ActualTest Questions Flashcards
To make complex access policies easier to manage, an administrator can create a _______
containing several policy actions, and then add instances of it within the policy? (Fill in)
A.
Visual Policy Editor
B.
Policy Editor
C.
Visual Editor
D.
Policy creator
A.
Visual Policy Editor
To make complex access policies easier to manage, an administrator can create a policy
containing several policy actions, and then add instances of it within the policy using the
________. (Fill in)
A.
Deployment Wizard
B.
Setup Wizard
C.
Policy Wizard
D.
Visual Wizard
A.
Deployment Wizard
QUESTION NO: 3
The Policy Builder benefits include:
A.
Doesn’t require in depth web application knowledge
B.
Only requires limited ASM knowledge
C.
All of the above
D.
Very low administrative impact
C.
All of the above
APM administrators can configure access policies granting users which two types of access?
A.
CIFS access
B.
Client/server access
C.
Web application access
D.
Proxy access
E.
RDC access
D.
Proxy access
QUESTION NO: 5
Which of the following is a benefit of using iRules?
A.
They provide a secure connection between a client and LTM
B.
They enable granular control of traffic
C.
They can be used as templates for creating new applications
D.
They can use Active Directory to authenticate and authorize users
E.
They provide an automated way to create LTM objects
B.
They enable granular control of traffic
APM provides access control lists at which two OSI layers? (Choose two.)
A.
Layer 5
B.
Layer 4
C.
Layer 7
D.
Layer 6
E.
Layer 2
B.
Layer 4
C.
Layer 7
TMOS is an F5 software module that runs on the BIG-IP platform.
A.
True
B.
False
Answer: B
Explanation:
TMOS is multi-module OS on Big-IP platform
Which four F5 products are on the TMOS platform? (Choose four.)
A.
ARX
B.
GTM
C.
WOM
D.
APM
E.
ASM
F.
Firepass
B.
GTM
C.
WOM
D.
APM
E.
ASM
Which of the following is NOT a profile type on the BIG-IP?
A.
Protocol
B.
Application
C.
Persistence
D.
Authentication
E.
SSL
B.
Application
The BIG-IP determines the lowest connection speed between the client and the server and then
uses that for both connections.
A.
True
B.
False
B.
False
Another name for the F5 OneConnect feature is TCP multiplexing.
A.
True
B.
False
A.
True
LTM runs on______F5’s proprietary product platform. (Fill in the correct answer)
A.
ARX
B.
Firepass
C.
Acopia
D.
TMOS
D.
TMOS
Which programming language is the basis for F5 iRules?
A.
Lisp
B.
C++
C.
Java
D.
TCL
E.
AWK
D.
TCL
What are the two most common methods of placing a BIG-IP device into a network environment?
(Choose two.)
A.
Channeled configuration
B.
VLAN configuration
C.
NAT configuration
D.
SNAT configuration
E.
Asymmetric configuration
F.
Routed configuration
D.
SNAT configuration
F.
Routed configuration
Which of the following is NOT a benefit of using SSL offload?
A.
It increases the bandwidth between the client and LTM.
B.
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a
pool member.
C.
The organization requires far less SSL certificates.
D.
The CPU processing load on backend servers is reduced.
E.
It enables iRules to be used on traffic arriving to LTM that is encrypted.
A.
It increases the bandwidth between the client and LTM.
Explanation:
SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a
pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.
When using a routed configuration, the real server must point to the LTM as the ________.
A.
NTP Server
B.
DNS Server
C.
Virtual IP
D.
WINS server
E.
Default gateway
E.
Default gateway
TCP Express is licensed separately from LTM
A.
True
B.
False
B.
False
Explanation: TCP Express is licensed including in LTM
LTM can only load balance outbound traffic by using iRules
A.
True
B.
False
A.
True
Which two of these statements about OneConnect are true? (Choose two.)
A.
It decreases the CPU load on LTM
B.
It aggregates multiple client connections into a single server connection
C.
It decreases the amount of traffic between multiple clients and LTM
D.
It requires SNAT to be configured
E.
It decreases the CPU load on pool members
B.
It aggregates multiple client connections into a single server connection
E.
It decreases the CPU load on pool members
GTM solves which three of these standard DNS limitations? (Choose three.)
A.
It can verify that a host is available before resolving a host name for a client.
B.
It can use HTTPS for the connection between itself and the client.
C.
It can ensure that clients remain at the same data center for stateful applications.
D.
It can verify that a client does not have any viruses before sending the IP address.
E.
It has more complex load balancing methods.
A. It can verify that a host is available before resolving a host name for a client.
C. It can ensure that clients remain at the same data center for stateful applications
E. It has more complex load balancing methods.
Explanation:
GTM solves three of these standard DNS limitations
It can verify that a host is available before resolving a hostname for a client
It can ensure that clients remain at the same data center for stateful applications
It has more complex load balancing methods
Using IP Geolocation, an organization can always direct a client request from France to a
datacenter in Dublin.
A.
True
B.
False
A.
True
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose
three.)
A.
Web Accelerator
B.
APM
C.
ARX
D.
GTM
E.
Firepass
F.
Enterprise Manager
A.
Web Accelerator
B.
APM
D.
GTM
Explanation:
These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and
GTM.
Customers can purchase LTM as a stand-alone product, or layer it with additional software
modules to increase the functionality of the BIG-IP device.
A.
True
B.
False
A.
True
Which two of the following options can LTM use when all of the pool members are not available or
if the pool is overloaded?
A.
Floating IPs
B.
Fallback host
C.
Auto last hop
D.
SNAT automap
E.
Pool offload
F.
Priority group activation
D.
SNAT automap
The least connections load balancing method functions best when all pool members share similar
characteristics.
A.
True
B.
False
A.
True
The layer 3 security feature _______ Cookies that protects against SYN floods, DoS, and DDoS
attacks. (Fill in)
Answer:
contain / include
A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an
example of a sub-zone?
A.
www.F5.com/sub
B.
www.F5.com
C.
www.gslb.F5.com
D.
.com
E.
f5.com
C.
www.gslb.F5.com
A _______ object maps a FQDN to virtual servers. (Fill in)
Answer:
Wide IP
Which three of the following must be done in order for GTM to properly communicate LTM?
(Choose three.)
A.
Connect the GTM and LTM with a network crossover cable.
B.
Synchronize the big3d versions between GTM and LTM.
C.
Add the LTM object to the GTM configuration.
D.
Configure the GTM and LTM to we MAC masquerading.
E.
Ensure that GTM and LTM use the same floating IP address.
F.
Exchange SSL certificates between the two devices.
B.
Synchronize the big3d versions between GTM and LTM.
C.
Add the LTM object to the GTM configuration.
F.
Exchange SSL certificates between the two devices.
DNSSEC is a GTM add-on licensing feature.
A.
True
B.
False
A.
True
GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM
devices. (Fill in)
Answer:
iQuery
Which four of the monitoring methods listed below can GTM use to determine the status and
performance of BIG-IP and servers? (Choose four.)
A.
ping
B.
Application monitors
C.
Inband monitors
D.
SSH
E.
iQuery
F.
SNMP
A.
ping
B.
Application monitors
E.
iQuery
F.
SNMP
What happens when the data center that GTM recommends for a client is unavailable?
A.
GTM uses cached information to determine an alternate route.
B.
GTM queries the local DNS server.
C.
GTM sends subsequent queries to the next preferred data center.
D.
GTM directs the client to use its DNS cache to select an alternate location.
E.
The client continues to attempt to access the preferred data center.
C.
GTM sends subsequent queries to the next preferred data center.
GTM can load balance to LTM in addition to non-BIG-IP hosts.
A.
True
B.
False
A.
True
Which of the following is NOT included on the F5 DevCentral site?
A.
Subscription purchasing options
B.
Actual iRules written by other customers
C.
iRules reference materials
D.
Forums
E.
The F5 iRule editor
A.
Subscription purchasing options
Explanation:
Subscription purchasing options is in Partner Resource Center
If LTM uses the least connections load balancing method, which pool member in the following
diagram receives the next request? (see diagram in original pdf)
A.
A
B.
B
C.
C
D.
D
B
Why does deploying LTM into an existing network immediately improve security?
A.
Only requests for specific ports are allowed through LTM.
B.
All traffic through LTM is checked for DDoS attacks.
C.
No traffic A allowed through LTM until it has been specified.
D.
All users must authenticate before accessing applications through LTM.
E.
Only LAN administrators can access resources through LTM.
C.
No traffic A allowed through LTM until it has been specified.
You can use an HTTP class profile to forward traffic that matches which three of these types of
criteria? (Choose three.)
A.
Port
B.
HTTP header
C.
URI path
D.
User name
E.
Protocol
F.
Host name
B.
HTTP header
C.
URI path
F.
Host name
When an optimized TCP connection exists between LTM and the pool member, LTM can accept
server responses faster than the client. What is the name of this feature?
A.
HTTP caching
B.
OneConnect
C.
TCP connection queuing
D.
Content spooling
E.
Priority activation
D.
Content spooling
As a full TCP proxy, LTM acts as the termination point for both requests from the client and
responses from the server.
A.
True
B.
False
A.
True
FastCache will NOT work with compressed objects.
A.
True
B.
False
A.
True
Which of the following can be accomplished using iRules?
A.
Track inbound and outbound traffic
B.
Perform deep packet inspection
C.
Inspect traffic and drop it
D.
All of the above
E.
Intercept traffic and redirect it
D.
All of the above
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
A.
True
B.
False
B.
False
Which four of the following statements about LDNS probes are true? (Choose four.)
A.
Only GTM devices can act as a prober.
B.
They check each requesting LDNS that has made a request of the GTM.
C.
They can determine available cache size on the client.
D.
They are used to develop path metrics.
E.
They verify the link between a data center and an LDNS.
F.
Probing only takes place if GTM is configured to use dynamic load balancing.
B.
They check each requesting LDNS that has made a request of the GTM.
D.
They are used to develop path metrics.
E.
They verify the link between a data center and an LDNS.
F.
Probing only takes place if GTM is configured to use dynamic load balancing.
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.
A.
True
B.
False
A.
True
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
A.
True
B.
False
A.
True
An administrator is adding GTM to the network infrastructure. Which of the following requirements
would lead them to select an Authoritative Screening architecture rather than Delegation?
A.
They want GTM to examine all DNS queries.
B.
They want GTM to make load balancing decisions based on metrics.
C.
They have data centers in several countries.
D.
They are using several operating systems for the local DNS servers.
C.
They have data centers in several countries.
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server
to the client.
What security benefit does this provide to customers?
A.
Offloads security functionality from other devices such as network firewalls and Intrusion
Prevention Systems (IPS), which may experience performance degradation when inspecting DNS
queries and responses.
B.
provides enhanced support for DNS servers.
C.
Establishes highly detailed policies based on your customer’s business in requirements, performs
multiple factors of authentication, detects corporate versus non-corporate devices, checks OS
patch levels, and determines antivirus patch levels.
D.
Provides industry-leading knowledge of application behavior as it travels through a network, and it
applies that knowledge to security because it knows how an application behaves at any point in
the reply request process
D.
Provides industry-leading knowledge of application behavior as it travels through a network, and it
applies that knowledge to security because it knows how an application behaves at any point in
the reply request process
Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.
A.
F5 can ensure a DNS DDoS attack is not successful.
B.
F5 has high performance DNS services.
C.
F5 can answer the DNS queries directly.
D.
With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
E.
F5 can ensure a customer never faces a DNS DDoS attack.
C.
F5 can answer the DNS queries directly.
E.
F5 can ensure a customer never faces a DNS DDoS attack.
Which of the following are the three main business drivers for placing LTM into a network?
(Choose three.)
A.
Secure the connection between WAN sites.
B.
Improve application availability and scalability.
C.
Authenticate and authorize users.
D.
Boost application performance.
E.
Include application security.
F.
Act as a Web application firewall
B.
Improve application availability and scalability.
D.
Boost application performance.
E.
Include application security.
If a customer has an application that uses a customized protocol, what LTM feature can help
optimize the traffic from the application?
A.
iRules
B.
Network virtual servers
C.
HTTP classes
D.
Packet filtering
E.
Transparent virtual servers
A.
iRules
An LTM object represents a downstream server that hosts a secure Web site and contains the IP
address and port combination 192.168.9.250:443. What is this object?
A.
Self IP
B.
Virtual Server
C.
Pool
D.
Node
E.
Pool Member
E.
Pool Member
Adding more RAM to a GTM device drastically improves query performance.
A.
True
B.
False
B.
False
Which of the following are four of the security benefits of TMOS? (Choose four.)
A.
It verifies traffic based on antivirus signatures.
B.
It provides protection against DDoS.
C.
It uses SYN cookies and dynamic connection reapers.
D.
It supplies guidance for poorly developed applications.
E.
It denies all traffic that hasn’t been defined.
F.
It can hide confidential information from outbound traffic.
B.
It provides protection against DDoS.
C.
It uses SYN cookies and dynamic connection reapers
E.
It denies all traffic that hasn’t been defined.
F.
It can hide confidential information from outbound traffic.
The LTM “Manager” authentication role can create iRules.
A.
True
B.
False
A.
True
Which of the following statements about cookie persistence is NOT true?
A.
The cookie’s timeout value can be customized.
B.
They are F5’s preferred persistence method.
C.
No persistence information is placed on LTM.
D.
Web servers must be configured to send cookies to clients.
E.
They do not add a performance impact on LTM.
D.
Web servers must be configured to send cookies to clients.
An LTM object that represents a downstream server contains the IP address 192.168.9.250 and
no port. What is this object?
A.
Pool member
B.
Virtual server
C.
Pool
D.
Self IP
E.
Node
E.
Node
Which three of the metrics listed below can GTM use when making load balancing decisions for a
client? (Choose three.)
A.
TCP payload
B.
IP geolocation
C.
Hop count
D.
Round trip time
E.
Browser user agent
B.
IP geolocation
C.
Hop count
D.
Round trip time
In order to improve GTM performance, administrators should use multiple complex monitors to
ensure resources are functioning properly:
A.
True
B.
False
B.
False
Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)
A.
VLANs
B.
Load-balancing pools
C.
Secure remote access
D.
TMOS
E.
OneConnect
F.
iRules
D.
TMOS
E.
OneConnect
F.
iRules
Which three of these file types work well with HTTP compression? (Choose three.)
A.
MP4 videos
B.
Digital photos
C.
Text files
D.
Static HTML Web pages
E.
CD quality songs
F.
Microsoft Word documents
C.
Text files
D.
Static HTML Web pages
F.
Microsoft Word documents
Match each persistence method with the correct statement describing it:
A.
Cookie persistence
B.
Source address persistence
C.
SSL persistence
D.
Universal persistence
B.
Source address persistence
Which two of the following LTM load balancing methods require the least amount of resources?
(Choose two.)
A.
Round robin
B.
Ratio
C.
Observed
D.
Fastest
E.
Predictive
F.
Least connections
A.
Round robin
B.
Ratio
When using a redundant pair of LTMs, it is most advantageous to use them in an Active/Active
scenario because this provides additional load balancing capabilities.
A.
True
B.
False
B.
False
An LTM object contains both IP address and port combinations 20.18.9.250:80 and
20.18.9.251:80 and host the same Web application. What is this object?
A.
Pool
B.
Self-IP
C.
Node
D.
Pool member
E.
Virtual Server
A.
Pool
Which of the following are four of the benefits of the TMOS architecture? (Choose four.)
A.
User authentication
B.
Server-side optimization
C.
Dynamic DDoS protection
D.
Web application security
E.
Client-side optimization
F.
Antivirus checking
B.
Server-side optimization
C.
Dynamic DDoS protection
D.
Web application security
E.
Client-side optimization
In order to further accelerate applications, the external router can direct subsequent client traffic to
bypass LTM and communicate directly with the server.
A.
True
B.
False
B.
False
LTM runs on________F5’s proprietary product platform. (Fill in the correct answer)
Answer:
TMOS
When using only LTM in redundant pairs, a customer can load balance to multiple data centers.
A.
True
B.
False
B.
False
Application templates save the time it typically takes to create nodes, pools, pool members, virtual
servers, and monitors.
A.
True
B.
False
A.
True
Which of the following TMOS feature enables BIG-IP to scale performance based to the available
CPU cores?
A.
Clustered multi-processing
B.
OneConnect
C.
HTTP class
D.
Session persistence
E.
Auto Last Hop
A.
Clustered multi-processing
In a routed configuration, what does LTM do with the packet before sending it to the pool
member?
A.
Change the source IP and the destination IP address
B.
Leave it unchanged and forward it
C.
Change the source IP address
D.
Change the destination IP address
D.
Change the destination IP address
If the BIG-IP device is NOT always located between the client and the server, it will NOT provide
full optimization and security.
A.
True
B.
False
A.
True
TCP Express enables LTM to use different TCP settings for the connection between the client and
LTM, and the connection between LTM and the pool member.
A.
True
B.
False
A.
True
Where do you configure GTM client persistence?
Case Study Title (Case Study):
A.
On a DNS listener object
B.
On a wide IP object
C.
Within a load balancing method
D.
On a DNS pool object
E.
On a virtual server object
B.
On a wide IP object
Administrators can configure which three of the following load balancing options in GTM? (Choose
three.)
A.
Alternate
B.
Fallback
C.
Required
D.
Preferred
E.
Backup
F.
Optional
A.
Alternate
B.
Fallback
D.
Preferred
Over the years, F5 has led the industry in which of the four following areas? (Choose three.)
A.
Security
B.
Acceleration
C.
Application availability
D.
Application scalability
E.
Application design
F.
Remote access
A.
Security
B.
Acceleration
D.
Application scalability
Which of the following is NOT a method that TMOS uses to improve the performance of
applications?
A.
Caching HTTP data
B.
Optimizing the TCP connection between the client and the BIG-IP device
C.
Offloading SSL decryption from downstream servers
D.
Discarding unnecessary data from server responses before sending to the client
E.
Compressing HTTP data
D.
Discarding unnecessary data from server responses before sending to the client
The drawback to having BIG-IP act as a full application proxy is the decrease in application
performance.
A.
True
B.
False
B.
False
The Policy Builder benefits include:
A.
Doesn’t require in depth web application knowledge
B.
Only requires limited ASM knowledge
C.
All of the above
D.
Very low administrative impact
C.
All of the above
CSRF is difficult to detect because:
A.
The attacks are requests a user should be allowed to make
B.
The attacks always utilize obfuscation
C.
The attacks are always encrypted
D.
All of the above
A.
The attacks are requests a user should be allowed to make
Information leakage is a major obstacle to achieving PCI DSS compliance.
A.
True
B.
False
A.
True
Requests that do not meet the ASM security policies can:
A.
Generate learning suggestions
B.
Be blocked
C.
All of the above
D.
Be logged
C.
All of the above
What is NOT a benefit of using a SNAT?
A.
ASM can be deployed easily
B.
No changes are needed on the servers
C.
Fail open is easy to add
D.
Higher performance than other configuration
D.
Higher performance than other configuration
ASM’s Web Scraping protection:
A.
Is simple to configure
B.
Cannot accommodate good scrapers
C.
Will protect the site by blocking all requests
D.
Is difficult to configure
A.
Is simple to configure
The PCI compliance report is proof that a company is secure.
A.
True
B.
False
B.
False
ASM offers the most extensive, effective, and simplest to configure CSRF protection in the WAF
market.
A.
True
B.
False
A.
True
The APM Dashboard enables administrators to monitor which two of these metrics? (Choose two.)
A.
Number of active sessions
B.
Number of new sessions
C.
Number of denied users
D.
Number of users from each country
A.
Number of active sessions
B.
Number of new sessions
Although APM can interoperate with LTM, it is unable to use iRules for advanced processing.
A.
True
B.
false
B.
false
APM provides access control lists at which two 051 layers
A.
Layer 6
B.
Layer 5
C.
Layer 7
D.
Layer 4
E.
Layer 3
F.
Layer 2
C.
Layer 7
D.
Layer 4
Which of the following statements about Web server offload is NOT true?
A.
It performs rate shaping to reduce overflow.
B.
It forces the client browser to use multiple connections streams.
C.
It uses OneConnect to reduce multiple TCP connections.
D.
It utilizes cached content to prevent unnecessary trips for the same content.
E.
It uses specialized hardware for SSL offload.
B.
It forces the client browser to use multiple connections streams.
A network administrator tells you that they do NOT need WebAccelerator because their Web
application is fine. What is your best response?
A.
Challenge them to run performance testing on their Web site.
B.
Access their Web site with them to display its response.
C.
Request a follow up meeting within the next three months.
D.
Ask for an opportunity to speak with the CIO or a member of their Web application team.
D.
Ask for an opportunity to speak with the CIO or a member of their Web application team.
When sizing a WebAccelerator deployment, you should base the WA capacity on the
LTMcapacity.
A.
True
B.
False
B.
False
Which three of the following are benefits of adding WebAccelerator to the network infrastructure?
(Choose three.)
A.
It adds a layer, security to a Web site
B.
It speeds up a secure Web site
C.
It reduces the need to purchase additional bandwidth
D.
It analyzes Web content, and caches and compresses it accordingly
E.
It improves the performance, large object file transfers
B.
It speeds up a secure Web site
C.
It reduces the need to purchase additional bandwidth
D.
It analyzes Web content, and caches and compresses it accordingly
IP Enforcer blocks IP addresses that have repeatedly and regularly attacked the site.
A.
True
B.
False
A.
True
One reason APM beats the competition is its ability to perform both user authentication and
authorization on a single device.
A.
True
B.
False
A.
True
Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)
A.
An organization using Novell Netware for authentication.
B.
An organization that has been recently fined for failing security compliance.
C.
An organization with a traveling sales force.
D.
An organization with a single location and no remote employees.
E.
An organization that needs to ensure users are using Symantec antivirus software.
F.
An organization sharing a public Web site for all Internet users.
B.
An organization that has been recently fined for failing security compliance.
C.
An organization with a traveling sales force.
E.
An organization that needs to ensure users are using Symantec antivirus software.
When an administrator creates a new access policy in the Visual Policy Editor, which three options
are included by default? (Choose three.)
A.
A fallback option
B.
An Allow Ad box
C.
A Deny End box
D.
An empty Resource Assign item
E.
A Start box
F.
A Block All option
A.
A fallback option
C.
A Deny End box
E.
A Start box
Poor Web application performance contributes to which four of these issues for businesses?
(Choose four.)
A.
A Web site that goes unused
B.
Increased support calls
C.
Loss of users
D.
Loss of revenue
E.
DDoS attacks
F.
Identity theft
A.
A Web site that goes unused
B.
Increased support calls
C.
Loss of users
D.
Loss of revenue
Organizations are moving towards a cloud solution are good candidates for F5 WOM solutions.
A.
True
B.
False
A.
True
Using WOM for vMotion transfers across the WAN prevents VMware users from experiencing
interruptions.
A.
True
B.
False
A.
True
The administrator must specify APM access control entries as either L4 or L7.
A.
True
B.
False
B.
False
Administrators can customize APM to resemble other internal Web applications in the
organization.
A.
True
B.
False
A.
True
Which of the following is a client-side action in the Visual Policy Editor that prevents external
access and deletes any files created during a secure access session?
A.
Windows Group Policy
B.
Resource Assign
C.
Protected Workspace
D.
Virtual Keyboard
E.
Browser Cache and Session Control
C.
Protected Workspace
The main drawback to using an APM Deployment Wizard is that it is not possible to edit the
resulting objects, including the access policy.
A.
True
B.
False
B.
False
Mobile device browsers typically display Web pages more slowly than PC browsers.
A.
True
B.
False
A.
True
Which two of the following factors are often responsible for poor Web application performance?
(Choose two.)
A.
The time it takes to generate an HTTP request.
B.
The time it takes to deliver the HTTP response over the network.
C.
The time it takes to display the HTTP response in the browser.
D.
The time it takes to generate the HTTP response.
B.
The time it takes to deliver the HTTP response over the network.
D.
The time it takes to generate the HTTP response
WebAccelerator uses three tiers to improve performance. What are the three tiers? (Choose
three.)
A.
Bandwidth offload
B.
Client offload
C.
Application offload
D.
Protocol offload
E.
Web server offload
F.
Network offload
C.
Application offload
E.
Web server offload
F.
Network offload
ASM can detect Layer 7 DoS attacks by which four ways of monitoring: (Choose four.)
A.
Monitoring for a threshold of increased number of transactions per second per URL.
B.
Monitoring for a % change in transactions per second per URL.
C.
Monitoring for a % change in server latency or TPS.
D.
Monitoring for a threshold of increased server latency or TPS.
E.
Monitoring ASM policy builder performance.
F.
Monitoring BIG-IP CPU utilization.
G.
Deep Packet inspection.
A.
Monitoring for a threshold of increased number of transactions per second per URL.
B.
Monitoring for a % change in transactions per second per URL.
C.
Monitoring for a % change in server latency or TPS.
D.
Monitoring for a threshold of increased server latency or TPS.
Application trends and drivers that increase the need for application security are:
A.
Intelligent Browsers
B.
Webification
C.
Targeted attacks
D.
All the above
D.
All the above
The Rapid Deployment Policy is used to:
A.
Improve website performance
B.
Quickly protect web sites for most common attacks
C.
Improve ASM performance
D.
Provide wizard functionality for quick policy creation
B.
Quickly protect web sites for most common attacks
ASM combined with LTM provides protection against:
A.
Layer 7 DoS attacks
B.
All of the above
C.
Layer 4 DoS attacks
D.
DDoS attacks
B.
All of the above
When using a single BIG-IP with APM, an organization can support up to 60,000 concurrent
remote access users.
A.
True
B.
False
A.
True
An F5 customer must install WebAccelerator on top of LTM:
A.
True
B.
False
B.
False
The Protected Workspace client-side action provides more client-side security than the Cache and
Session Control action.
A.
True
B.
False
A.
True
Which WOM feature replaces a long byte pattern, such as “100000111000110101”, with a shorter
reference to the pattern?
A.
Symmetric adaptive compression
B.
Symmetric data deduplication
C.
Bandwidth allocation
D.
Application protocol acceleration
E.
TCP optimization
B.
Symmetric data deduplication
In order to ensure that a specific file type is never moved down to a secondary file tier, the
administrator should:
A.
Set up an automated bot that accesses that file once a week.
B.
This is not possible on the ARX.
C.
Set a policy that the file type remains on primary storage.
D.
Instruct the end users to put the file in a non-tiered directory.
C.
Set a policy that the file type remains on primary storage.
How does the ARX eliminate the disruption caused by re-provisioning storage?
A.
By identifying data that has not been modified and moving it to a secondary tier.
B.
By reducing the time necessary to run a complete backup.
C.
By allowing system administrators to apply policy to specific types data.
D.
By automating capacity balancing and allowing seamless introduction of file systems into the
environment after the ARX is installed.
D.
By automating capacity balancing and allowing seamless introduction of file systems into the
environment after the ARX is installed.
Which of the following statements is true about ARX’s capacity balancing ability?
A.
When new files are created, the ARX can determine in real time where to place each file based on
the available space on each storage device
B.
When configuring the ARX, customers can choose to implement either an age-based policy or a
capacity based policy, but are not able to run both policies at the same time
C.
All files created at approximately the same time (within 10 minutes) will be stored on the same tier
of storage to minimize latency and improve the user experience
D.
The ARX balances capacity within tiers A storage, but cannot balance capacity across tiers of
storage
A.
When new files are created, the ARX can determine in real time where to place each file based on
the available space on each storage device
The Device Inventory option in Enterprise Manager can replace an organization’s static Excel
spreadsheet containing similar data.
A.
True
B.
False
A.
True
Which of the following statements best describes the ARX architecture?
A.
The ARX’s split path architecture has a data path that handles the most common operations, and
a control path that handles other operations requiring deeper inspection and updating of the index.
B.
The ARX’s architecture has redundancy built in, allowing a single ARX to be deployed in most use
cases which provides a huge cost savings to customers.
C.
All of the above.
D.
It is a software agent that installs on the storage device.
A.
The ARX’s split path architecture has a data path that handles the most common operations, and
a control path that handles other operations requiring deeper inspection and updating of the index.
The ARX is like a mini network manager. It is able to check the health of the environment and can
raise alerts when thresholds are reached.
A.
True
B.
False
A.
True
Which two of the following are costs businesses may face in dealing with unstructured data?
(Choose two.)
A.
Lost productivity due to server downtime
B.
Buying backup media
C.
Buying additional storage capacity
D.
Paying to convert unstructured data into structured data
B.
Buying backup media
C.
Buying additional storage capacity
Place the following items in the order that the BIG-IP device uses when processing a packet.
Refer to image on the original doc
1) Check for a match with a self-IP
2) Search for an existing connection
3) Examine source IP for a standalone SNAT
4) Check if the destination matches a NAT
5) Look for a virtual server address match
6) Look for a match in a packet filter rule
In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the
DNS request?
A.
It sends a broadcast request to all GTM devices.
B.
It uses iQuery to request the information from LTM.
C.
It sends a request to its configured backup GTM device.
D.
It sends an un-resolvable error to the client.
E.
It sends the request to an external DNS.
E.
It sends the request to an external DNS.
Using IP Geolocation, an organization can always direct a client request from France to a data enter in Dublin.
A.
True
B.
False
A.
True
In most cases, F5 recommends using round robin load balancing.
A.
True
B.
False
B.
False
Which three of the following statements describe a data center object?
A.
It attempts to match a DNS request with a configured wide IP.
B.
It is attached to multiple Internet links.
C.
It becomes available for use when an assigned server is up.
D.
It retains statistics for each data center.
E.
It is a logical representation of a physical location.
F.
It specifies how users access the Internet.
B.
It is attached to multiple Internet links.
C.
It becomes available for use when an assigned server is up.
Which four of the following items are physical objects used by GTM?
A.
Virtual servers
B.
Links
C.
Servers
D.
Wide IPs
E.
Data centers
F.
Pools
A.
Virtual servers
B.
Links
C.
Servers
E.
Data centers
Which three are GTM server dynamic load balancing modes? (Choose three.)
A.
Packet Rate
B.
Virtual Server Score
C.
CPU
D.
Fallback IP
E.
Ratio
A.
Packet Rate
B.
Virtual Server Score
C.
CPU
Which four are GTM server static load balancing modes? (Choose four.)
A.
Return to DNS
B.
CPU
C.
Packet Rate
D.
Drop Packet
E.
Round Robin
F.
Static Persist
A.
Return to DNS
D.
Drop Packet
E.
Round Robin
F.
Static Persist
The F5 Application Delivery Firewall has the ability to outperform traditional and next
generation firewalls during DDoS attacks by leveraging the performance and scalability of BIG-IP
to hand extremely high loads, including high throughput, high connection count, and high number
of connections per second.
A.
True
B.
False
A.
True
What is the main cause of high latency in a Web application?
A.
The version, the client’s browser
B.
The distance between the client and Web server
C.
The number of CPUs on the Web server
D.
The size of the objects on the page
B.
The distance between the client and Web server
Match these terms with their description.
Refer to the image in the original PDF
Disaster recovery SLA – Measured by RPOs and RTOs
Recovery point objective – The amount of data that can be lost
Recovery time objective – How fast operations need to return to normal
Network Security personnel are entirely responsible for web application security.
A.
True
B.
False
B.
False
ASM Geolocation reporting provides information regarding:
A.
The number of attacks from a specific state
B.
The types of attacks from a city
C.
All of the above
D.
The countries from which the attacks originated
D.
The countries from which the attacks originated
An inline ASM configuration requires:
A.
Two network connections
B.
None of the above
C.
Two disk drives
D.
Two power supplies
A.
Two network connections
Which three of these are the potential ending options for branches in the Visual Policy Editor?
(Choose three.)
A.
Reject
B.
Fallback
C.
Allow
D.
Deny
E.
Limit
F.
Redirect
C.
Allow
D.
Deny
F.
Redirect
The Protected Workspace client-side action provides more client-side security than the Cache and
Session Control action.
A.
True
B.
False
A.
True
Which of the following is NOT a logging option within an APM access control entry?
A.
Packet
B.
Verbose
C.
Nominal
D.
Summary
E.
None
C.
Nominal
Administrators can specify an APM access profile when defining a virtual server in LTM.
A.
True
B.
False
A.
True
Using Fast Cache with ASM will:
A.
Improve user experience
B.
Improve server performance
C.
All of the above
D.
Improve BIG-IP ASM performance
C.
All of the above
ASM provides antivirus protection by:
A.
Extracting files being uploaded and sending them to an AV system via ICAP
B.
Running a local antivirus program on the BIG-IP
C.
None of the above
D.
Using IP Penalty enforcement to block requests from hackers IPs
A.
Extracting files being uploaded and sending them to an AV system via ICAP
APM can verify which four of the following details before granting a user access to a resource?
(Choose four.)
A.
The user’s Web browser
B.
The user’s computer
C.
User’s hard drive encryption software
D.
Groups the user is a member of
E.
The network speed
F.
The user’s username
A.
The user’s Web browser
B.
The user’s computer
D.
Groups the user is a member of
F.
The user’s username
Which four of these benefits does APM provide? (Choose four.)
A.
Enables remote access by several thousand simultaneous users.
B.
Basic Web application firewall capabilities.
C.
User authentication based on identity.
D.
Acceleration of Web content to the client.
E.
Granular authorization to resources.
F.
Client workstation security checking.
A.
Enables remote access by several thousand simultaneous users
C.
User authentication based on identity.
E.
Granular authorization to resources.
F.
Client workstation security checking.
Which four of these statements regarding object size and WebAccelerator performance are true?
(Choose four.)
A.
Large objects such as video cache well
B.
Large objects allow fewer requests per second
C.
Large objects result in higher throughput
D.
Small objects result in higher throughput
E.
Small objects such as images cache well
F.
Small objects allow more requests per second
B.
Large objects allow fewer requests per second
C.
Large objects result in higher throughput
E.
Small objects such as images cache well
F.
Small objects allow more requests per second
Which four of these scenarios will benefit from F5’s WAN Optimization Module? (Choose four.)
A.
An international organization with data centers in different countries.
B.
An organization that does not want to rely on using tape backup.
C.
An organization with one site but hundreds of Web servers.
D.
An organization whose users create extremely large files.
E.
An organization that expects their Web site usage to double in the next year.
F.
An organization attempting to lower costs by reducing the number of data centers.
A.
An international organization with data centers in different countries.
B.
An organization that does not want to rely on using tape backup.
D.
An organization whose users create extremely large files.
F.
An organization attempting to lower costs by reducing the number of data centers.