[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 301-310

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.301

Which of the following is NOT a profile type on the BIG-IP?

  1. Protocol

  2. Application

  3. Persistence

  4. Authentication

  5. SSL

Correct Answer: B

Question No.302

Which is NOT an ASM protection method for cross site scripting?

  1. Signatures

  2. URl character set limiting

  3. Token injection

  4. Parameter character set limiting

Correct Answer: C

Question No.303

Which IP address will the client address be changed to when SNAT automap is specified within a Virtual Server configuration?

  1. The floating self IP address on the VLAN where the packetleaves the system.

  2. The floating self IP address on the VLAN where the packet arrives on the system.

  3. It will alternate between the floating and nonfloating self IP address on the VLAN where the packet leaves the system so that port exhaustion is avoided.

  4. It will alternate between the floating and nonfloating self IP address on the VLAN where the packet arrives on the system so that port exhaustion is avoided.

Correct Answer: A

Question No.304

When configuring the BIG-IP ASM System in redundant pairs, which of the following are synchronized? (Choose two.)

  1. License file

  2. Security policies

  3. Web applications

  4. Request information

  5. Traffic learning information

Correct Answer: BC

Question No.305

What occurs when a load command is issued?

  1. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}

  2. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}

  3. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }

  4. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}

Correct Answer: A

Question No.306

What percentage of storage in a typical environment is actively used and modified?

A.

5%

B.

50%

C.

25%

D.

10%

E.

90%

Correct Answer: D

Question No.307

Which three of these are the potential ending options for branches in the Visual Policy Editor? (Choose three.)

  1. Reject

  2. Fallback

  3. Allow

  4. Deny

  5. Limit

  6. Redirect

Correct Answer: CDF

Question No.308

Which cookie persistence method requires the fewest configuration changes on the web servers to be implemented correctly?

  1. insert

  2. rewrite

  3. passive

  4. session

Correct Answer: A

Question No.309

If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request?

image

  1. A

  2. B

  3. C

  4. D

Correct Answer: B

Question No.310

Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server.

  1. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.

  2. Terminating SSL at the BIG-IP eliminates all unencrypted traffic from the internal network.

  3. Terminating SSL at the BIG-IP eliminates all unencrypted traffic from the internal network.

  4. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.

  5. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.

Correct Answer: A

Get Full Version of the Exam
101 Dumps
101 VCE and PDF