[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 91-100

Get Full Version of the Exam

Question No.91

In order to further accelerate applications, the external router can direct subsequent client traffic to bypass LTM and communicate directly with the server.

  1. True

  2. False

Correct Answer: B

Question No.92

Another name for the F5 OneConnect feature is TCP multiplexing.

  1. True

  2. False

Correct Answer: A

Question No.93

Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)

  1. Connect the GTM and LTM with a network crossover cable.

  2. Synchronize the big3d versions between GTM and LTM.

  3. Add the LTM object to the GTM configuration.

  4. Configure the GTM and LTM to we MAC masquerading.

  5. Ensure that GTM and LTM use the same floating IP address.

  6. Exchange SSL certificates between the two devices.

Correct Answer: BCF

Question No.94

Which three iRule events are likely to be seen in iRules designed to select a pool for load balancing. (Choose three)








Correct Answer: ACE

Question No.95

When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?

  1. The size of the response

  2. The requested resource (URI)

  3. The response code from the web server

  4. The parameter values of static based parameters

Correct Answer: A

Question No.96

When defining a load balancing pool using the command line, if the load balancing method is not specified, what is the result?

  1. The default load balancing method would be used.

  2. The load balancing method of the previous pool would be used.

  3. The system would prompt the user for a load balancing method.

  4. An error would be displayed since no load balancing method was specified.

Correct Answer: A

Question No.97

When is a Virtual Server hosted by an LTM System defined with two IP addresses?

  1. Two addresses are used to define the Virtual Server when it is managed by redundant LTM Systems.

  2. Two addresses are used to define some Virtual Servers so that the GTM System can choose the better address when resolving the name.

  3. Two addresses are used to define Virtual Servers when the LTM System hosting it is behind a firewall that is translating the Virtual Server address.

  4. Two addresses are used to define a Virtual Server when the Wide-IP should resolve to a different address depending on which LTM System is active.

Correct Answer: C

Question No.98

Listeners that correspond to nonfloating self IP addresses are stored in which configuration file?

  1. /config/BIG-IP.conf

  2. /config/BIG-IP_base.conf

  3. /config/gtm/wideip.conf

  4. /config/BIG-IP_local.conf

Correct Answer: D

Question No.99

To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the

. (Fill in)

  1. Deployment Wizard

  2. Setup Wizard

  3. Policy Wizard

  4. Visual Wizard

Correct Answer: A

Question No.100

Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)

  1. An organization using Novell Netware for authentication.

  2. An organization that has been recently fined for failing security compliance.

  3. An organization with a traveling sales force.

  4. An organization with a single location and no remote employees.

  5. An organization that needs to ensure users are using Symantec antivirus software.

  6. An organization sharing a public Web site for all Internet users.

Correct Answer: BCE

Get Full Version of the Exam
101 Dumps
101 VCE and PDF