...