Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.401
The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each file in order to more efficiently sort and store end user data.
-
True
-
False
Correct Answer: B
Question No.402
ASM combined with LTM provides protection against:
-
Layer 7 DoS attacks
-
All of the above
-
Layer 4 DoS attacks
-
DDoS attacks
Correct Answer: B
Question No.403
Which of the following statements about cookie persistence is NOT true?
-
The cookie#39;s timeout value can be customized.
-
They are F5#39;spreferred persistence method.
-
No persistence information is placed on LTM.
-
Web servers must be configured to send cookies to clients.
-
They do not add a performance impact on LTM.
Correct Answer: D
Question No.404
When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacity.
-
True
-
False
Correct Answer: B
Question No.405
The Flow Login feature prevents which web vulnerability from occurring?
-
Buffer overflow
-
Cookie poisoning
-
Forceful browsing
-
Cross site scripting
Correct Answer: C
Question No.406
Generally speaking, should the monitor templates be used as production monitors or should they be customized prior to use?
-
Most templates, such as HTTP and TCP, are as effective as customized monitors.
-
Monitor template customization is only a matter of preference, not an issue of effectiveness or performance.
-
Most templates, such as https, should have the receive rule customized to make the monitor more robust.
-
While some templates, such as ftp, must be customized, those that can be used without modification are not improved by specific changes.
Correct Answer: C
Question No.407
Poor Web application performance contributes to which four of these issues for businesses? (Choose four.)
-
A Web site that goes unused
-
Increased support calls
-
Loss of users
-
Loss of revenue
-
DDoS attacks
-
Identity theft
Correct Answer: ABCD
Question No.408
APM administrators can configure access policies granting users which two types of access?
-
CIFS access
-
Client/server access
-
Web application access
-
Proxy access
-
RDC access
Correct Answer: D
Question No.409
The least connections load balancing method functions best when all pool members share similar
characteristics.
-
True
-
False
Correct Answer: A
Question No.410
Without creating a user defined region, what is the most specific group a topology record can identify?
-
city
-
country
-
continent
-
state/province
-
region of country
Correct Answer: D
Get Full Version of the Exam
101 Dumps
101 VCE and PDF