Questions
Questions
(Choose two.)
an authentication protocol such as RADIUS
the message format XML
a database such as SQL
a transport protocol such as HTTP
file sharing using SMB
2. Which F5 product provides de-duplication, compression, and application optimizations?
GTM
APM
ASM
AAM
3. What is the most efficient certificate revocation method?
Server certificate attribute validation
Client certificate attribute validation
Online Certificate Status Protocol
Online Certificate Revocation List
4. An administrator needs to provide additional application layer security for SMTP and FTP
traffic.
Which F5 product provides this functionality?
LTM
GTM
AFM
ASM
5. What are two main benefits of the BIG-IP system redundancy? (Choose two.)
Devices can transfer some of its extra load to one or more devices with less load in the same
device group.
Devices can determine which device should become active based on STP changes in the
network.
Devices can mirror connections to a peer device to prevent interruption in service during
failover.
Devices can synchronize its configuration data for up to 64 BIG-IP devices on a network.
Devices can fail over to one of many available devices.
6. Which method does TCP use to ensure that the contents of a packet are unchanged when it
reaches the destination host?
The sender sends an ACK packet with the total received bytes of the previous packet, and the
receiver validates that the ACK contains the appropriate number of bytes.
The sender includes a calculated content-length TCP header, and the receiver ensures it receives
the correct amount of data.
The sender includes a calculated checksum in the TCP header, and the receiver recalculates the
checksum and validates the received value.
The sender sends an ACK packet in order to ensure that the packet was received correctly.
7. HTTP/1.0 requests are made to a server that supports only HTTP version 1.1.
Which header is required to avoid a “400 Bad Request” response code in this situation?
Accept-Encoding
Connection
Host
Location
8. What would cause a packet’s TCP checksum to be incorrect at the destination?
The packet has arrived at the correct destination, but out of sequence.
The packet was corrupted in transmission.
The packet has arrived at the correct destination, but was fragmented in transit.
The packet was temporarily lost in transmission.
9. Which type of failover is required for a group with more than two BIG-IP devices?
application failover
network failover
serial failover
VLAN failover
10. Which LDAP syntax is correct when asked to reference a specific User Object with an LDIF
formatted distinguished name?
CN=jdoe.OU=users.DC=company.DC=com
ldap://jdoe/users/company/com
ldap://Cn=jdoe/ou=users/dc=company/dc=com
CN=jdoe,OU=users,DC=company,DC=com
QUESTION 1
An administrator is deploying four identical servers to perform load balanced
DNS.
What is the correct configuration to accomplish this?
A. round robin load balancing with simple persistence
B. ratio load balancing with cookie persistence
C. ratio load balancing with simple persistence
D. round robin load balancing without persistence
D or A
QUESTION 2
When load balancers are used to manage application traffic, why are health
monitors important?
A. to signal servers to be ready for client traffic
B. to determine if traffic should be sent to a server
C. to keep connections from timing out
D. to avoid congestion on the network
B
QUESTION 3
What is the initial sequence number during the TCP 3-way handshake?
A. the Julian date minus 1
B. the source port of the client system
C. the destination port of the server system
D. a random number
QUESTION 4
An administrator is deploying an HTTP site that will be accessed by users who
reside behind a large internet proxy.
Which type of persistence should the administrator use?
A. destination address affinity
B. source address affinity
C. SSL session persistence
D. cookie persistence
QUESTION 5
What is the purpose of using persistence when load balancing?
A. to ensure that clients’ requests are not redirected to servers that are marked as
down
B. to ensure that client requests are directed to the same server during the life of
a session
C. to ensure that client requests are evenly distributed among the servers
D. to ensure that the servers run faster
QUESTION 6
A client initiates a TCP connection to the load balancer. The load balancer
opens a new TCP connection to the server.
What is this called?
A. passthrough connection
B. half proxy connection
C. asynchronous connection
D. full proxy connection
QUESTION 7
In which scenario is a packet forwarding architecture sufficient?
A. when the client connection and server connection should decoupled
B. when layer 4 load balancing is demanded
C. when SSL offloading is used
D. when content based load balancing is demanded
7B
QUESTION 8
If a pool member has been marked DOWN by a monitor, what will be the
result?
A. That pool member will receive the same level of traffic regardless of the state
B. That pool member will still receive traffic but will redirect it to other servers.
C. That pool member will only receive traffic for existing connections.
D. That pool member will not receive any more traffic until it comes up.
8D
QUESTION 9
In which scenario is a packet forwarding architecture sufficient?
A. when HTTP headers must be modified
B. when load balancing based on IP address is required
C. when cookie persistence is demanded
D. when SSL offloading is performed to reduce the Server load
9B
QUESTION 10
At a minimum, which two objects are required in order to achieve load
balancing? (Choose two.)
A. an HTIP profile
B. a health check
C. a persistence profile
D. an IP address
E. destination servers
10 D E
QUESTION 1
What is the correct result of the BIG-IP ConfigSync process?
A. If a file in a synchronized directory is deleted, the corresponding file on the
peer unit is deleted by the
ConfigSync process as well.
B. If changes have been made to the shared configuration on both units, all the
changes on each unit will be synchronized.
C. Any changes made to networking part of configuration will be synchronized
to the peer unit.
D. If changes have been made to the shared configuration on both units, any
changes that were made on the target unit will be lost.
1 D – https://support.f5.com/csp/article/K7024
QUESTION 2
An administrator needs to restrict the HTTP methods that a client can use to
interact with an application.
Which F5 feature provides this functionality?
A. Streaming profiles
B. HTTP profiles
C. iControl
D. iRules
2 B/D
QUESTION 3
A pair of load balancers is configured so that each device is processing traffic
and is ready to take over for the other if failover occurs.
Which type of configuration is this an example of?
A. standby-active
B. active-standby
C. active-active
D. standby-standby
3C
QUESTION 4
An administrator updates an HTTP application. The resource layout changes,
and the users’ bookmarks no longer work.
Which F5 feature can solve this problem quickly?
A. iApp
B. iControl
C. iRules
D. iSession
4C
QUESTION 5
What is an advantage of deploying applications using iApps?
A. It reduces the complexity of iRules.
B. It ensures more secure applications.
C. It provides a single configuration language to deploy an application.
D. It provides a significant reduction of time to deploy an application.
5D
QUESTION 6
An administrator has been asked to create a template to deploy an application
traffic management solution on many BIG-IP devices.
Which F5 technology should the administrator use?
A. iRules
B. iControl
C. iApps
D. iSessions
6C
QUESTION 7
What does the existence of an open network socket in listening state on the host
indicate?
A. It is the client.
B. It is the server.
C. It is a peer unit
D. It is an API socket.
7B
QUESTION 8
Which F5 feature provides custom Data Loss Prevention (DLP)?
A. TCP profile
B. SSL profile
C. iRules
D. iControl
8C
QUESTION 9
Which F5 technology allows an administrator to create application-centric
views of BIG-IP configuration objects?
A. iRules
B. iApps
C. iControl
D. iSessions
9B
QUESTION 10
In which scenario is a full proxy TCP connection required?
A. when access lists are enabled
B. when SYN cookie DOS protection is enabled
C. when caching is enabled
D. when connection mirroring is enabled
10 C
QUESTION 11
An administrator has a specific file that is requested frequently on the web
application. How can the administrator reduce traffic to the servers?
A. serve the file from RAM cache
B. enable file compression
C. use a longer packet TTL
D. use TCP optiization
11 A
QUESTION 12
In which scenario is a full proxy TCP connection required?
A. when enabling TCP routing on the external facing interface of the load
balancer
B. when configuring different maximum segment sizes on the client and server
sides of the load balancer
C. when changing the source IP address when crossing from the client to the
server side of the load balancer
D. when passing the client IP address to originating servers
12 C
QUESTION 13
In which security model is all traffic denied by default?
A. rule-based security model
B. positive security model
C. negative security model
D. role-based security model
13 C
QUESTION 14
Which security model can be deployed most rapidly to protect a web
application?
A. ACL security model
B. negative security model
C. open security model
D. positive security model
14 B
QUESTION 15
Which security policy protects from known attacks and defines resources that
should be accessible?
A. a security policy using both positive and negative security
B. a security policy using ACL security
C. a security policy using negative security only
D. a security policy using positive security only
15 A
QUESTION 16
What are two advantages of running a virtualized load balancer over running a
hardware load balancer? (Choose two.)
A. A virtual load balancer runs newer code than a hardware load balancer.
B. A virtual load balancer can be deployed remotely via software.
C. A virtual load balancer is faster.
D. A virtual load balancer is easier to configure.
E. A virtual load balancer is cheaper.
16 B/D
QUESTION 17
Which three factors should influence the decision to choose hardware or a
virtual appliance? (Choose three.)
A. multiprotocol support
B. power and cooling
C. management API
D. available rack space
E. performance
17 B/D/E
1 – A network 192.168.100 / 27 how many hosts and subnets is it possible to
have? -> 30 host and 8 subnets
2 – Network Protocol – (IPv4, ICMP, ARP, TCP and …) Respond – (IPv4 and
ICMP) In some literature use ARP as layer 3 others use as Layer 2.
3 – What kind of FTP server, where the server sends an ACK — (I think it’s
passive) Ref. http://slacksite.com/other/ftp.html
4 – Physical layer PDU —> bits
5 – Network layer PDU —> datagram
6 – Something about checking F5 box update … (Options – f5.com,
ihealth.f5.com, askf5.com, devcentral.f5.com)
7 – Host A sends some packets to the HostB, the packet arrives out of order.
What does hostB do?
8 – In a failover the user must re-authenticate in the application. Because? —>
Mirror is not enabled
QUESTION 1
If a pool member has been marked DOWN by a monitor, what will be the
result?
A. That pool member will receive the same level of traffic regardless of the state
B. That pool member will still receive traffic but will redirect it to other servers.
C. That pool member will only receive traffic for existing connections.
D. That pool member will not receive any more traffic until it comes up.
1.D
QUESTION 2
An administrator is deploying four identical servers to perform load balanced
DNS.
What is the correct configuration to accomplish this?
A. round robin load balancing with simple persistence
B. ratio load balancing with cookie persistence
C. ratio load balancing with simple persistence
D. round robin load balancing without persistence
2.A
QUESTION 3
A client initiates a TCP connection to the load balancer. The load balancer
opens a new TCP connection to the server.
What is this called?
A. passthrough connection
B. half proxy connection
C. asynchronous connection
D. full proxy connection
3.A
QUESTION 4
Which term describes the systems and processes used to associate users with
digital identities?
A.Certificate Authority
B.Hardware Security Module
C.Digital Rights Management
D.Public Key Infrastructure
4.A
QUESTION 5
Which security policy protects from known attacks and defines resources that
should be accessible?
A. a security policy using both positive and negative security
B. a security policy using ACL security
C. a security policy using negative security only
D. a security policy using positive security only
5.C
3. D. The load balancer builds a new connection with client and also server, it
functions as full-proxy mode.
5. A. To protects from known attacks, deny rules are needed, which is negative
security. And to define resources that should be accessible, is equivalent to
allow or permit certain resources, positive security is needed.
1) which can act as client and server – one more option I dont remember
FTP
downloading email
sMTP
APM
GTM
AFM
LTM
3) User A and User B are on the same vlan, and connected to layer 2 transparent
bridge
In ARP what MAC address will User B see ?
4) https://www.myserver.com DNS ?
A
AAAA
MX
NS
5) In which scenario full proxy is used? (2 questions) – I just rememberd below
options from 2 questions
compression is enabled
UDP sync
TCP routing
IV4 to IP6
UDP to ICMP
when it is strictly used for layer 4
when DNS load balancing is used
ssl termination
management capablities
failure isolation
HA capabilities
7) when an administrator is increasing the private key from 1023 to 2048 bits ,
what should he consider in this case?
positve
negative
context based
role based
10) what is the use of keep alive, load balancing, file caching(dont remember
the options)
VCMP enabled on VE
VCMP enabled on certian f5 devices
VCMP enabled on all f5 devices