What is the difference between primary and secondary DNS servers?
A.
Only primary servers can issue authoritative responses.
B.
Primary servers host the original copy of the zone database file.
C.
Primary servers resolve names more efficiently than secondary servers.
D.
Secondary servers act as back-ups and will respond only if the primary fails.
Primary servers host the original copy of the zone database file.
If the config tool is complete, which two access methods are available by default for GTM
administration and configuration? (Choose two.)
A.
network access via http
B.
network access via https
C.
network access via telnet
D.
direct access via serial port
network access via https
direct access via serial port
A GTM System performs a name resolution that is not a Wide-IP. The name is in a domain for
which the GTM System is authoritative. Where does the information come from?
A.
It comes from BIND database (zone) files on the GTM System.
B.
GTM System cannot resolve a host name that is not a Wide-IP.
C.
It comes from the database of previously cached name resolutions.
D.
It comes from a zone transfer initiated when the request was received
It comes from BIND database (zone) files on the GTM System.
A site wishes to delegate the name www.mysite.com to a GTM System. Which entry would be
appropriate in their current DNS servers?
A.
www.mysite.com. IN A 132.26.33.15
B.
15.33.addr-in.arpa.com IN PRT .wiw.mysite.com.
C.
www.mysite.com. IN CNAME wip.mysite.com.
D.
www.mysite.com. IN DELwww.GTM.mysite.com.
www.mysite.com. IN CNAME wip.mysite.com.
Which statement about root DNS servers is true?
A.
Root servers have databases of all registered DNS servers.
B.
Root servers have databases of the DNS servers for top-level domains.
C.
Root servers have databases of DNS servers for each geographical area. They directrequests
to appropriate LDNS servers.
D.
Root servers have databases of commonly accessed sites. They also cache entries
foradditional servers as requests are made.
Root servers have databases of the DNS servers for top-level domains.
What is the advantage of specifying three load balancing methods when load balancing within
pools?
A.
Specifying three methods allows the GTM System to use all three methodssimultaneously.
B.
Specifying three methods allows the GTM System to choose the optimal method for eachname
resolution.
C.
Specifying three methods allows the GTM System alternate methods if insufficient data
isavailable for other methods.
D.
Specifying three methods allows the GTM System to rotate between the three methods sothat
no one method is used too often.
Specifying three methods allows the GTM System alternate methods if insufficient data
isavailable for other methods.
Specifying three methods allows the GTM System to rotate between the three methods sothat
no one method is used too often.
A.
The IP address of the server must be added to the wideip.conf file.
B.
The IP address of the server must be added to the syslog-ng.conf file.
C.
The IP address of the server and valid userid/password combination must be added to
thehosts.allow file.
D.
The IP address of the server and valid userid/password combination must be added to the
syslog-ng.conf file.
The IP address of the server must be added to the syslog-ng.conf file.
What are two advantages of the Quality of Service (QoS) load balancing method? (Choose two.)
A.
It resolves requests to the site with the highest QoS value in the IP header.
B.
It combines multiple load balancing metric values in a single load balancing method.
C.
It allows the GTM administrator to place relative values on each metric used to determinethe
optimum site.
D.
It allows the GTM System to select the optimum virtual server based on all available pathand
server metrics.
It combines multiple load balancing metric values in a single load balancing method.
It allows the GTM administrator to place relative values on each metric used to determinethe
optimum site.
When is a Virtual Server hosted by an LTM System defined with two IP addresses?
A.
Two addresses are used to define the Virtual Server when it is managed by redundantLTM
Systems.
B.
Two addresses are used to define some Virtual Servers so that the GTM System canchoose
the better address when resolving the name.
C.
Two addresses are used to define Virtual Servers when the LTM System hosting it isbehind a
firewall that is translating the Virtual Server address.
D.
Two addresses are used to define a Virtual Server when the Wide-IP should resolve to
adifferent address depending on which LTM System is active.
Two addresses are used to define Virtual Servers when the LTM System hosting it isbehind a
firewall that is translating the Virtual Server address.
What is a characteristic of iQuery?
A.
It uses SSH.
B.
It uses SSL.
C.
It uses SCP.
D.
It uses HTTPS.
It uses SSL.
Listeners that correspond to non-floating self lP addresses are stored in which configuration file?
A.
/config/bigip.conf
B.
/config/bigip_base.conf
C.
/config/gtm/wideip.conf
D.
/config/bigip_local.conf
/config/bigip_local.conf
What is the primary benefit of associating Servers with Data Centers?
A.
The primary benefit is in assigning a single IP address to identify a Data Center.
B.
The primary benefit is in combining probing metrics. Load balancing decisions can bemade
more intelligently.
C.
The primary benefit is administrative. It is easier to remember to add servers when theyare
categorized by a physical location.
D.
The primary benefit is in load balancing. Clients will not be directed to Data Centers thatare
separated from them by great distances.
The primary benefit is in combining probing metrics. Load balancing decisions can bemade
more intelligently.
Page 12 out of 36 Pages |
Previous |