Which three files/data items are included in a BIG-IP UCS backup file? (Choose three.)
A.
The BIG-IP administrative addresses.
B.
The BIG-IP license.
C.
The BIG-IP log files.
D.
The BIG-IP default traps.
E.
The BIG-IP host name.
The BIG-IP administrative addresses.
The BIG-IP license.
The BIG-IP host name.
Could an iRule perform persistence based on a cookie?
A.
Yes An iRule could be designed to persist based on the contents of a cookie.
B.
No. iRules cannot affect persistence.
C.
Yes. An iRule could be desiged to persist based on the contents of a cookie.
D.
No. Cookie persistence is only is based on a cookie persistence profile.
Yes. An iRule could be desiged to persist based on the contents of a cookie.
How is traffic flow through transparent virtual servers different from typical virtual servers?
A.
Traffic flow through transparent virtual servers must be forwarded through a single
routingdevice.
B.
Traffic flow through transparent virtual servers does not have IP address translationperformed.
C.
Traffic flow through transparent virtual severs is not load balabced.
D.
Traffic flow through transparent virtual servers is bridged ( leave IP and lMAC.addressesintact)
rather than routed (leave IP address intact but change the MAC.addresses).
Traffic flow through transparent virtual servers does not have IP address translationperformed.
Adivinar (?)
A.
Any text string within a cookie.
B.
Any bytes within the initial client request packet.
C.
An IP address.
D.
The value in the tcp acknowledgement field.
Any text string within a cookie.
An IP address.
A monitor has been defined with an alias port of 443. All other options are left at their defaults. The
administrator wishes to assign it to a pool of members where the members' ports vary.
Which is the result?
A.
For each member, if the member port is not 443, the member will be marked down.
B.
For each member, the monitor will test member node at port 443.
C.
For each member, if it is running an SSL service at the member port, the monitor
maywork.Otherwise, the monitor willfail and the member will be marked down.
D.
This assignment is not allowed since the port do not match.
For each member, the monitor will test member node at port 443.
Which two processes are involved when BIG-IP systems issue traps? (Choose two.)
A.
bigd
B.
alertd
C.
smtpd
D.
sysloging
alertd
sysloging
A monitor has been defined using the HTTP monitor template. The send and receive strings were
customized, but all other settings were left at their defaults. Which resources can the monitor be
assigned to?
A.
Only specific pool members.
B.
Most virtual severs.
C.
Most nodes.
D.
Most pools
Most pools
After editing and saving changes to the configuration file containing virtual servers, what is the
immediate result?
A.
The new configuration is verified and loaded.
B.
The new configuration is verified not loaded.
C.
The new configuration is verified.
D.
The new configuration is loaded but not verified.
E.
The new configuration is neither verified nor loaded.
F.
The new configuration is verified and loaded if is it syntactically correct.
The new configuration is neither verified nor loaded.
When a virtual server has an HTTP profile with compression enabled, which traffic is compressed
by the BIG-IP?
A.
Selected traffic from the BIG-IP to the client.
B.
All sever-side traffic for that virtual server.
C.
Selected traffic from the pool member to the BIG-IP.
D.
All client-side traffic for that virtual server.
All client-side traffic for that virtual server.
Which three parameters could be used to determine whether a connection request will have the
source address translated as the request is processed? (Choose three.)
A.
The client’s router’s IP address.
B.
The client’s browser’s preferred language.
C.
The client’s IP netmask.
D.
The client’s TCP port.
E.
The client’s IP address.
F.
The client IP fragment offset.
The client’s browser’s preferred language.
The client’s TCP port.
The client’s IP address.
Page 11 out of 43 Pages |
Previous |