ARX will detect any modification to a file on the second tier because all clients are being _______ by the ARX to get to the storage.
A. Moved
B. Copied
C. Proxied
D. Backed up
E. Deleted
Which two statements are true concerning capabilities of current BIG-IP platforms? (Choose two.)
A. The 1600 hosts more ports than the 3900.
B. All current BIG-IP platform use both an ASIC. And CPU(s)to process traffic.
C. All current BIG-IP platform can perform hardware compression.
D. Only 2U BIG-IP Platform have an option of a second power supply.
E. All BIG-IP have capacity to perform bulk encryption I decryption of SSL traffic independent of the CPU.
Which facility logs messages concerning GTM System parameters?
A. local0
B. local1
C. local2
D. local3
When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacity.
A. True
B. False
How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)
A. any text string within a cookie
B. any bytes within the initial client request packet
C. an IP address
D. the value in the tcp acknowledgement field
A monitor has been defined using the HTTP monitor template. The send and receive strings were customized, but all other settings were left at their defaults. Which resources can the monitor be assigned to?
A. only specific pool members
B. most virtual severs
C. most nodes
D. most pools
Assuming other failover settings are at their default state, what would occur if the failover cable were to be disconnected for five seconds and then reconnected.
A. As long as network communication is not lost, no change will occur.
B. Nothing. Failover due to loss of voltage will not occur if the voltage is lost for less than ten seconds.
C. When the cable is disconnected, both systems will become active. When the voltage is restored, unit two will revert to standby mode.
D. When the cable is disconnected, both systems will become active. When the voltage is restored, both systems will maintain active mode.
Assuming there are open connections through an active system's NAT and a failover occurs, by default, what happens to those connections?
A. All open connections will be lost.
B. All open connections will be maintained.
C. The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the connection establishment.
D. Long-lived connections such as Telnet and FTP will be maintained while short-lived connections such as HTTP will be lost.
E. All open connections are lost, but new connections are initiated by the newly active BIG- IP, resulting in minimal client downtime.
In a routed configuration, what does LTM do with the packet before sending it to the pool member?
A. Change the source IP and the destination IP address
B. Leave it unchanged and forward it
C. Change the source IP address
D. Change the destination IP address
A site wishes to delegate the name .wmysite.com to a GTM System. Which entry would be appropriate in their current DNS servers?
A. vww.mysite.com. IN A 132.26.33.15
B. 15.33.addrin.arpa.com IN PRT .wiw.mysite.com.
C. iw.mysite.com. IN CNAME wwip.mysite.com.
D. wwmysite.com. IN DEL wiwGTM.mysite.com.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.