[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 181-190

Get Full Version of the Exam

Question No.181

Could an iRule perform persistence based on a cookie?

  1. Yes an iRule could be designed to persist based on the contents of a cookie.

  2. No. iRules cannot affect persistence.

  3. Yes. An iRule could be designed to persist based on the contents of a cookie.

  4. No. Cookie persistence is only is based on a cookie persistence profile.

Correct Answer: C

Question No.182

Which of the following methods of protection operates on server responses?

  1. Dynamic parameter protection

  2. Response code validation and response scrubbing

  3. Response code validation and HTTP method validation

  4. HTTP RFC compliancy check and metacharacter enforcement

Correct Answer: B

Question No.183

The PCI compliance report is proof that a company is secure.

  1. True

  2. False

    Correct Answer: B

    Question No.184

    A BIG-IP has the following objects configured:


    A virtual server at that is associated with both the SNAT pool and the load balancing pool. If a client at IP address initiates a connection to the virtual server, what will the source IP address be in the packets sent to the chosen pool member?







    It could be any of the addresses of the members of the load balancing pool.

    Correct Answer: B

    Question No.185 DRAG DROP

    Match the security-related term with the correct definition.


    Correct Answer:


    Question No.186

    The Policy Builder benefits include:

    1. Doesn#39;t require in depth web application knowledge

    2. Only requires limited ASM knowledge

    3. All of the above

    4. Very low administrative impact

Correct Answer: C

Question No.187

Which of the following platforms support both standalone and modular BIG-IP ASM implementations? (Choose 2)









Correct Answer: AC

Question No.188

Which tool is used on BIG-IP systems to capture data packets?

  1. tcpdump

  2. snoop

  3. ethereal

  4. qkview

Correct Answer: A

Question No.189

An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?

  1. They want GTM to examine all DNS queries.

  2. They want GTM to make load balancing decisions based on metrics.

  3. They have data centers in several countries.

  4. They are using several operating systems for the local DNS servers.

Correct Answer: C

Question No.190

Which of the following protocols can be protected by Protocol Security Manager? (Choose three.)

  1. FTP

  2. SSH

  3. HTTP

  4. SMTP

  5. Telnet

Correct Answer: D

Get Full Version of the Exam
101 Dumps
101 VCE and PDF