[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 171-180

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.171

ARX can classify data based on all of the following EXCEPT:

  1. Paths

  2. File Size

  3. Extensions

  4. Security Level

  5. File Name

Correct Answer: D

Question No.172

Where is connection mirroring configured?

  1. It an option within a TCP profile.

  2. It is an optional feature of each pool.

  3. It is not configured; it is default behavior.

  4. It is an optional feature of each virtual server.

Correct Answer: D

Question No.173

What is a characteristic of iQuery?

  1. It uses SSH.

  2. It uses SSL.

  3. It uses SCP.

  4. It uses HTTPS.

Correct Answer: B

Question No.174

What are some changes that must be made on the GTM System so that log messages are sent to centralized System Log servers?

  1. The IP address of the server must be added to the wideip.conf file.

  2. The IP address of the server must be added to the syslogng.conf file.

  3. The IP address of the server and valid user id/password combination must be added to the hosts.allow file.

  4. The IP address of the server and valid user id/password combination must be added to the syslog ng.conf file.

Correct Answer: B

Question No.175

Which action CANNOT be performed by an iRule?

  1. Direct a connection request to a specific pool.

  2. Substitute a server#39;s response with alternate data.

  3. Chang the virtual server#39;s default pool.

  4. Direct a client#39;s request to a pool based on the client#39;s browser#39;s language.

  5. Limit a given client to a set amount of bandwidth.

  6. Discard a client before connecting to a server.

Correct Answer: C

Question No.176

Which is NOT a function of ASM?

  1. Attack signature enforcement

  2. HTTP protocol enforcement

  3. Network security

  4. Parameter value enforcement

Correct Answer: C

Question No.177

If a customer has an application that uses a customized protocol, what LTM feature can help optimize the traffic from the application?

  1. iRules

  2. Network virtual servers

  3. HTTP classes

  4. Packet filtering

  5. Transparent virtual servers

Correct Answer: A

Question No.178

When initially configuring the BIG-IP system using the config utility, which two parameters can be set. (Choose two.)

  1. the netmask of the SCCP

  2. the IP address of the SCCP

  3. the port lockdown settings for the SCCP

  4. the netmask of the host via the management port

  5. the IP address of the host via the management port

  6. the port lockdown settings for the host via the management port

Correct Answer: DE

Question No.179

In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the DNS request?

  1. It sends a broadcast request to all GTM devices.

  2. It uses iQuery to request the information from LTM.

  3. It sends a request to its configured backup GTM device.

  4. It sends an un-resolvable error to the client.

  5. It sends the request to an external DNS.

Correct Answer: E

Question No.180

If a client#39;s browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence?

  1. The connection request is not processed.

  2. The connection request is sent to a pology.server. The connection request is sent to a pology.server.

  3. The connection request is load balanced to an available pool member.

  4. The connection request is refused and the client is sent a quot;server not availablequot; message.

Correct Answer: C

Get Full Version of the Exam
101 Dumps
101 VCE and PDF