101 Exam Questions

Total 429 Questions

Last Updated Exam : 15-Apr-2025

Assuming that systems are synchronized, which action could take place if the fail-over cable is
connected correctly and working properly, but the systems cannot communicate over the network
due to external network problems?


A.

If network fail-over is enabled, the standby system will assume the active mode.


B.

Whether or not network fail-over is enabled, the standby system will stay in standby mode


C.

Whether or not network fail-over is enabled, the standby system will assume the active mode.


D.

If network fail-over is enabled, the standby system will go into active mode but only until the
networkrecovers.





B.
  

Whether or not network fail-over is enabled, the standby system will stay in standby mode



A virtual server is defined per the charts. The last five client connections were to members C, D, A,
B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52
opens a connection to the virtual server, which member will be used for the connection?


A.

172.16.20.1:80


B.

172.16.20.2:80


C.

172.16.20.3:80


D.

172.16.20.4:80


E.

172.16.20.5:80





D.
  

172.16.20.4:80



The following iRule is being used within a persistence profile on a virtual server.
Assuming the following HTTP requests are made within the same timeout window, what is the
maximum number of persistence records that will be created iRule:
rule Persist_Universal { when HTTP_REQUEST { persist uie [findstr [HTTP ::uri] "?" 8 3] }
Requests:
#1 http: I/www.test.com/input.html?testl 45ABR80
#2 http ://www.test.com/input .html?testl 35PDC72
#3 http://www.test. com/input.html?testl 25ABR76
#4 http ://www.test.com/input.html?testl 45MN088
#5 http ://www.test. com/input.html?testl 55ABR98
#6 http://www.test.com/input.html?testl 45PDC6O
#7 http ://www.test. com/input.html?testl 75ABC50
#8 http://www.test.com/input.html?testl 25MN055
#9 http://www.test. com/input.html?testl 45ABC70
#10 http://www.test.com/input.html?testl35 PDC42


A.

4


B.

3


C.

10


D.

It cannot be determined from the given data.


E.

5


F.

1


G.

0





A.
  

4



Why would an administrator capture monitor traffic between a BIG-IP and servers?


A.

Viewing monitor traffic could help the administrator to define a more robust monitor.


B.

If a client were having difficulty logging into a load-balanced SSH server, viewing and analyzing
theconnection process would determine the reason.


C.

Only client traffic may be captured; monitor traffic may not be captured.


D.

If client traffic to servers was failing, viewing and analyzing monitor traffic would determine the
reason.





A.
  

Viewing monitor traffic could help the administrator to define a more robust monitor.



Which statement is true concerning packet filters?


A.

In addition to administrator-created filters, three always exists a “deny all” filter that processes
traffic last


B.

Filters cannot prevent access to the management port.


C.

The order of filters does not affect which traffic is accepted or denied.


D.

Filters cannot prevent the BIG-IP synching process from taking place.





B.
  

Filters cannot prevent access to the management port.



Which action CANNOT be performed by an iRule?


A.

Direct a connection request to a specific pool


B.

Substitute a server’s response with alternate data


C.

Chang the virtual server’s default pool.


D.

Direct a client’s request to a pool based on the client’s browser’s language.


E.

Limit a given client to a set amount of bandwidth.


F.

Discard a client before connecting to a server.





C.
  

Chang the virtual server’s default pool.



Which persistence method will always recognize a client when the client returns to the same
virtual server?


A.

SSL


B.

MSRDP


C.

Expression [universal]


D.

No persistence method work in all situations.


E.

Source address





D.
  

No persistence method work in all situations.



Which are immediate results of entering the following command: b pool PoolA . { lb method
predictive member 10.10.1 .1:80 member 10.10.1.2:80 }


A.

Requests sent to this BIG-IP system with a destination port of 80 are load-balanced between
the membersof PoolA.


B.

No changes will take place since the command is missing the monitor component for PoolA.


C.

The /config/bigip.cinf file is updated to include a definition for the pool named PoolA.


D.

A new pool is available for association with any iRule or virtual server.





D.
  

A new pool is available for association with any iRule or virtual server.



Given the configuration shown below, if a connection request arrived on the BIG-IP with a source
address of 200.10.10.10:1050 and a destination of 150.10.10.75:80, what would the source IP
address of the associated packet be when it arrived on the choosen member of the web_pool self
150.10.10.1 { netmask 255.255.255.0 unit I floating enable vlan external allow tcp https }
self10.10.1.1 { netmask 255.255.255.0 unit I floating enable vlan internal allow default } pool
web_pool { member 10.10.1.11:80 member 10.10.1.12:80 member 10.10.1.13:80 }snatpool
client_pool { member 10.10.1.100 member 150.10.10.15 }virtual VS_web { destination
150.10.10.10:80 ip protocol tcp snat automap pool web_pool } virtual VS_network{ destination
150.10.1 0.0:any mask 255.255.255.0 snatpool client_pool ip protocol tcp pool web_pool } virtual
VS_network { destination 150.10.1 0.0:any mask 255.255.255.0 snatpool client_pool ip protocol
tcp pool web_pool } virtual VS_network { destination 150.10.10.0:any mask 255.255.255.0
snatpool client_pool ip protocol tcp pool web_pool }


A.

10.10.1.IA.10.10.1.1


B.

200.10.10.I0D.200.10.10.10


C.

10.10.1.I00B.10.10.1.100


D.

150.10.10.15C.150.10.10.15





C.
  

10.10.1.I00B.10.10.1.100



What occurs when a load config command is issued?


A.

The running configuration is replaced by the any portion of the configuration files that
aresyntactically correct.


B.

The running configuration is loaded into files for storage


C.

The running configuration is compared to the configuration in files and, when changes
arenoted, the version in the files is loaded over what is in money.


D.

The running configuration is replaced by the configuration in the files, but only if they
aresyntactically correct.





D.
  

The running configuration is replaced by the configuration in the files, but only if they
aresyntactically correct.




Page 10 out of 43 Pages
Previous