Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

101 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

101 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Application Delivery Fundamentals
  • Last Update: Sep 13, 2025
  • Questions and Answers: 240
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

101 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

101 Practice Exam Questions with Answers Application Delivery Fundamentals Certification

Question # 6

A website is using source address persistence with a 30 second timeout A client is idle for 35 seconds

What happens to their connection?

A.

The client receives a "404 Page Not Found'" error

B.

The client connection is dropped

C.

The client remains on the same server

D.

The Client request is load balanced

Full Access
Question # 7

What is the nest hop used to send traffic to reach 192.168.1.50?

101 question answer

A.

172. 17. 12. 51

B.

192. 168. 150

C.

172. 17. 12.254

D.

172. 17. 12/ 255

Full Access
Question # 8

What should a BIG-IP Administrator configure to minimize impact during a failure?

A.

MAC masquerading

B.

Clone pool

C.

External monitors

D.

One Connect profile

Full Access
Question # 9

An administrator needs to connect a new device to a switched network. The interconnect must be both redundant and combined bandwidth than a single link Which low-level protocol will help facilitate this?

A.

Link Aggregation Control Protocol (LACP)

B.

Link Allocation & Configuration Protocol (LACP)

C.

Link Local Distribution Protocol (LLDP)

D.

Link Layer Discovery Protocol (LDP)

Full Access
Question # 10

A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?

A.

Public Key

B.

SSL extension

C.

A negotiated security algorithm

D.

private Key

Full Access
Question # 11

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Full Access
Question # 12

101 question answer

An administrator configures secure remote access to a server's shell Given the netstal output, what did the administrator configure?

A.

teinetd. allowing connections only from IP address 10 .1. 10.46

B.

sshd. listening on IP address 10. 1. 10.46

C.

sshd. allowing connections only from IP address 10.1. 10. 46

D.

teinetd listening on IP address 10.1. 10. 46

Full Access
Question # 13

A BIG-IP Administrator needs to open a case with F5 Support for a specific issue with an existing HA pair of BIG-IP platform. What should be uploaded to iHealth prior to opening the case to expedite processing of the support case?

A.

UCS file

B.

SCF filo

C.

tcpdump file

D.

Qkview file

Full Access
Question # 14

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Full Access
Question # 15

A BIG-IP Administrator needs to configure a network to separate traffic into three different VLANs using a single port on the BIG-IP device. What means should be used to allow this?

A.

LACP link aggregation

B.

Multiple MAC registration Protocol

C.

0902 19 VLAN tagging

D.

Port Spanning

Full Access
Question # 16

An Administrator enables HTTP keep alive.

How does this affect the network?

A.

HTTP connections will remain open longer

B.

Fewer TCP connections will need to be opened

C.

HTTP connections will close when the keep-alive times out

D.

More TCP connections will need to be opened

Full Access
Question # 17

An organization needs to protect its data center from layer three-based and layer four-based exploits. Which F5 product provides this functionality

A.

AFM

B.

ASM

C.

GTM

D.

APM

Full Access
Question # 18

Which protocol data unit (PDU) is associated with the OSI model’s Physical layer?

A.

Frame

B.

Datagram

C.

Segment

D.

Bit

Full Access
Question # 19

In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?

A.

FEBO::1

B.

FF8Q 0.0 : :1

C.

2001 :: 127 : : 1

D.

: : 1

Full Access
Question # 20

An application uses a proprietary protocol running over TCP

Which FS BIG-IP feature should the administrator use to modify the protocol?

A.

SPDY

B.

rewrite profile

C.

TCP profile

D.

iRules

Full Access
Question # 21

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

Full Access
Question # 22

Which TransportLayer Security (TLS) extension can be used to enable a single virtual server to serve multiple HTTPS websites in different can be used to enable a single virtual server to server domains?

A.

Session Tickets

B.

OCSP Staping

C.

Server Name indication

D.

Certificate Status Request

Full Access
Question # 23

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

Full Access
Question # 24

An administrator is given the IP Address of 192.168.100.124 and needs 64 subnets.

How many hosts per network are allowed?

A.

4

B.

8

C.

6

D.

2

Full Access
Question # 25

What is an advantage of packet forwarding architecture?

A.

allows for SSL offload

B.

reduces latency

C.

allows for manipulation of HTTP headers

D.

handles larger packet sizes

Full Access
Question # 26

Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?

A.

Segment

B.

Datagram

C.

Packet

D.

Bit

Full Access
Question # 27

A BIG IP Administrator need to perform a packet capture and identify the source IP that is connecting to the Virtual Server.

Which utility should the administrator use on the BIG IP device?

A.

leinel

B.

traceroute

C.

ping

D.

tcpdump

Full Access
Question # 28

What are Iwo examples of failover capabilities of BIG-IP? (Choose two )

A.

failing over based on an over temperature alarm

B.

failing over serial cable based on electric failure code

C.

II failing over network connection based on heartbeat detection

D.

fading over network connection based on SNMP error

E.

failing over serial cable based on voltage detection

Full Access
Question # 29

The administrator wants client request to be directed to the same pool member through the session based on the client IP address.

Which persistence method should the administrator choose?

A.

SSL persistence

B.

destination address affinity persistence

C.

cookie persistence

D.

Source address affinity persistence

Full Access
Question # 30

Which protocol data unit (POU) is associated with the OSI model’s Network layer

A.

Segment

B.

Datagram

C.

Bit

D.

Frame

Full Access
Question # 31

Which three security controls are used in an SSL transaction? (Choose three.)

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Full Access
Question # 32

Which protocol Authenticates network traffic between hosts end without encryption?

A.

PPTP

B.

GRE

C.

IPSec AH

D.

iPSec ESP

Full Access
Question # 33

Which two destination pods should be used in a default active FTP Session? (Choose two)

A.

UDP 20

B.

TCP 20

C.

TCP 22

D.

TCP 21

E.

UDP 21

Full Access
Question # 34

A BIG-IP Administrator is cleaning up unused Virtual Servers and pools via the Configuration Utility while trying to delete certain administrator receives an error message that indicates that the pool is in use.

What is the likely cause of this error?

A.

The pool members are all disabled

B.

The pool is in use by a Virtual Server

C.

The pool members are marked up with a green circle

D.

The pool is in use by a monitor

Full Access
Question # 35

An administrator needs to rapidly deter e newly discovered security threat to a remote desktop application.

Which F5 feature provides this functionality?

A.

iRules

B.

SSL profiles

C.

Proxy SSL

D.

SPDY

Full Access
Question # 36

In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic

What should be used for this task?

A.

Big-IP Global Traffic Manager appliance

B.

Big-lP standard virtual edition

C.

Big-IP Local Traffic Manager appliance

D.

Big-IP virtual edition with FIPS

Full Access
Question # 37

Ethernet frame FCS errors occur when which calculation fails?

A.

FSCM

B.

CRC

C.

CSR

D.

HSTS

Full Access
Question # 38

Web application http://www.example.com at 10.10.1.1.110, is unresponsive. A recent change migrated DNS to a new platform

A.

telnet www example com 80

B.

curl http //www example com

C.

dig www example com

D.

telnet 10.10.1. 110. 80

Full Access
Question # 39

What we two advantages of using SSL offloading? (Choose two)

A.

Offloads the client to SSL processing

B.

provides single point of management for private keys

C.

reduces server load significantly

D.

encrypts all communications and to end

E.

allows secure remote access to internal server resources

Full Access
Question # 40

Which of the following is a valid IP address and prefix length?

A.

192. 168.:0 177/25

B.

192 168:0. 129/25

C.

192.168:0 128/25

D.

192 168 :0 255/25

Full Access
Question # 41

which version of SNMP can AuthPriv be used?

A.

2

B.

3

C.

2c

D.

3c

Full Access
Question # 42

A BIG-IP Administrator needs to make sure that requests from a single user are directed to the server that was initially selected (unless that server is marked down). What should the administrator configure?

A.

caching profile

B.

TCP profile

C.

persistence profile

D.

security policy

Full Access
Question # 43

An administrator needs to prepare change control documents for operations staff To reduce possible errors the administrator killed number of default configuration options is choose from. Which F5 feature is intended to help with this task?

A.

icontrol

B.

iCatl

C.

iApp

D.

iRules

Full Access
Question # 44

101 question answer

What should the administrator investigate first to address this traffic slownes

A.

The virtual server indicates 14 slow connections killed

B.

The pool member is unchecked

C.

Interface 1.2 shows 9.2K errors

D.

The pool shows no current connections.

Full Access
Question # 45

What does response code HTTP 302 represent?

A.

The server encountered an unexpected condition that prevented it from Milling the request.

B.

The server has not found anything matching the Request URI

C.

The request has succeeded.

D.

The requested resource resides temporary under a different URI

Full Access
Question # 46

ARP provides translation between which two address types?

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

Full Access
Question # 47

The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?

A.

2001:db8

B.

2001:db8: : 255

C.

2001:db8: : ffff:ffff:ffff:fffe

D.

2001:db8: :ffff:ffff:ffff:ffff

Full Access
Question # 48

An administrator needs to assess an LTM for potential configuration issues and required security updates.

Which F5 website con automate this task?

A.

addf5f5.com

B.

ihealth5.com

C.

Devcentral f5.ccom

D.

www.f5.Com

Full Access
Question # 49

A client is transmitting a large amount of data to a server During this process, the server sets the window size to zero What is the likely cause of this issue?

A.

The server is unable to accept more data

B.

The server resets the connection

C.

The client runs out of network buffers

D.

The server reaches its maximum segment size

Full Access
Question # 50

VLAN test-vlan" is configured on interface 1 1 instead of interface 1.2. Which TMSH command should be used to correct this issue?

A.

modify /net test vlan interfaces {1.2}

B.

modify /net test-vlan interfaces replace all with {1 2}

C.

modify /net vlan test-vlan interfaces replace all with {12}

D.

modify /net sian test-vlan interfaces {1 2}

Full Access
Question # 51

An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?

A.

System > Archives

B.

System > Services > Backup

C.

System > Backup

D.

System > File Management

Full Access
Question # 52

A server is capable of handling more connections than other servers in the same pool. Which load distribution method should the administrator choose?

A.

Least Connections

B.

Fastest

C.

Ratio

D.

Round Robin

Full Access
Question # 53

in which scenario is a full proxy required?

A.

When a separation between client and server connection .s needed

B.

When administration directly access the servers for administration

C.

when the server sends the response through Iho load balancer

D.

when all TCP client parameters must be seen by the server

Full Access
Question # 54

What is used to provide mutual authentication for TLS/SSL?

A.

X 509 Certificate

B.

Access List

C.

Shared Secret key

D.

Mutually Trusted issuer

Full Access
Question # 55

A device needs to decrypt traffic and send unencrypted traffic to the web server. Which method should the BIG-IP Administrator use?

A.

SSL Optimization

B.

SSL Caching

C.

SSL Termination

D.

SSL Bridging

Full Access
Question # 56

Which techology can be used on a BIG-IP device to accelerate the delivery of the same content to multiple user?

A.

persistence

B.

SSL offloading

C.

Compression

D.

caching

Full Access
Question # 57

In the context of load balancing, what does the term persistence" refer to?

A.

Ensuring requests from a single source always end up being handled by the same server.

B.

the ability to associate different HTTP requests to a single user so that activity can be tracked.

C.

Keeping TLS session key information in memory so sessions can be quickly resumed

D.

the ability to keep idle connections open as long as possible by sending dummy traffic periodically

Full Access
Question # 58

A BIG-IP Administrator contacts F5 Support and is asked to upload a Support Snapshot. Which command should be entered to the CLI to generate the requested file?

A.

imsh generate snapshot

B.

tmsh tcpdump

C.

tmsh save sys ucs support

D.

tmsh qkview

Full Access
Question # 59

101 question answer

A BIG IP Administrator needs to create a virtual server for a new secure end-to-end web application After change in configuration the virtual server .3 still marked down. The configuration of the virtual server and the pool member are correct. A quick server shows the status.

To fix the issue, what should the BIG-IP Administrator inform the web server administrator to do?

A.

change web server configuration to use SSL/TLS

B.

reboot the server

C.

restart the web service

D.

change web server configuration lo use SSH/SCP

Full Access
Question # 60

101 question answer

What is the correct procedure to comply with the recommendation?

A.

Download the product version image from ihealth f5 com

B.

Download the product version image from support 6 com

C.

Download the product version image from dovcentral f5.com

D.

Download the product version image from downloads f5.com

Full Access
Question # 61

Cryptographic hash functions can be used to provide which service?

A.

data modification

B.

data encryption

C.

data validation

D.

data decryption

Full Access
Question # 62

A BIG IP Administrator reviews the Virtual Server configuration and sees the object status represented by a blue square tor an unknown status.How should the administrator change the unknown status?

A.

restart the BIG-IP device

B.

assign a monitor to the pool

C.

restart the backend webserver

D.

run a packet capture on the BIG-IP device

Full Access
Question # 63

A BIG-IP Administrator is trying to send traffic to a server on the same subnet and sees an incomplete in the BIG-IP devices ARP table. What could cause the incomplete status?

A.

BIG-IP device connection is half-duplex

B.

Router does not have a default gateway

C.

Firewall is blocking ICMP

D.

Server's switch connection is in the wrong VLAN

Full Access
Question # 64

Which HTTP response code is returned when a web

server requires authentication to access a resource?

A.

500

B.

401

C.

302

D.

100

Full Access
Question # 65

A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers ?

A.

ntpdate

B.

time

C.

mpa

D.

date

Full Access
Question # 66

Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?

A.

context-based access control mode!

B.

role-based access control mode!

C.

negative security model

D.

positive security model

Full Access
Question # 67

Which FTP mode should be used by a client behind a firewall that has no special configurator?

A.

Passive FTP

B.

Secure FTP

C.

Active FTP

D.

Protected FTP

Full Access
Question # 68

A BIG IP virtual Server with an IP address of 10.100.43.108 must be available to public internet users. Which technology should be used to achieve this task?

A.

NDP

B.

DNS

C.

NAT

D.

ARP

Full Access
Question # 69

ATP administrator recently added a new VLAN and needs to confirm that the BIG IP sees traffic on this VLAN. The VLAN is untagged on interface 1.1 and is named VLAN704 in the BIG IP Configuration Unity.

Which tool should be used to generate a packet capture that shows all traffic on this VLAN?

A.

netstat

B.

map

C.

tcpdump

D.

ifconsfig

Full Access
Question # 70

Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?

A.

grep

B.

ping

C.

dig

D.

find

Full Access
Question # 71

Which HTTP response code indicates an OK status?

A.

302

B.

404

C.

200

D.

100

Full Access
Question # 72

An administrator needs a data a format that is support authentication against an external security domain. The data format must format support SSO. Which data format should the administrator choose?

A.

AAA

B.

Kerberos

C.

SAML

D.

EAP

Full Access