Exam Details

  • Exam Code
    :101
  • Exam Name
    :Application Delivery Fundamentals
  • Certification
    :F5 Certifications
  • Vendor
    :F5
  • Total Questions
    :699 Q&As
  • Last Updated
    :Apr 13, 2025

F5 F5 Certifications 101 Questions & Answers

  • Question 311:

    When using the setup utility to configure a redundant pair, you are asked to provide a "Failover Peer IP". Which address is this?

    A. an address of the other system in its management network

    B. an address of the other system in a redundant pair configuration

    C. an address on the current system used to listen for failover messages from the partner BIG-IP

    D. an address on the current system used to initiate mirroring and network failover heartbeat messages

  • Question 312:

    Which of the following statements is true about ARX's capacity balancing ability?

    A. When new files are created, the ARX can determine in real time where to place each file based on the available space on each storage device

    B. When configuring the ARX, customers can choose to implement either an age-based policy or a capacity based policy, but are not able to run both policies at the same time

    C. All files created at approximately the same time (within 10 minutes) will be stored on the same tier of storage to minimize latency and improve the user experience

    D. The ARX balances capacity within tiers A storage, but cannot balance capacity across tiers of storage

  • Question 313:

    Logging profiles are assigned to?

    A. HTTP class

    B. Security policies

    C. Web applications

    D. Attack signatures

  • Question 314:

    An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?

    A. The end user is unaware that the data has been moved to secondary tier storage and is able to access the data without difficulty.

    B. The networking mapping window appears, allowing the end user to re-establish direct access to the data even though it has been moved to secondary storage.

    C. An error message appears saying "File is no longer unavailable."

    D. A message appears explaining that the file has been archived, and a link to the new secondary storage tier location is provided.

  • Question 315:

    Which of the following protocols can be protected by Protocol Security Manager? (Choose three.)

    A. FTP

    B. SSH

    C. HTTP

    D. SMTP

    E. Telnet

  • Question 316:

    A standard virtual server is defined with a pool and a SNAT using automap. All other settings for the virtual server are at defaults. When client traffic is processed by the BIG-IP, what will occur to the IP addresses?

    A. Traffic initiated by the pool members will have the source address translated to a self-IP address but the destination address will not be changed.

    B. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address.

    C. Traffic initiated by selected clients, based on their IP address, will have the source address translated to a self-IP address but the destination will only be translated if the traffic is destined to the virtual server.

    D. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address. Traffic arriving destined to other destinations will have the source translated to a self-IP address only.

  • Question 317:

    What percentage of storage in a typical environment is actively used and modified?

    A. 5%

    B. 50%

    C. 25%

    D. 10%

    E. 90%

  • Question 318:

    Without creating a user defined region, what is the most specific group a topology record can identify?

    A. city

    B. country

    C. continent

    D. state/province

    E. region of country

  • Question 319:

    The Rapid Deployment Policy is used to:

    A. Improve website performance

    B. Quickly protect web sites for most common attacks

    C. Improve ASM performance

    D. Provide wizard functionality for quick policy creation

  • Question 320:

    Which item is NOT a function of a properly deployed and configured ASM?

    A. Detects attacks

    B. Stops hackers from attacking

    C. Provides protection visibility

    D. Provides security agility

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.