Which persistence method will always recognize a client when the client returns to the same virtual server?
A. SSL
B. MSRDP
C. expression [universal]
D. No persistence method work in all situations.
E. source address
A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?
A. A SNAT for all addresses could be defined, and then disable the SNAT processing for select VLANs.
B. Some virtual servers could be associated with SNAT pools and others not associated with SNAT pools.
C. The decision to perform source address translation is always based on VLAN. Thus, the goal cannot be achieved.
D. The decision to perform source address translation is always based on a client's address (or network). Thus, this goal cannot be achieved.
When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose two.)
A. License file
B. Security policies
C. Web applications
D. Request information
E. Traffic learning information
Generally speaking, should the monitor templates be used as production monitors or should they be customized prior to use?
A. Most templates, such as HTTP and TCP, are as effective as customized monitors.
B. Monitor template customization is only a matter of preference, not an issue of effectiveness or performance.
C. Most templates, such as https, should have the receive rule customized to make the monitor more robust.
D. While some templates, such as ftp, must be customized, those that can be used without modification are not improved by specific changes.
Which three of the following are benefits of adding WebAccelerator to the network infrastructure? (Choose three.)
A. It adds a layer, security to a Web site
B. It speeds up a secure Web site
C. It reduces the need to purchase additional bandwidth
D. It analyzes Web content, and caches and compresses it accordingly
E. It improves the performance, large object file transfers
ARX can classify data based on all of the following EXCEPT:
A. Paths
B. File Size
C. Extensions
D. Security Level
E. File Name
Which of the following is NOT a benefit of using SSL offload?
A. It increases the bandwidth between the client and LTM.
B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
C. The organization requires far less SSL certificates.
D. The CPU processing load on backend servers is reduced.
E. It enables iRules to be used on traffic arriving to LTM that is encrypted.
Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?
A. host names
B. system clocks
C. profile definitions
D. VLAN failsafe settings
E. MAC masquerade addresses
ASM provides antivirus protection by:
A. Extracting files being uploaded and sending them to an AV system via ICAP
B. Running a local antivirus program on the BIG-IP
C. None of the above
D. Using IP Penalty enforcement to block requests from hackers IPs
Which of the following can be accomplished using iRules?
A. Track inbound and outbound traffic
B. Perform deep packet inspection
C. Inspect traffic and drop it
D. All of the above
E. Intercept traffic and redirect it
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.