Certification Provider: F5
Exam: F5 101
Exam Code: F5 101
Total Question:
Question per Quiz: 80
Updated On: 15 May 2022
1.
Although APM can interoperate with LTM, it is unable to use iRules for advanced processing.
2.
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________.
3.
The SNMP monitor can collect data based on which three metrics? (Choose three.)
4.
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
5.
A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)
6.
What percentage of storage in a typical environment is actively used and modified?
7.
An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
8.
The Policy Builder benefits include:
9.
An administrator needs to load balance connections to the application server with the lowest number of Which load balancing method meets these requirements?
10.
A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192.168.1.1 Which TMSH command should the administrator use?
11.
Tightening is a feature of which type of entity?
12.
A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?
13.
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy?
14.
When is a Virtual Server hosted by an LTM System defined with two IP addresses?
15.
What are the two most common methods of placing a BIG-IP device into a network environment?