ActualTest Questions Flashcards
(368 cards)
To make complex access policies easier to manage, an administrator can create a _______
containing several policy actions, and then add instances of it within the policy? (Fill in)
A.
Visual Policy Editor
B.
Policy Editor
C.
Visual Editor
D.
Policy creator
A.
Visual Policy Editor
To make complex access policies easier to manage, an administrator can create a policy
containing several policy actions, and then add instances of it within the policy using the
________. (Fill in)
A.
Deployment Wizard
B.
Setup Wizard
C.
Policy Wizard
D.
Visual Wizard
A.
Deployment Wizard
QUESTION NO: 3
The Policy Builder benefits include:
A.
Doesn’t require in depth web application knowledge
B.
Only requires limited ASM knowledge
C.
All of the above
D.
Very low administrative impact
C.
All of the above
APM administrators can configure access policies granting users which two types of access?
A.
CIFS access
B.
Client/server access
C.
Web application access
D.
Proxy access
E.
RDC access
D.
Proxy access
QUESTION NO: 5
Which of the following is a benefit of using iRules?
A.
They provide a secure connection between a client and LTM
B.
They enable granular control of traffic
C.
They can be used as templates for creating new applications
D.
They can use Active Directory to authenticate and authorize users
E.
They provide an automated way to create LTM objects
B.
They enable granular control of traffic
APM provides access control lists at which two OSI layers? (Choose two.)
A.
Layer 5
B.
Layer 4
C.
Layer 7
D.
Layer 6
E.
Layer 2
B.
Layer 4
C.
Layer 7
TMOS is an F5 software module that runs on the BIG-IP platform.
A.
True
B.
False
Answer: B
Explanation:
TMOS is multi-module OS on Big-IP platform
Which four F5 products are on the TMOS platform? (Choose four.)
A.
ARX
B.
GTM
C.
WOM
D.
APM
E.
ASM
F.
Firepass
B.
GTM
C.
WOM
D.
APM
E.
ASM
Which of the following is NOT a profile type on the BIG-IP?
A.
Protocol
B.
Application
C.
Persistence
D.
Authentication
E.
SSL
B.
Application
The BIG-IP determines the lowest connection speed between the client and the server and then
uses that for both connections.
A.
True
B.
False
B.
False
Another name for the F5 OneConnect feature is TCP multiplexing.
A.
True
B.
False
A.
True
LTM runs on______F5’s proprietary product platform. (Fill in the correct answer)
A.
ARX
B.
Firepass
C.
Acopia
D.
TMOS
D.
TMOS
Which programming language is the basis for F5 iRules?
A.
Lisp
B.
C++
C.
Java
D.
TCL
E.
AWK
D.
TCL
What are the two most common methods of placing a BIG-IP device into a network environment?
(Choose two.)
A.
Channeled configuration
B.
VLAN configuration
C.
NAT configuration
D.
SNAT configuration
E.
Asymmetric configuration
F.
Routed configuration
D.
SNAT configuration
F.
Routed configuration
Which of the following is NOT a benefit of using SSL offload?
A.
It increases the bandwidth between the client and LTM.
B.
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a
pool member.
C.
The organization requires far less SSL certificates.
D.
The CPU processing load on backend servers is reduced.
E.
It enables iRules to be used on traffic arriving to LTM that is encrypted.
A.
It increases the bandwidth between the client and LTM.
Explanation:
SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a
pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.
When using a routed configuration, the real server must point to the LTM as the ________.
A.
NTP Server
B.
DNS Server
C.
Virtual IP
D.
WINS server
E.
Default gateway
E.
Default gateway
TCP Express is licensed separately from LTM
A.
True
B.
False
B.
False
Explanation: TCP Express is licensed including in LTM
LTM can only load balance outbound traffic by using iRules
A.
True
B.
False
A.
True
Which two of these statements about OneConnect are true? (Choose two.)
A.
It decreases the CPU load on LTM
B.
It aggregates multiple client connections into a single server connection
C.
It decreases the amount of traffic between multiple clients and LTM
D.
It requires SNAT to be configured
E.
It decreases the CPU load on pool members
B.
It aggregates multiple client connections into a single server connection
E.
It decreases the CPU load on pool members
GTM solves which three of these standard DNS limitations? (Choose three.)
A.
It can verify that a host is available before resolving a host name for a client.
B.
It can use HTTPS for the connection between itself and the client.
C.
It can ensure that clients remain at the same data center for stateful applications.
D.
It can verify that a client does not have any viruses before sending the IP address.
E.
It has more complex load balancing methods.
A. It can verify that a host is available before resolving a host name for a client.
C. It can ensure that clients remain at the same data center for stateful applications
E. It has more complex load balancing methods.
Explanation:
GTM solves three of these standard DNS limitations
It can verify that a host is available before resolving a hostname for a client
It can ensure that clients remain at the same data center for stateful applications
It has more complex load balancing methods
Using IP Geolocation, an organization can always direct a client request from France to a
datacenter in Dublin.
A.
True
B.
False
A.
True
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose
three.)
A.
Web Accelerator
B.
APM
C.
ARX
D.
GTM
E.
Firepass
F.
Enterprise Manager
A.
Web Accelerator
B.
APM
D.
GTM
Explanation:
These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and
GTM.
Customers can purchase LTM as a stand-alone product, or layer it with additional software
modules to increase the functionality of the BIG-IP device.
A.
True
B.
False
A.
True
Which two of the following options can LTM use when all of the pool members are not available or
if the pool is overloaded?
A.
Floating IPs
B.
Fallback host
C.
Auto last hop
D.
SNAT automap
E.
Pool offload
F.
Priority group activation
D.
SNAT automap