The administrator must specify APM access control entries as either L4 or L7.
A. True
B. False
When installing LTM on different VIPRION performance blades, each instance of LTM needs to be licensed separately.
A. True
B. False
Which of the following is correct regarding User-defined Attack signatures?
A. User-defined signatures use an F5-supplied syntax
B. User-defined signatures may only use regular expressions
C. Attack signatures may be grouped within system-supplied signatures
D. User-defined signatures may not be applied globally within the entire policy
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
Application trends and drivers that increase the need for application security are:
A. Intelligent Browsers
B. Webification
C. Targeted attacks
D. All the above
Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)
A. Synchronization occurs via a TCP connection using ports 683 and 684.
B. Connection mirroring data is shared via a TCP connection using port 1028.
C. Persistence mirroring data is shared via a TCP connection using port 1028.
D. Connection mirroring data is shared through the serial failover cable unless network failover is enabled.
Brute force protection will:
A. Block a user after a specified number, unsuccessful login attempts
B. Block a user after a specified number of page requests are attempted
C. None of the above
D. Block a user from downloading too much content from the site
What is the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder?
A. Incoming requests with these IP addresses will never get blocked by BIG-IP ASM.
B. Incoming requests with these IP addresses will not be taken into account as part of the learning process, they will be allowed to do anything.
C. Incoming requests with these IP addresses will automatically be accepted into the security www.braindumps.com 87 F5 101 Exam policy, Policy Builder will validate that future requests with this traffic will not create a violation.
D. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more advanced security policy, this additional policy will not be enabled unless forced by the administrator.
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
A. Web Accelerator
B. APM
C. ARX
D. GTM
E. Firepass
F. Enterprise Manager
Which VLANs must be enabled for a SNAT to perform as desired (translating only desired packets)?
A. The SNAT must be enabled for all VLANs.
B. The SNAT must be enabled for the VLANs where desired packets leave the BIG-IP.
C. The SNAT must be enabled for the VLANs where desired packets arrive on the BIG-IP.
D. The SNAT must be enabled for the VLANs where desired packets arrive and leave the BIG-IP.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.