Certification Provider: F5
Exam: F5 101
Exam Code: F5 101
Total Question:
Question per Quiz: 80
Updated On: 15 May 2022
1.
The SNMP monitor can collect data based on which three metrics? (Choose three.)
2.
What percentage of storage in a typical environment is actively used and modified?
3.
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
4.
An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
5.
A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?
6.
The Policy Builder benefits include:
7.
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________.
8.
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy?
9.
A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192.168.1.1 Which TMSH command should the administrator use?
10.
Although APM can interoperate with LTM, it is unable to use iRules for advanced processing.
11.
A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)
12.
What are the two most common methods of placing a BIG-IP device into a network environment?
13.
An administrator needs to load balance connections to the application server with the lowest number of Which load balancing method meets these requirements?
14.
Tightening is a feature of which type of entity?
15.
When is a Virtual Server hosted by an LTM System defined with two IP addresses?