101 Practice Test Questions

429 Questions


Which two statements describe differences between the active and standby systems? (Choose
two.)


A.

Monitors are performed only by the active system.


B.

Fail-over triggers only cause changes on the active system.


C.

Virtual server addresses are hosted only by the active system.


D.

Configuration changes can only be made on the active system.


E.

Floating self-IP addresses are hosted only by the active system.





C.
  

Virtual server addresses are hosted only by the active system.



E.
  

Floating self-IP addresses are hosted only by the active system.



Assuming other fail-over settings are at their default state, what would occur if the fail-over cable
were to be disconnected for five seconds and then reconnected?


A.

As long as network communication is not lost, no change will occur.


B.

Nothing. Fail-over due to loss of voltage will not occur if the voltage is lost for less than ten
seconds.


C.

When the cable is disconnected, both systems will become active. When the voltage is
restored, unit twowill revert to standby mode.


D.

When the cable is disconnected, both systems will become active. When the voltage is
restored, bothsystems will maintain active mode.





C.
  

When the cable is disconnected, both systems will become active. When the voltage is
restored, unit twowill revert to standby mode.



Given that VLAN fail-safe is enabled on the external VLAN and the network that the active BIGIP's
external VLAN is connected to has failed, which statement is always true about the results?


A.

The active system will note the failure in the HA table


B.

The active system will reboot and the standby system will go into active mode.


C.

The active system will fail-over and the standby system will go into active mode.


D.

The active system will restart the traffic management module to eliminate the possibility that
BIG-IP is thecause for the network failure.





A.
  

The active system will note the failure in the HA table



Assuming there are open connections through an active system's virtual servers and a fail-over
occurs, by default, what happens to the connections?


A.

All open connections are lost.


B.

All open connections are maintained.


C.

When persistence mirroring is enabled, open connections are maintained even if a fail-over
occurs.


D.

Long-lived connections such as Telnet and FTP are maintained, but short-lived connections
such as HTTPare lost.


E.

All open connections are lost, but new connections are initiated by the newly active BIG-IP,
resulting inminimal client downtime.





A.
  

All open connections are lost.



How is MAC masquerading configured?


A.

Specify the desired MAC address for each VLAN for which you want this feature enabled.


B.

Specify the desired MAC address for each self-IP address for which you want this feature
enabled.


C.

Specify the desired MAC address for each VLAN on the active system and synchronize the
systems.


D.

Specify the desired MAC address for each floating self-IP address for which you want this
feature enabled.





A.
  

Specify the desired MAC address for each VLAN for which you want this feature enabled.



Which action will take place when a failover trigger is detected by the active system?


A.

The active device will take the action specified for the failure.


B.

The standby device also detects the failure and assumes the active role.


C.

The active device will wait for all connections to terminate and then fail-over.


D.

The standby device will begin processing virtual servers that have failed, but the active device
will continueservicing the functional virtual servers.





A.
  

The active device will take the action specified for the failure.



Assuming that systems are synchronized, which action could take place if the fail-over cable is
connected correctly and working properly, but the systems cannot communicate over the network
due to external network problems?


A.

If network fail-over is enabled, the standby system will assume the active mode.


B.

Whether or not network fail-over is enabled, the standby system will stay in standby mode


C.

Whether or not network fail-over is enabled, the standby system will assume the active mode.


D.

If network fail-over is enabled, the standby system will go into active mode but only until the
networkrecovers.





B.
  

Whether or not network fail-over is enabled, the standby system will stay in standby mode



A virtual server is defined per the charts. The last five client connections were to members C, D, A,
B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52
opens a connection to the virtual server, which member will be used for the connection?


A.

172.16.20.1:80


B.

172.16.20.2:80


C.

172.16.20.3:80


D.

172.16.20.4:80


E.

172.16.20.5:80





D.
  

172.16.20.4:80



The following iRule is being used within a persistence profile on a virtual server.
Assuming the following HTTP requests are made within the same timeout window, what is the
maximum number of persistence records that will be created iRule:
rule Persist_Universal { when HTTP_REQUEST { persist uie [findstr [HTTP ::uri] "?" 8 3] }
Requests:
#1 http: I/www.test.com/input.html?testl 45ABR80
#2 http ://www.test.com/input .html?testl 35PDC72
#3 http://www.test. com/input.html?testl 25ABR76
#4 http ://www.test.com/input.html?testl 45MN088
#5 http ://www.test. com/input.html?testl 55ABR98
#6 http://www.test.com/input.html?testl 45PDC6O
#7 http ://www.test. com/input.html?testl 75ABC50
#8 http://www.test.com/input.html?testl 25MN055
#9 http://www.test. com/input.html?testl 45ABC70
#10 http://www.test.com/input.html?testl35 PDC42


A.

4


B.

3


C.

10


D.

It cannot be determined from the given data.


E.

5


F.

1


G.

0





A.
  

4



Why would an administrator capture monitor traffic between a BIG-IP and servers?


A.

Viewing monitor traffic could help the administrator to define a more robust monitor.


B.

If a client were having difficulty logging into a load-balanced SSH server, viewing and analyzing
theconnection process would determine the reason.


C.

Only client traffic may be captured; monitor traffic may not be captured.


D.

If client traffic to servers was failing, viewing and analyzing monitor traffic would determine the
reason.





A.
  

Viewing monitor traffic could help the administrator to define a more robust monitor.



Which statement is true concerning packet filters?


A.

In addition to administrator-created filters, three always exists a “deny all” filter that processes
traffic last


B.

Filters cannot prevent access to the management port.


C.

The order of filters does not affect which traffic is accepted or denied.


D.

Filters cannot prevent the BIG-IP synching process from taking place.





B.
  

Filters cannot prevent access to the management port.



Which action CANNOT be performed by an iRule?


A.

Direct a connection request to a specific pool


B.

Substitute a server’s response with alternate data


C.

Chang the virtual server’s default pool.


D.

Direct a client’s request to a pool based on the client’s browser’s language.


E.

Limit a given client to a set amount of bandwidth.


F.

Discard a client before connecting to a server.





C.
  

Chang the virtual server’s default pool.




Page 8 out of 36 Pages
Previous