When DNS_REV is used as the probe protocol by the GTM System, which information is expected in the response from the probe?
A. a reverse name lookup of the GTM System
B. the list of root servers known by the local DNS
C. the FQDN of the local DNS being probed for metric information
D. the revision number of BIND running on the requesting DNS server
APM administrators can configure access policies granting users which two types of access?
A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access
An LTM object that represents a downstream server contains the IP address 192.168.9.250 and no port. What is this object?
A. Pool member
B. Virtual server
C. Pool
D. Self IP
E. Node
Mobile device browsers typically display Web pages more slowly than PC browsers.
A. True
B. False
What occurs when a load command is issued?
A. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}
B. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}
C. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }
D. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}
When an administrator creates a new access policy in the Visual Policy Editor, which three options are included by default? (Choose three.)
A. A fallback option
B. An Allow Ad box
C. A Deny End box
D. An empty Resource Assign item
E. A Start box
F. A Block All option
Which of the following methods of protection operates on server responses?
A. Dynamic parameter protection
B. Response code validation and response scrubbing
C. Response code validation and HTTP method validation
D. HTTP RFC compliancy check and metacharacter enforcement
Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the pool members.
A. No SSL certificates are required on the pool members.
B. The pool members SSL certificates must only exist.
C. The pool members SSL certificates must be issued from a certificate authority.
D. The pool members SSL certificates must be created within the company hosting the BIG-IPs.
Which tool is used on BIG-IP systems to capture data packets?
A. tcpdump
B. snoop
C. ethereal
D. qkview
A virtual server at 10.10.1.100:80 has the rule listed below applied. when HTTP_REQUEST { if
{[HTTP::uri] ends_with "htm" } { pool pool1 } elseif {[HTTP::uri] ends_with "xt" } { pool pool2 }
If a user connects to http://10.10.1.100/foo.txt which pool will receive the request.
A. pool1
B. pool2
C. None. The request will be dropped.
D. Unknown. The pool cannot be determined from the information provided.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.