An administrator needs to rapidly deter e newly discovered security threat to a remote desktop application. Which F5 feature provides this functionality?
A. iRules
B. SSL profiles
C. Proxy SSL
D. SPDY
Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)
A. LB_FAILED
B. DNS_REQUEST
C. HTTP REQUEST
D. CLIENT_ACCEPTED
Why does deploying LTM into an existing network immediately improve security?
A. Only requests for specific ports are allowed through LTM.
B. All traffic through LTM is checked for DDoS attacks.
C. No traffic A allowed through LTM until it has been specified.
D. All users must authenticate before accessing applications through LTM.
E. Only LAN administrators can access resources through LTM.
Which of the following user roles have access to make changes to security policies? (Choose two.)
A. Guest
B. Operator
C. Administrator
D. Web Application Security Editor
The ARX is like a mini network manager. It is able to check the health of the environment and can raise alerts when thresholds are reached.
A. True
B. False
When initially configuring the BIG-IP System using the config tool, which of the following parameters can be configured? (Choose three.)
A. System hostname
B. Netmask of the management port
C. IP address of the management port
D. Default route of the management port
E. Port lockdown of the management port
When probing LDNSs, which protocol is used by default?
A. TCP
B. ICMP
C. DNS_REV
D. DNS_DOT
Which statement is true concerning SNATs using SNAT pools and SNATs using automap?
A. SNAT s using automap preferentially translate source addresses to nonfloating self-IP addresses.
B. SNAT s using a SNAT pool translate source addresses randomly to any of the addresses in the SNAT pool.
C. SNAT s using automap translate source addresses randomly to any of the BIG-IP's floating self-IP addresses.
D. A SNAT pool can contain virtual server addresses.
Identifying users by their IP address is a sufficient method of performing authentication and authorization.
A. True
B. False
What does the BIG-IP_add script do?
A. add BIG-IP servers to the wideip.conf file
B. add an existing GTM System to a sync group
C. synchronize configuration files between BIG-IP Systems
D. exchange web certificates and keys between BIG-IP Systems
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.