[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 61-70

Get Full Version of the Exam

Question No.61

Where is persistence mirroring configured?

  1. It is always enabled.

  2. It is part of a pool definition.

  3. It is part of a profile definition.

  4. It is part of a virtual server definition.

Correct Answer: C

Question No.62

Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP

service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.

  1. Edge Client

  2. iRules

  3. LTM

  4. IP intelligence

  5. iApps

Correct Answer: D

Question No.63

A virtual server is listening at and has the following iRule associated with it:


If a user connects to and port 22, which pool will receive the request?

  1. ftp pool

  2. telnet pool

  3. None. The request will be dropped.

  4. Unknown. The pool cannot be determined from the information provided.

Correct Answer: D

Question No.64

Which of the following is not a feature of a standalone BIG-IP ASM System?

  1. Attack signatures

  2. Multiple pool members

  3. Positive security model

  4. Real-time traffic policy builder

  5. Predefined security policy templates

Correct Answer: B

Question No.65

Administrators can customize APM to resemble other internal Web applications in the organization.

  1. True

  2. False

Correct Answer: A

Question No.66

A object maps a FQDN to virtual servers. (Fill in)

Correct Answer: Wide IP

Question No.67

Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)

  1. ping

  2. Application monitors

  3. Inband monitors

  4. SSH

  5. iQuery

  6. SNMP

Correct Answer: ABEF

Question No.68

A user is building a security policy using the Deployment Wizard and the Rapid Deployment application template. By default, which settings will be applied to the security policy? (Choose three.)

  1. Data Guard will be enabled.

  2. The enforcement mode will be set to transparent.

  3. The encoding language will be set to auto detect.

  4. Wildcard tightening will be enabled on file types and parameters.

  5. The Attack signature set applied will be Generic Detection Signatures.

Correct Answer: ABE

Question No.69

An LTM has the 3 virtual servers, a SNAT, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. A connection attempt is made with a source IP and port of and a destination IP and port of When the request is processed, what will be the destination IP address?


  1. Destination IP:

  2. Destination IP: pool member in the 192.168/16 network.

  3. Destination IP: pool member in the 172.16/16 network

  4. The request will be dropped.

Correct Answer: A

Question No.70

Which of the following is a benefit of using iRules?

  1. They provide a secure connection between a client and LTM

  2. They enable granular control of traffic

  3. They can be used as templates for creating new applications

  4. They can use Active Directory to authenticate and authorize users

  5. They provide an automated way to create LTM objects

Correct Answer: B

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com