[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 51-60

Get Full Version of the Exam

Question No.51

iQuery is a proprietary protocol that distributes metrics gathered from which three sources? (Choose three.)

  1. SNMP

  2. DNS root servers

  3. path probes such as ICMP

  4. monitors from LTM Systems

  5. monitors from Generic Host Servers

Correct Answer: ACD

Question No.52

Select the two best questions you would use to ask your customer about their current web access management solution. Select two.

  1. What impact are slow remote access connections having on productivity?

  2. Are you using Google multi-factor authentication?

  3. Is user authentication data sitting on partner systems outside your control?

  4. Have you standardized on Androids or iPhones?

  5. How are you planning to extend Exchange to your mobile users?

  6. How do you think a global remote access deployment with integrated acceleration and availability services might benefit your business?

Correct Answer: AF

Question No.53

Use a proprietary syntax language. Must contain at least one event declaration. Must contain at least one conditional statement. Must contain at least one pool assignment statement. What must be sent to the license server to generate a new license?

  1. the system#39;s dossier

  2. the system#39;s base license

  3. the system#39;s serial number

  4. the system#39;s purchase order number

Correct Answer: A

Question No.54

Why would an administrator capture monitor traffic between a BIG-IP and servers?

  1. Viewing monitor traffic could help the administrator to define a more robust monitor.

  2. If a client were having difficulty logging into a load balanced SSH server, viewing and analyzing the connection process would determine the reason.

  3. Only client traffic may be captured; monitor traffic may not be captured.

  4. If client traffic to servers was failing, viewing and analyzing monitor traffic would determine the reason.

Correct Answer: A

Question No.55

A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address opens a connection to the virtual server, which member will be used for the connection?







Correct Answer: D

Question No.56

Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?

  1. Data guard

  2. Attack signatures

  3. Evasion techniques

  4. File type enforcement

Correct Answer: B

Question No.57

The partial configuration below includes an iRule, a virtual server, and pools. When traffic from the client at connects to the virtual server Test_VS and sends an HTTP request, what will the client#39;s source address be translated to as the traffic is sent to the chosen pool member?


A. 160.10.10.IOC.

B. It could be either or could be either or C.

D. E.

Correct Answer: E

Question No.58

A virtual server is listening at and has the following iRule associated with it:



a user connects to, which pool will receive the request?

  1. pool1

  2. pool2

  3. None. The request will be dropped.

  4. Unknown. The pool cannot be determined from the information provided.

Correct Answer: D

Question No.59

What happens when the data center that GTM recommends for a client is unavailable?

  1. GTM uses cached information to determine an alternate route.

  2. GTM queries the local DNS server.

  3. GTM sends subsequent queries to the next preferred data center.

  4. GTM directs the client to use its DNS cache to select an alternate location.

  5. The client continues to attempt to access the preferred data center.

Correct Answer: C

Question No.60

DNSSEC is a GTM add-on licensing feature.

  1. True

  2. False

Correct Answer: A

Get Full Version of the Exam
101 Dumps
101 VCE and PDF