Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.161
What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)
-
Channeled configuration
-
VLAN configuration
-
NAT configuration
-
SNAT configuration
-
Asymmetric configuration
-
Routed configuration
Correct Answer: DF
Question No.162
Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effectively than any other firewalls?
-
Because F5 has unlimited capacity to handle SSL traffic.
-
Because F5 has full visibility and control of SSL traffic.
-
Because F5 has a separate iApp to handle SSL traffic.
-
Because F5 supports large SSL key sizes.
Correct Answer: B
Question No.163
A client sends a request to a virtual server http://www.foo.com configured on the BIG-IP ASM System. The virtual server has an HTTP class profile associated with Application Security enabled, all class filters set to match all, and a pool consisting of foo.com members. The virtual server also has a default pool associated with it. When the client sends a request for http://www.foo.com, this traffic will be forwarded to which of the following?
-
The fallback host
-
The default pool
-
The HTTP class profile pool
-
The request will be dropped
Correct Answer: C
Question No.164
The Rapid Deployment Policy is used to:
-
Improve website performance
-
Quickly protect web sites for most common attacks
-
Improve ASM performance
-
Provide wizard functionality for quick policy creation
Correct Answer: B
Question No.165
What feature of the F5 Exchange solution helps administrators to streamline implementation for added security and granular control?
-
iControl
-
Enterprise Manager
-
iApps
-
WebAccelerator
Correct Answer: A
Question No.166
ASM can detect Layer 7 DoS attacks by which four ways of monitoring: (Choose four.)
-
Monitoring for a threshold of increased number of transactions per second per URL.
-
Monitoring for a % change in transactions per second per URL.
-
Monitoring for a % change in server latency or TPS.
-
Monitoring for a threshold of increased server latency or TPS.
-
Monitoring ASM policy builder performance.
-
Monitoring BIG-IP CPU utilization.
-
Deep Packet inspection.
Correct Answer: ABCD
Question No.167
One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.
-
True
-
False
Correct Answer: A
Question No.168
How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)
-
any text string within a cookie
-
any bytes within the initial client request packet
-
an IP address
-
the value in the tcp acknowledgement field
Correct Answer: AC
Question No.169
A site has assigned the ICMP monitor to all nodes and a custom monitor, based on the HTTP template, to a pool of web servers. The HTTP-based monitor is working in all cases. The ICMP monitor is failing for 2 of the pool member 5 nodes. All other settings are default. What is the status of the monitor is working in all cases? What is the status of the pool members?
-
All pool members are up since the HTTP-based monitor is successful.
-
All pool members are down since the ICMP-based monitor is failing in some cases.
-
The pool members whose nodes are failing the ICMP-based monitor will be marked disabled.
-
The pool members whose nodes are failing the ICMP-based monitor will be marked unavailable.
Correct Answer: D
Question No.170
Which of the following statements are correct regarding positive and negative security models? (Choose two.)
-
Positive security model allows all transactions by default.
-
Negative security model denies all transactions by default.
-
Negative security model allows all transactions by default and rejects only transactions that contain attacks.
-
Positive security mode l denies all transactions by default and uses rules that allow only those transactions that are considered safe and valid.
Correct Answer: CD
Get Full Version of the Exam
101 Dumps
101 VCE and PDF