Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

201 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

201 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: TMOS Administration
  • Last Update: May 4, 2024
  • Questions and Answers: 254
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

201 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

201 Practice Exam Questions with Answers TMOS Administration Certification

Question # 6

Refer to the exhibit.

201 question answer

A user attempts to connect to 10.10.10.1.80 using FTP over SSL with an FTPS client. Which virtual server will match and attempt to process the request?

A.

vsjutps

B.

vs_ftp

C.

vs_http

D.

nvfs

Full Access
Question # 7

You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2?

A.

All changes to TEST1 are propagated to TEST2.

B.

Some of the changes to TEST1 may propagate to TEST2.

C.

Changes to TEST1 cannot affect TEST2 once TEST2 is saved.

D.

When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes to TEST2.

Full Access
Question # 8

A BIG-IP Administrator sees the following error message in /var/log/ltm diskmonitor: *******; Disk partition shared has less than 30$ free

Which section of the Configuration Utility should the BIG-IP Administrator access to investigate this

error message?

A.

Statistics > Analytics

B.

System > File Management

C.

Statistics > Module Statistics > System

D.

System > Disk Management

Full Access
Question # 9

If a client's browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence?

A.

The connection request is not processed.

B.

The connection request is sent to a pology server.

C.

The connection request is loadbalanced to an available pool member.

D.

The connection request is refused and the client is sent a "server not available" message.

Full Access
Question # 10

Which three iRule events are likely to be seen in iRules designed to select a pool for load balancing? (Choose three.)

A.

CLIENT_DATA

B.

SERVER_DATA

C.

HTTP_REQUEST

D.

HTTP_RESPONSE

E.

CLIENT_ACCEPTED

F.

SERVER_SELECTED

G.

SERVER_CONNECTED

Full Access
Question # 11

Which two statements are true about NATs? (Choose two.)

A.

NATs support UDP, TCP, and ICMP traffic.

B.

NATs can be configured with mirroring enabled or disabled.

C.

NATs provide a one-to-one mapping between IP addresses.

D.

NATs provide a many-to-one mapping between IP addresses.

Full Access
Question # 12

Given that VLAN failsafe is enabled on the external VLAN and the network that the active BIG-IP's external VLAN is connected to has failed, which statement is always true about the results?

A.

The active system will note the failure in the HA table.

B.

The active system will reboot and the standby system will go into active mode.

C.

The active system will failover and the standby system will go into active mode.

D.

The active system will restart the traffic management module to eliminate the possibility that BIG-IP is the

cause for the network failure.

Full Access
Question # 13

A BIG-IP Administrator is conducting maintenance on one BIG-IP appliance in an HA Pair. Why should the BIG-IP Administrator put the appliance into FORCED_OFFLINE state?

A.

To preserve existing connections to Virtual Servers and reduce the CPU load

B.

To allow new connections to Virtual Servers and ensure the appliance becomes active

C.

To terminate connections to the management IP and decrease persistent connections

D.

To terminate existing connections to Virtual Servers and prevent the appliance from becoming active

Full Access
Question # 14

A BIG-IP Administrator needs to check the memory utilization on a BIG-IP system. Which two methods can the UIG IP Administrator use? (Choose two.)

A.

Run the tmsh show/sys memory command

B.

Run the tmsh show/sys traffic command

C.

Go to Statistics > Module Statistics > Traffic Summary in the configuration utility

D.

Go to Statistics > Module Statistics > Memory in the configuration utility

E.

Go to System > Disk Management in the configuration utility

Full Access
Question # 15

Refer to the exhibit.

201 question answer

A BIG-IP Administrator needs to configure health monitors for a newly configured server pool named

Pool_B.

Which health monitor settings will ensure that all pool members will be accurately marked as available

or unavailable?

A.

HTTPS, HTTP, FTP, and ICMP, with the Availability Requirement of all health monitors

B.

HTTPS, HTTP, FTP, and SSH, with the Availability Requirement of at least one monitor

C.

HTTPS and HTTP with the Availability Requirement of at least one health monitor

D.

HTTPS, HTTP, FTP, and SSH with the Availability Requirement of all health monitors

Full Access
Question # 16

A virtual server is defined using a source address based persistence profile. The last five connections were A, B, C, A, C . Given the conditions shown in the graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?

201 question answer

A.

10.10.20.1:80

B.

10.10.20.2:80

C.

10.10.20.3:80

D.

10.10.20.4:80

E.

10.10.20.5:80

Full Access
Question # 17

Active connections to pool members are unevenly distributed. The load balancing method is Least Connections (member) Priority Group Activation is disabled. What is a potential cause of the event distribution?

A.

Priority Group Activation is disabled

B.

SSL Profile Server is applied

C.

Persistence profile is applied

D.

incorrect load balancing method

Full Access
Question # 18

A BIG-IP Administrator opens a case with F5 Support. The support engineer requests the BIG-IP

appliance chassis serial number.

Which TMSH command will provide this information?

A.

. list /sys software

B.

show /sys version

C.

list/sys diags

D.

show /sys hardware

Full Access
Question # 19

Administrative user accounts have been defined on the remote LDAP server and are unable to log in to

the BIG-IP device.

Which log file should the BIG-IP Administrator check to find the related messages?

A.

/var/log/secure

B.

/var/log/messages

C.

/Nar/log/ltm

D.

/var/log/user.log

Full Access
Question # 20

The incoming client IP address is 205.12.45.52. The last five connections have been sent to members C, D, A, B, B. Given the virtual server and pool definitions and the statistics shown in the graphic, which member will be used for the next connection?

201 question answer

A.

10.10.20.1:80

B.

10.10.20.2:80

C.

10.10.20.3:80

D.

10.10.20.4:80

E.

10.10.20.5:80

Full Access
Question # 21

Refer to the exhibit.

201 question answer

The BIG-IP Administrator is investigating disk utilization on the BIG-IP device.

What should the BIG-IP Administrator check next?

A.

Large files on the / file system

B.

Results from the EUD test

C.

Results from the platform diagnostics test

D.

Large files on /usr file system

Full Access
Question # 22

Refer to the exhibit.

201 question answer

How are new connections load balanced?

A.

To the first two members listed with the same priority group

B.

To the pool member with the least number of connections

C.

To the pool member with a high priority group value defined

D.

To the pool member with a low priority group value defined

Full Access
Question # 23

A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?

A.

A SNAT for all addresses could be defined, and then disable the SNAT processing for select VLANs.

B.

Some virtual servers could be associated with SNAT pools and others not associated with SNAT pools.

C.

The decision to perform source address translation is always based on VLAN. Thus, the goal cannot be achieved.

D.

The decision to perform source address translation is always based on a client's address (or network). Thus, this goal cannot be achieved.

Full Access
Question # 24

Assume a virtual server is configured with a ClientSSL profile. What would the result be if the virtual server's destination port were not 443?

A.

SSL termination could not be performed if the virtual server's port was not port 443.

B.

Virtual servers with a ClientSSL profile are always configured with a destination port of 443.

C.

As long as client traffic was directed to the alternate port, the virtual server would work as intended.

D.

Since the virtual server is associated with a ClientSSL profile, it will always process traffic sent to port 443.

Full Access
Question # 25

Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?

A.

host names

B.

system clocks

C.

profile definitions

D.

VLAN failsafe settings

E.

MAC masquerade addresses

Full Access
Question # 26

Refer to the exhibit

The network team creates a new VLAN on the switches. The BIG-IP Administrator needs to create a

configuration on the BIG-IP device. The BIG-IP Administrator creates a new VLAN and Self IP, but the

servers on the new VLAN are NOT reachable from the BIG-IP device.

Which action should the BIG-IP Administrators to resolve this issue?

A.

Set Port Lockdown of Set IP to Allow All

B.

Change Auto Last Hop to enabled

C.

Assign a physical interface to the new VLAN

D.

Create a Floating Set IP Address

Full Access
Question # 27

Which statement is true concerning SNATs using automap?

A.

Only specified self-IP addresses are used as automap addresses.

B.

SNATs using automap will translate all client addresses to an automap address.

C.

A SNAT using automap will preferentially use a floating self-IP over a nonfloating self-IP.

D.

A SNAT using automap can be used to translate the source address of all outgoing traffic to the same address regardless of which VLAN the traffic is sent through.

Full Access
Question # 28

What should the 816-IP Administrator provide when opening a new ticket with F5 Support?

A.

bigip.license file

B.

QKViewfile

C.

Device root password

D.

SSL private keys

Full Access
Question # 29

Refer to the exhibit.

201 question answer

An organization is reporting slow performance accessing their Intranet website, hosted in a public cloud. All employees use a single Proxy Server with the public IP of 104.219.110.168 to connect to the Internet. What should the BIG-IP Administrator of the Intranet website do to fix this issue?

A.

Change Source Address to 104.219.110.168/32

B.

Change Load Balancing Method to Least Connection

C.

Change Fallback Persistence Profile to source_addr

D.

Change Default Persistence Profile to cookie

Full Access
Question # 30

A BIG-IP device has only LTM and ASM modules provisioned. Both have nominal provisioning level. The BI6-IP Administrator wants to dedicate more resources to the LTM module. The ASM module must remain enabled. Which tmsh command should the BIG-IP Administrator execute to obtain the desired result?

A.

modify/sys provision asm level minimum

B.

modify /sys provision Itm level dedicated

C.

modify /sys provision asm level none

D.

modify /sys provision Itm level minimum

Full Access
Question # 31

When upgrading a BIG-IP redundant pair, what happens when one system has been updated but the other has not?

A.

Synching should not be performed.

B.

The first system to be updated will assume the Active role.

C.

This is not possible since both systems are updated simultaneously.

D.

The older system will issue SNMP traps indicating a communication error with the partner.

Full Access
Question # 32

Refer to the exhibit. The BIG-IP Administrator needs to avoid overloading any of the Pool Members with

connections, when they become active.

What should the BIG-IP Administrator configure to meet this requirement?

A.

Different Ratio for each member

B.

Same Priority Group to each member

C.

Action On Service Down to Reselect

D.

Slow Ramp Time to the Pool

Full Access
Question # 33

A BIG-IP Administrator remotely connects to the appliance via out-of-band management using https://mybigip mycompany net. The management portal has been working all week. When the administrator attempts to login today, the connection times out. Which two aspects should the administrator verify? (Choose two)

A.

DNS is property resolving the FQDN of the device.

B.

The device is NOT redirecting them to http.

C.

The administrator has the latest version of the web browser.

D.

Packet Filters on the device are blocking port 80.

E.

The administrator has TCP connectivity to the device.

Full Access
Question # 34

A BIG-IP Administrator makes a configuration change to the BIG-IP device. Which file logs the message regarding the configuration change?

A.

/var/log/messages

B.

/var/log/audit

C.

/var/log/user.log

D.

/var/log/secure

Full Access
Question # 35

A Standard Virtual Server configured for an application reports poor network performance. This

application is accessed mainly from computers on the Internet.

What should the BIG-IP Administrator configure on the Virtual Server to achieve better network

performance?

A.

Protocol Profile (Client) with f5-tcp-wan and Protocol Profile (Server) with f5-tcp-lan

B.

Protocol Profile (Client) with f5-tcp-lan

C.

Protocol Profile (Client) with fS-tcp-lan and Protocol Profile (Server) with f5-tcp-wan

D.

Protocol Profile (Client) with f5-tcp-optimized

Full Access
Question # 36

Which two can be a part of a virtual server's definition? (Choose two.)

A.

rule(s)

B.

pool(s)

C.

monitor(s)

D.

node address(es)

E.

loadbalancing method(s)

Full Access
Question # 37

Assume the bigd daemon fails on the active system. Which three are possible results? (Choose three.)

A.

The active system will restart the bigd daemon and continue in active mode.

B.

The active system will restart the tmm daemon and continue in active mode.

C.

The active system will reboot and the standby system will go into active mode.

D.

The active system will failover and the standby system will go into active mode.

E.

The active system will continue in active mode but gather member and node state information from the standby system.

Full Access
Question # 38

Assuming other failover settings are at their default state, what would occur if the failover cable were to be disconnected for five seconds and then reconnected?

A.

As long as network communication is not lost, no change will occur.

B.

Nothing. Failover due to loss of voltage will not occur if the voltage is lost for less than ten seconds.

C.

When the cable is disconnected, both systems will become active. When the voltage is restored, unit two will revert to standby mode.

D.

When the cable is disconnected, both systems will become active. When the voltage is restored, both systems will maintain active mode.

Full Access