[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 251-260

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.251

A customer wants the best possible throughput but only has a maximum of 3RU rack space. Which F5 platform should you recommend?

  1. BIG-IP 11050

  2. VIPRION with only 1 performance blade

  3. BIG-IP 8950

  4. BIG-IP 8900

  5. VIPRION with 4 performance blades

Correct Answer: A

Question No.252

A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it:

image

If

a user connects to http://10.10.1.100/foo.html and their browser does not specify a UserAgent, which pool will receive the request?

  1. MSIE_pool

  2. Mozilla_pool

  3. None. The request will be dropped.

  4. Unknown. The pool cannot be determined from the information provided.

Correct Answer: B

Question No.253

Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?

  1. Floating IPs

  2. Fallback host

  3. Auto last hop

  4. SNAT automap

  5. Pool offload

  6. Priority group activation

Correct Answer: D

Question No.254

When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?

  1. HTTP caching

  2. OneConnect

  3. TCP connection queuing

  4. Content spooling

  5. Priority activation

Correct Answer: D

Question No.255

A site needs a virtual server that will use an iRule to parse HTTPS traffic based on HTTP header values. Which two profile types must be associated with such a virtual server? (Choose two.)

  1. TCP

  2. HTTP

  3. HTTPS

  4. ServerSSL

Correct Answer: AB

Question No.256

Which of the following is not a configurable parameter data type?

  1. Email

  2. Array

  3. Binary

  4. Decimal

Correct Answer: B

Question No.257

Which of the following methods are used by the BIG-IP ASM System to protect against SQL injections?

  1. HTTP RFC compliancy checks

  2. Metacharacter enforcement and attack signatures

  3. HTTP RFC compliancy checks and length restrictions

  4. Response scrubbing, HTTP RFC compliancy checks, and metacharacter enforcement

Correct Answer: B

Question No.258

Given that VLAN failsafe is enabled on the external VLAN and the network that the active BIG- IP#39;s external VLAN is connected to has failed, which statement is always true about the results?

  1. The active system will note the failure in the HA table.

  2. The active system will reboot and the standby system will go into active mode.

  3. The active system will failover and the standby system will go into active mode.

  4. The active system will restart the traffic management module to eliminate the possibility that BIG- IP is the cause for the network failure.

Correct Answer: A

Question No.259

Identifying users by their IP address is a sufficient method of performing authentication and

authorization.

  1. True

  2. False

Correct Answer: B

Question No.260

Assume a BIG-IP has no NATs or SNATs configured. Which two scenarios are possible when client traffic arrives on a BIG-IP that is NOT destined to a self-IP? (Choose two.)

  1. If the destination of the traffic does not match a virtual server, the traffic will be discarded.

  2. If the destination of the traffic does not match a virtual server, the traffic will be forwarded based on routing tables.

  3. If the destination of the traffic matches a virtual server, the traffic will be processed per the virtual server definition. If the destination of the traffic matches a virtual server, the traffic will be processed per the virtual server. definition.

  4. If the destination of the traffic matches a virtual server, the traffic will be forwarded, but it cannot be load balanced since no SNAT has been configured.

Correct Answer: AC

Get Full Version of the Exam
101 Dumps
101 VCE and PDF