March Sale Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

101 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

101 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Application Delivery Fundamentals
  • Last Update: Mar 4, 2024
  • Questions and Answers: 240
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

101 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

101 Application Delivery Fundamentals Questions and Answers

Question # 6

In a load balanced scenario which service would require persistence to function correctly?

A.

Simple Mail Transport Protocol

B.

DNS

C.

Web-based email

D.

HTTP

Full Access
Question # 7

What is an advantage of a packet forwarding architecture?

A.

allows for manipulation of HTTP headers

B.

allows for SSL offload

C.

reduces latency

D.

handles larger packet sizes

Full Access
Question # 8

An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?

A.

System > Archives

B.

System > Services > Backup

C.

System > Backup

D.

System > File Management

Full Access
Question # 9

What is the primary function of a certificate authority?

A.

to expire outdated certificates

B.

to verify and validate certificates

C.

to store security certificates

D.

to sign certificate signing requests

Full Access
Question # 10

In which scenario is a full proxy TCP connection required?

A.

TCP routing

B.

IPv4 lo IPv6 gateway

C.

UDP routing

D.

UDP to ICMP gateway

Full Access
Question # 11

In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?

A.

FEBO::1

B.

FF8Q 0.0 : :1

C.

2001 :: 127 : : 1

D.

: : 1

Full Access
Question # 12

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

Full Access
Question # 13

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.

11. Times exceeded

What does this mean?

A.

A faulty router on the network is unable to process the packet in a timely manner

B.

A switch on the network the frame due to an incorrect checksum

C.

The TTL field of the IP header was set to 255. and this was consequently dropped by a router

D.

The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router

Full Access
Question # 14

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Full Access
Question # 15

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Full Access
Question # 16

A client is transmitting a large amount of data to a server During this process, the server sets the window size to zero What is the likely cause of this issue?

A.

The server is unable to accept more data

B.

The server resets the connection

C.

The client runs out of network buffers

D.

The server reaches its maximum segment size

Full Access
Question # 17

A company deploys F5 load balancers to manage number of secure applications. The company needs to centrally manage certificates.

Which F5 product provides this functionality?

A.

BIG IQ

B.

GTW

C.

iHeath

D.

LTM

Full Access
Question # 18

A BIG-IP Administrator contacts F5 Support and is asked to upload a Support Snapshot. Which command should be entered to the CLI to generate the requested file?

A.

imsh generate snapshot

B.

tmsh tcpdump

C.

tmsh save sys ucs support

D.

tmsh qkview

Full Access
Question # 19

An administrator needs to do the following

* install a load balancer in front of an existing application

* test application performance

* avoid reconfiguration of the application server

* avoid interruption of users accessing the application

A.

modify the test client's local host file

B.

modify the DNS Server A-record for the application

C.

configure IP Anycasting

D.

configure Port Address Translation

Full Access
Question # 20

Which method should an administrator of the BIG-IP use to sync the configuration to only certain other BIG-IPs?

A.

synchronize only certain folders

B.

exclude devices from certain Traffic Groups

C.

exclude devices from certain Sync Groups

D.

exclude devices from certain Device Groups

Full Access
Question # 21

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Full Access
Question # 22

An administrator wants to insert per-session data in a users browser so that user requests are directed to Which session persistence method should the administrator use?

the same session

A.

SSL persistence

B.

Source address persistence

C.

destination address persistence

D.

cookie persistence

Full Access
Question # 23

Which HTTP response code indicates an OK status?

A.

302

B.

404

C.

200

D.

100

Full Access
Question # 24

in which scenario is a full proxy TCP connection required?

A.

when SSL offloading is used

B.

when Traffic is routed

C.

when administrators manage the servers directly

D.

when 3 server responds directly to the client

Full Access
Question # 25

Exhibit.

101 question answer

the Web application Server made a query to the Database to present dynamic content for a user who would be the client?

A.

The User

B.

The Big-IP

C.

The Database

D.

The Web application server

Full Access
Question # 26

An administrator needs to provide access to corporate resources for remote users. The administrator also needs to verify that the remote use has anti-virus software installed. Which F5 product provides this functionality?

A.

ASM

B.

APM

C.

AFM

D.

TGM

Full Access
Question # 27

Which two destination pods should be used in a default active FTP Session? (Choose two)

A.

UDP 20

B.

TCP 20

C.

TCP 22

D.

TCP 21

E.

UDP 21

Full Access
Question # 28

Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?

A.

grep

B.

ping

C.

dig

D.

find

Full Access
Question # 29

in which scenario is a full proxy TCP connection required?

A.

when SIP UP P load balancing is defined

B.

when DNS load balancing is configured

C.

when compression is enabled

D.

when layer 3 load balancing is configured

Full Access
Question # 30

What tool should the BIG-IP Administrator use to view the status of all virtual servers and associated resources in one place?

A.

System performance

B.

Network Map

C.

Pool statistics

D.

Virtual server statistics

Full Access
Question # 31

A user wishes to retries a file from an FTP server

minimum of how many TCP connections are required to perform this action?

A.

3

B.

1

C.

4

D.

2

Full Access
Question # 32

An administrator configures a custom MAC masquerade address on a redundant BIG-IP system

What will be the result?

A.

The administrator will be prompted during configuration to define which until will use the MAC masquerade address

B.

The MAC masquerade address will be concurrently used by both active and standby unit

C.

The MAC masquerade address will only be used by the active unit. The standby unit in use the system's actual interfaces (s) MAC address

D.

The MAC masquerade address will only be used by the un.t with higher unit ID The other unit wilt use the system's actual interface(s) MACaddress

Full Access
Question # 33

What are the two primary functions of the OSI 7 layer model (Choose two)

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors

Full Access
Question # 34

What describes the third ‘’A’’ in the common authentication acronym AAA?

A.

provides redundancy

B.

measures usage against an identity

C.

provides user filtered access

D.

ensures the correct identity

Full Access
Question # 35

An administrator notices the following log message generated by a BIG IP system " diskmonitor 011d005: Disk partition shared has less than 30% tree" Which command should the administrator use to troubleshoot the problem?

A.

parted-1

B.

fdisk-1

C.

isbik

D.

df-h

Full Access
Question # 36

Which three security controls are used in an SSL transaction? (Choose three.)

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Full Access