As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What would be
the result if the two systems in a redundant pair were set to the same host name?
A.
Host names do not matter in redundant pair communication
B.
In a redundant pair, the two systems will always have the same host name. The parameter is
synchronizedbetween the systems.
C.
The first time the systems are synchronized the receiving system will be assigned the same
self-IPaddresses as the source system.
D.
When the administrator attempts to access the configuration utility using the host name, they
will alwaysconnect to the active system.
The first time the systems are synchronized the receiving system will be assigned the same
self-IPaddresses as the source system.
When network fail-over is enabled, which of the following is true?
A.
The fail-over cable status is ignored. Fail-over is determined by the network status only.
B.
Either a network failure or loss of voltage across the fail-over cable will cause a fail-over.
C.
A network failure will not cause a fail-over as long as there is a voltage across the fail-over
cable.
D.
The presence or absence of voltage over the fail-over cable takes precedence over network
fail-over.
A network failure will not cause a fail-over as long as there is a voltage across the fail-over
cable.
Where is connection mirroring configured?
A.
It an option within a TCP profile
B.
It is an optional feature of each pool.
C.
It is not configured; it is default behavior
D.
It is an optional feature of each virtual server
It is an optional feature of each virtual server
Which statement is true regarding fail-over?
A.
Hardware fail-over is disabled by default.
B.
Hardware fail-over can be used in conjunction with network failover.
C.
If the hardware fail-over cable is disconnected, both BIG-IP devices will always assume the
active role.
D.
By default, hardware fail-over detects voltage across the fail-over cable and monitors traffic across theinternal VLAN.
Hardware fail-over can be used in conjunction with network failover.
Where is persistence mirroring configured?
A.
It is always enabled.
B.
It is part of a pool definition
C.
It is part of a profile definition.
D.
It is part of a virtual server definition.
It is part of a profile definition.
Assume the bigd daemon fails on the active system. Which three are possible results? (Choose
three.)
A.
The active system will restart the bigd daemon and continue in active mode
B.
The active system will restart the tmm daemon and continue in active mode.
C.
The active system will reboot and the standby system will go into active mode.
D.
The active system will fail-over and the standby system will go into active mode.
E.
The active system will continue in active mode but gather member and node state information
from thestandby system.
The active system will restart the bigd daemon and continue in active mode
The active system will reboot and the standby system will go into active mode.
The active system will fail-over and the standby system will go into active mode.
What is the purpose of MAC masquerading?
A.
to prevent ARP cache errors
B.
to minimize ARP entries on routers
C.
to minimize connection loss due to ARP cache refresh delays
D.
to allow both BIG-IP devices to simultaneously use the same MAC address
to minimize connection loss due to ARP cache refresh delays
Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in
a redundant pair configuration?
A.
bandwidth utilization
B.
duplicate IP address
C.
CPU utilization percentage
D.
VLAN communication ability
VLAN communication ability
Assuming there are open connections through an active system's NAT and a fail-over occurs, by
default, what happens to those connections?
A.
All open connections will be lost.
B.
All open connections will be maintained.
C.
The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the
connectionestablishment.
D.
Long-lived connections such as Telnet and FTP will be maintained while short-lived
connections such asHTTP will be lost.
E.
All open connections are lost, but new connections are initiated by the newly active BIG-IP,
resulting inminimal client downtime.
All open connections will be maintained.
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52
opens a connection to the virtual server, which member will be used for the connection?
A.
172.16.20.1:80
B.
172.16.20.2:80
C.
172.16.20.3:80
D.
172.16.20.4:80
E.
172.16.20.5:80
172.16.20.4:80
Page 5 out of 43 Pages |
Previous |