Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

101 Exam Dumps - Application Delivery Fundamentals

Question # 4

A BIG IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers?

A.

time

B.

ntpdate

C.

date

D.

ntpq

Full Access
Question # 5

An administrator wants to insert per-session data in a users browser so that user requests are directed to Which session persistence method should the administrator use?

the same session

A.

SSL persistence

B.

Source address persistence

C.

destination address persistence

D.

cookie persistence

Full Access
Question # 6

Which OSI layer provides reliable transmission of frames between adjacent nodes and is built on top of the provides reliable transmission of frames adjacent nodes and is built on top of the Physical layer?

A.

Data link

B.

Transport

C.

Network

D.

Application

Full Access
Question # 7

Given the service list of a server shown, the administrator needs to determine why users are unable to resolve the IP addresswww.example.com .

What is the causing this issue?

A.

bigd is down

B.

named is down

Full Access
Question # 8

What are three functions commonly performed by HTTP cookies? (Choose three)

A.

Track users' browsing activities

B.

hold User preferences

C.

maintain session state

D.

execute client side scripts

E.

execute server side scripts

Full Access
Question # 9

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

A.

Use HTTP keep-alive

B.

set a larger receive window

C.

Enable delayed ACKs

D.

use an indefinite timeout

Full Access
Question # 10

An organization needs to cryptographically sign its domains. Which F5 product provides this functionality?

A.

GTM

B.

LTM

C.

ASM

D.

APM

Full Access
Question # 11

In wh.ch layer of the OSI model is the data transported in the form of a packet?

A.

Transport

B.

Session

C.

Network

D.

Presentation

Full Access
Question # 12

If a workstation is configured with an address of 224 0.0.1 which functionality will it allow?

A.

loopback to itself

B.

broadcasting to the local subnet

C.

multicasting to the local subnet

D.

automatic private IP addressing

Full Access
Question # 13

A web administrator has added content to a web application, but users are unable to access the new content What could be preventing them from accessing the content?

A.

The webapp uses negative security, and the attack signature is using an invalid regular expression

B.

The webapp uses positive security. and the nourishes database has not been updated

C.

The webapp uses positive security, and the new content has not been defined as allowed behavior

D.

The webapp uses negative security. and the denial of service signatures have not been updated

Full Access
Question # 14

ARP provides translation between which two address types?

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Full Access
Question # 15

Which two destination pods should be used in a default active FTP Session? (Choose two)

A.

UDP 20

B.

TCP 20

C.

TCP 22

D.

TCP 21

E.

UDP 21

Full Access
Question # 16

What command sends an "Echo Request' message and expects an "Echo Reply" message?

A.

ping

B.

netstal

C.

tcpdump

D.

echo

Full Access
Question # 17

Which three security controls are used in an SSL transaction? (Choose three.)

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Full Access
Question # 18

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Full Access
Question # 19

Comment calculator DNS error SERVFAL. HTTP 404 and SMTP error 550 are all examples of which type of error?

A.

Service

B.

Application

C.

Network

D.

Session

Full Access
Question # 20

Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?

A.

Segment

B.

Datagram

C.

Packet

D.

Bit

Full Access
Question # 21

A company deploys F5 load balancers to manage number of secure applications. The company needs to centrally manage certificates.

Which F5 product provides this functionality?

A.

BIG IQ

B.

GTW

C.

iHeath

D.

LTM

Full Access
Question # 22

Which two protocol are used for the retrieval of email? (Choose two)

A.

ICAP

B.

SMTP

C.

IMAP

D.

POP3

E.

SNMP

Full Access
Question # 23

An administrator needs to connect a new device to a switched network. The interconnect must be both redundant and combined bandwidth than a single link Which low-level protocol will help facilitate this?

A.

Link Aggregation Control Protocol (LACP)

B.

Link Allocation & Configuration Protocol (LACP)

C.

Link Local Distribution Protocol (LLDP)

D.

Link Layer Discovery Protocol (LDP)

Full Access
Question # 24

ICMP is used by which command line tool?

A.

curt

B.

tcpdump

C.

traceroute

D.

nslookup

Full Access
Question # 25

Ethernet frame FCS errors occur when which calculation fails?

A.

FSCM

B.

CRC

C.

CSR

D.

HSTS

Full Access
Question # 26

What describes the third ‘’A’’ in the common authentication acronym AAA?

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Full Access
Question # 27

What is used to resolve IP address to MAC address mappings?

A.

DHCP

B.

ARP

C.

DNS

D.

ICMP

Full Access
Question # 28

What is a disadvantage of running a visualized load balancer

A.

more expensive than a hardware load balancer

B.

slower than a hardware load balancer

C.

less reliable than a hardware load balancer

D.

does not support high availability

Full Access
Question # 29

What does response code HTTP 302 represent?

A.

The server encountered an unexpected condition that prevented it from Milling the request.

B.

The server has not found anything matching the Request URI

C.

The request has succeeded.

D.

The requested resource resides temporary under a different URI

Full Access
Question # 30

Host A sends 10 TCP packets to Host B. All packets arrive at Host B quickly, but some arrive out of order.

What will Host B do?

A.

ACK only packets that are in order

B.

drop all packets and wait for arrival in order

C.

drop any packets that arrive out of order

D.

ACK all packets and place them in order

Full Access
Question # 31

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Full Access
Question # 32

An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality?

A.

iCall

B.

iRules

C.

iSession

D.

iControl

Full Access
Question # 33

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

A.

ASM

B.

APM

C.

AFM

D.

GTM

Full Access
Question # 34

in which scenario is a full proxy TCP connection required?

A.

when SIP UP P load balancing is defined

B.

when DNS load balancing is configured

C.

when compression is enabled

D.

when layer 3 load balancing is configured

Full Access
Question # 35

An IPv4 client tries to access to http://www myserver com

Which type of DNS request should the client send to its configured DNS server?

A.

type NS

B.

type A

C.

type AAAA

D.

type MX

Full Access
Question # 36

A company deploys F5 load balancers to manage a large number of secure applications. The company manage certificates. Which F5 provides this functionality?

A.

iHealthy

B.

BIG-IQ

C.

GTM

D.

LTM

Full Access