[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 411-420

Get Full Version of the Exam

Question No.411

Data centers often rely on either traditional firewalls or next generation firewalls. Select the core weakness of the traditional or next generation firewalls when it comes to DDoS attacks.

  1. They are limited in amount of connections per second and the amount of sustained connections they can handle

  2. The cost performance ratio of next generation firewalls is too high.

  3. The agility of traditional firewalls is too limited when it comes to DDoS attacks.

  4. Data center traffic is primarily outbound.

Correct Answer: A

Question No.412

If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?


  1. A

  2. C

  3. D

  4. B

Correct Answer: D


LTM uses the round robin load balancing method so after A will be B.

Question No.413

Which two of the following LTM load balancing methods require the least amount of resources? (Choose two.)

  1. Round robin

  2. Ratio

  3. Observed

  4. Fastest

  5. Predictive

  6. Least connections

Correct Answer: AB

Question No.414

APM provides access control lists at which two OSI layers? (Choose two.)

  1. Layer 5

  2. Layer 4

  3. Layer 7

  4. Layer 6

  5. Layer 2

Correct Answer: BC

Question No.415

Which of the following are four of the benefits of the TMOS architecture? (Choose four.)

  1. User authentication

  2. Server-side optimization

  3. Dynamic DDoS protection

  4. Web application security

  5. Client-side optimization

  6. Antivirus checking

Correct Answer: BCDE

Question No.416

An HTTP class is available

  1. on any BIG-IP LTM system

  2. only when ASM is licensed.

  3. only when ASM or WA are licensed.

  4. only when a specific license key is required.

Correct Answer: A

Question No.417

ASM#39;s Web Scraping protection:

  1. Is simple to configure

  2. Cannot accommodate good scrapers

  3. Will protect the site by blocking all requests

  4. Is difficult to configure

Correct Answer: A

Question No.418

By default, how frequently are log files rotated?

  1. hourly

  2. daily

  3. weekly

  4. There is no default; the administrator sets the frequency.

    Correct Answer: B

    Question No.419

    For a typical business, what percentage of data does the ARX usually move to a secondary tier?









    Correct Answer: C

    Question No.420

    The layer 3 security feature Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in)

    Correct Answer: contain / include

    Get Full Version of the Exam
    101 Dumps
    101 VCE and PDF