[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 101-110

Get Full Version of the Exam

Question No.101

Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)

  1. Synchronization occurs via a TCP connection using ports 683 and 684.

  2. Connection mirroring data is shared via a TCP connection using port 1028.

  3. Persistence mirroring data is shared via a TCP connection using port 1028.

  4. Connection mirroring data is shared through the serial failover cable unless network failover is enabled.

Correct Answer: BC

Question No.102

Which must be sent to the license server to generate a new license?

  1. the system#39;s dossier

  2. the system#39;s host name

  3. the system#39;s base license

  4. the system#39;s purchase order number

Correct Answer: A

Question No.103

An F5 customer must install WebAccelerator on top of LTM:

  1. True

  2. False

Correct Answer: B

Question No.104

Using IP Geolocation, an organization can always direct a client request from France to a data enter in Dublin.

  1. True

  2. False

Correct Answer: A

Question No.105

CSRF is difficult to detect because:

  1. The attacks are requests a user should be allowed to make

  2. The attacks always utilize obfuscation

  3. The attacks are always encrypted

  4. All of the above

Correct Answer: A

Question No.106

Which two are events that can be used to trigger GTM iRule data processing? (Choose two.)





Correct Answer: AB

Question No.107

Which of the following is a language used for content provided by a web server to a web client?

  1. FTP

  2. TCP

  3. HTTP

  4. HTML

Correct Answer: D

Question No.108

As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What would be the result if the two systems in a redundant pair were set to the same host name?

  1. Host names do not matter in redundant pair communication.

  2. In a redundant pair, the two systems will always have the same host name. The parameter is synchronized between the systems.

  3. The first time the systems are synchronized the receiving system will be assigned the same self- IP addresses as the source system.

  4. When the administrator attempts to access the configuration utility using the host name, they will always connect to the active system.

Correct Answer: C

Question No.109

When a business is hacked, they often lose more than money. What are the other consequences to a business as a result of being hacked? Select two.

  1. Helpful third party reviews of the security needs of the customer#39;s web applications.

  2. Valuable free press that occurs as companies address hacking incidents.

  3. Penalties related to non-compliance with laws and regulations.

  4. Final resolution of all security vulnerabilities of the business#39; web applications.

  5. Loss of customers when slow connections drive customers to competitor#39;s site.

Correct Answer: AD

Question No.110

A BIG-IP has two load balancing virtual servers at and The port 80 virtual server has SNAT automap configured. There is also a SNAT configured at set for a source address range of / All other settings are at their default states. If a client with the IP address sends a request to, what is the source IP address when the associated packet is sent to the pool member?



  1. Floating self IP address on VLAN where the packet leaves the system

  2. Floating self IP address on VLAN where the packet arrives on the system

Correct Answer: B

Get Full Version of the Exam
101 Dumps
101 VCE and PDF