[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 341-350

Get Full Version of the Exam

Question No.341

A virtual server at has the rule listed below applied.

when HTTP_REQUEST { if {[HTTP::uri] ends_with quot;htmquot; } { pool pool1 } elseif {[HTTP::uri] ends_with quot;xtquot; } { pool pool2 }

If a user connects to which pool will receive the request.

  1. pool1

  2. pool2

  3. None. The request will be dropped.

  4. Unknown. The pool cannot be determined from the information provided.

Correct Answer: B

Question No.342

Which four of the following items are physical objects used by GTM?

  1. Virtual servers

  2. Links

  3. Servers

  4. Wide IPs

  5. Data centers

  6. Pools

Correct Answer: ABCE

Question No.343

In order to ensure that a specific file type is never moved down to a secondary file tier, the administrator should:

  1. Set up an automated bot that accesses that file once a week.

  2. This is not possible on the ARX.

  3. Set a policy that the file type remains on primary storage.

  4. Instruct the end users to put the file in a non-tiered directory.

Correct Answer: C

Question No.344

Which of the following is NOT included on the F5 DevCentral site?

  1. Subscription purchasing options

  2. Actual iRules written by other customers

  3. iRules reference materials

  4. Forums

  5. The F5 iRule editor

Correct Answer: A


Subscription purchasing options is in Partner Resource Center

Question No.345

Which of the following does NOT describe network performance management?

  1. Updating software on various devices

  2. Seeing graphs in near real-time

  3. Visibility into multiple network devices

  4. Being alerted to an issue as it happens

  5. Viewing virtual server statistics

Correct Answer: A

Question No.346

Logging profiles are assigned to?

  1. HTTP class

  2. Security policies

  3. Web applications

  4. Attack signatures

Correct Answer: C

Question No.347

Which statement is correct concerning differences between BIG-IP ASM platforms?

  1. The 3900 has more ports than the 6800.

  2. The 3900 and 6800 have the same number of ports.

  3. The 3900 and 6800 can support both the module and standalone versions of BIG-IP ASM.

  4. The 3900 can support both module and standalone versions of BIG-IP ASM whereas the 6800 can support only the module version of BIG-IP ASM.

Correct Answer: D

Question No.348

What is the purpose of the GTM Systems Address Exclusion List concerning local DNS servers?

  1. to prevent probing of specific local DNSs

  2. to prevent name resolution to specific Virtual Servers

  3. to prevent name resolution for requests from specific local DNSs

  4. to prevent probing of any local DNS servers by specific F5 devices

Correct Answer: A

Question No.349

Monitors can be assigned to which three resources? (Choose three.)

  1. Pools

  2. Servers

  3. Wide-IPs

  4. Data Centers

  5. Pool Members

Correct Answer: ABE

Question No.350

ASM provides antivirus protection by:

  1. Extracting files being uploaded and sending them to an AV system via ICAP

  2. Running a local antivirus program on the BIG-IP

  3. None of the above

  4. Using IP Penalty enforcement to block requests from hackers IPs

Correct Answer: A


Supported ICAP Servers in TMOS 11.5:


Get Full Version of the Exam
101 Dumps
101 VCE and PDF