101 - Application Delivery Fundamentals

Go back to F5

Example Questions

A site has six members in a pool. All of the servers have been designed, built, and configured with the same applications. It is known that each client's interactions vary significantly and can affect the performance of the servers. If traffic should be sent to all members on a regular basis, which load-balancing mode is most effective if the goal is to maintain a relatively even load across all servers? Which statement about root DNS servers is true? When configuring monitors for individual pool members, which three options can beselected? (Choose three.) Which of the following is correct concerning HTTP classes? Which of the following storage type combinations are configurable in an ASM logging profile? An LTM device is monitoring three pool members. One pool member is being marked down. What should the LTM Specialist enable to prevent the server from being flooded with connections once its monitor determines it is up? Given the configuration shown below, if a connection request arrived on the BIG-IP with a source address of200.10.10.10:1050 and a destination of 150.10.10.75:80, what would the source IP address of the associatedpacket be when it arrived on the choosen member of the web_poolself 150.10.10.1 { netmask 255.255.255.0unit I floating enable vlan external allow tcp https } self10.10.1.1 { netmask 255.255.255.0 unit I floating enablevlan internal allow default } pool web_pool { member 10.10.1.11:80 member 10.10.1.12:80 member10.10.1.13:80 }snatpoolclient_pool { member 10.10.1.100 member 150.10.10.15 }virtual VS_web { destination150.10.10.10:80 ip protocol tcpsnatautomap pool web_pool } virtual VS_network{ destination 150.10.10.0:any mask 255.255.255.0 snatpoolclient_poolip protocol tcp pool web_pool } virtual VS_network{ destination 150.10.1 0.0:any mask 255.255.255.0 snatpoolclient_poolip protocol tcp pool web_pool } virtualVS_network { destination 150.10.10.0:any mask255.255.255.0 snatpoolclient_poolip protocol tcp poolweb_pool } What are the best reasons for using the Deployment Wizard? (Choose 3) Which of the following is NOT a method that TMOS uses to improve the performance of applications? A site wishes to use an external monitor. Other than what is coded in the monitor script,what information must be configured on the BIGIP for the monitor to be functional?(Choose two.) Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the BIG- IP? Which two of the following are costs businesses may face in dealing with unstructured data? The Policy Builder benefits include A web developer has created a custom HTTP call to a backend application. The HTTP headers being sent by the HTTP call are: GET / HTTP/1.1 User-Agent: MyCustomApp (v1.0) Accept: text/html Cache-Control: no-cache Connection: keep-alive CookiE.somecookie=1 The backend server is responding with the following: HTTP/1.1 400 Bad Request DatE.Wed, 20 Jul 2012 17:22:41 GMT Connection: close Why is the HTTP web server responding with a HTTP 400 Bad Request? In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the DNS request? Which are immediate results of entering the following command: b pool PoolA .{ lb method predictive member10.10.1 .1:80 member 10.10.1.2:80 } A steaming profile will do which of the following? Which of the following are correct regarding Wildcard entities? (Choose 2) Adivinar (?) Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If a client were to initiate traffic to the NAT address, what changes, if any, would take place when the BIG-IP processes such packets? Which of the following statements are incorrect regarding protection of web services?(Choose 2) An HTTP class is available .. An LTM device is load balancing telnet and ssh applications in a client/server environment experiencing significant packet delay. Which setting in the TCP profile should reduce the amount of packet delay? Which two statements are true about NATs? (Choose two.) Which of the following is a benefit of using iRules? Which of the following statements are correct regarding positive and negative securitymodels? (Choose 2) An LTM Specialist notices the following error on the stdout console: mcpd[2395]: 01070608:0: License is not operational(expired or digital signature does not match contents) Which command should be executed to verify the LTM device license? A client (10.10.1.30) connecting to an HTTPS virtual server (10.10.1.100) with a clientssl profile is getting an SSL error. Which options will trace this issue? A BIG‐IP has two SNATs, a pool of DNS servers and a virtual server configured to loa-balance UDP traffic to the DNS servers. One SNAT's address is 64.100.130.10; this SNAT is defined for all addresses. The second SNAT's address is 64.100.130.20; this SNAT is defined for three specific addresses, 172.16.3.54, 172.16.3.55, and 172.16.3.56. The virtual server's destination is 64.100.130.30:53. The SNATs and virtual server have default VLAN associations. If a client with IP address 172.16.3.55 initiates a request to the virtual server, what is the source IP address of the packet as it reaches the chosen DNS server? Assume a BIG-IP has no NATs or SNATs configured. Which two scenarios are possible when client trafficarrives on a BIG-IP that is NOT destined to a self-IP? (Choose two.) Which of the following does not pertain to protecting the Requested Resource (URI)element? The SNMP monitor can collect data based on which three metrics? (Choose three.) Which three statements describe a characteristic of profiles? (Choose three.) iQuery is a proprietary protocol that distributes metrics gathered from which three sources?(Choose three.) Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks? A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it: when CLIENT_ACCEPTED { if {[TCP::local_port] equals 80 } { pool pool1 } elseif {[TCP::local_port] equals 443 } { pool pool2 } If a user connects to 10.10.1.100 and port 22, which pool will receive the request? Which level of parameter assumes the highest precedence in BIG-IP ASM Systemprocessing logic? True or false? The LTM "Manager" authentication role can create iRules. Where is persistence mirroring configured? How is MAC masquerading configured? A security audit has determined that your web application is vulnerable to a cross-sitescripting attack. Which of the following measures are appropriate when building a securitypolicy?(Choose 2) Which two processes are involved when BIGIP systems issue traps? (Choose two.) Which of the following methods of protection are used by the BIG-IP ASM System tomitigate buffer overflow attacks? True or false? TCP Express enables LTM to use different TCP settings for the connection between the client and LTM, and the connection between LTM and the pool member. Which of the following is not a configurable parameter data type? Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP.............. service can incorporate dynamic lists of threatening IP addresses into the BIG­-IP platform, adding context to policy decisions. The active LTM device in a high-availability (HA) pair performs a failover at the same time the network team reports an outage of a switch on the network. Which two items could have caused the failover event? (Choose two.) True or false? Administrators can specify an APM access profile when defining a virtual server in LTM. An LTM Specialist configures the following iRule on an LTM device: when HTTP_REQUEST { if {[string tolower [HTTP::uri]] contains "/URI1/" } { pool Pool1 } elseif {[string tolower [HTTP::uri]] contains "/URI2/" } { pool Pool2 } elseif {[string tolower [HTTP::uri]] contains "/URI3/" } { pool Pool3 } else { pool Pool4} } Given the following request: http://www.example.comURI1/index.html?fu=bar&pass=1234 Which pool will be selected by the iRule? Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?