Certification Provider: F5
Exam: F5 101
Exam Code: F5 101
Question per Quiz: 80
Updated On: 15 May 2022
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy?
The SNMP monitor can collect data based on which three metrics? (Choose three.)
Although APM can interoperate with LTM, it is unable to use iRules for advanced processing.
A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192.168.1.1 Which TMSH command should the administrator use?
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________.
What percentage of storage in a typical environment is actively used and modified?
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?
Tightening is a feature of which type of entity?
The Policy Builder benefits include:
What are the two most common methods of placing a BIG-IP device into a network environment?
A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)
An administrator needs to load balance connections to the application server with the lowest number of Which load balancing method meets these requirements?
An age-based policy is set up on the ARX that retains only data modified in the last 3 months on tier 1 storage and moves the rest of the data to secondary storage. What happens when the end user tries to access data that has not been touched in 6 months?
When is a Virtual Server hosted by an LTM System defined with two IP addresses?