101 Practice Test Questions

429 Questions


Which persistence method will always recognize a client when the client returns to the same
virtual server?


A.

SSL


B.

MSRDP


C.

Expression [universal]


D.

No persistence method work in all situations.


E.

Source address





D.
  

No persistence method work in all situations.



Which are immediate results of entering the following command: b pool PoolA . { lb method
predictive member 10.10.1 .1:80 member 10.10.1.2:80 }


A.

Requests sent to this BIG-IP system with a destination port of 80 are load-balanced between
the membersof PoolA.


B.

No changes will take place since the command is missing the monitor component for PoolA.


C.

The /config/bigip.cinf file is updated to include a definition for the pool named PoolA.


D.

A new pool is available for association with any iRule or virtual server.





D.
  

A new pool is available for association with any iRule or virtual server.



Given the configuration shown below, if a connection request arrived on the BIG-IP with a source
address of 200.10.10.10:1050 and a destination of 150.10.10.75:80, what would the source IP
address of the associated packet be when it arrived on the choosen member of the web_pool self
150.10.10.1 { netmask 255.255.255.0 unit I floating enable vlan external allow tcp https }
self10.10.1.1 { netmask 255.255.255.0 unit I floating enable vlan internal allow default } pool
web_pool { member 10.10.1.11:80 member 10.10.1.12:80 member 10.10.1.13:80 }snatpool
client_pool { member 10.10.1.100 member 150.10.10.15 }virtual VS_web { destination
150.10.10.10:80 ip protocol tcp snat automap pool web_pool } virtual VS_network{ destination
150.10.1 0.0:any mask 255.255.255.0 snatpool client_pool ip protocol tcp pool web_pool } virtual
VS_network { destination 150.10.1 0.0:any mask 255.255.255.0 snatpool client_pool ip protocol
tcp pool web_pool } virtual VS_network { destination 150.10.10.0:any mask 255.255.255.0
snatpool client_pool ip protocol tcp pool web_pool }


A.

10.10.1.IA.10.10.1.1


B.

200.10.10.I0D.200.10.10.10


C.

10.10.1.I00B.10.10.1.100


D.

150.10.10.15C.150.10.10.15





C.
  

10.10.1.I00B.10.10.1.100



What occurs when a load config command is issued?


A.

The running configuration is replaced by the any portion of the configuration files that
aresyntactically correct.


B.

The running configuration is loaded into files for storage


C.

The running configuration is compared to the configuration in files and, when changes
arenoted, the version in the files is loaded over what is in money.


D.

The running configuration is replaced by the configuration in the files, but only if they
aresyntactically correct.





D.
  

The running configuration is replaced by the configuration in the files, but only if they
aresyntactically correct.



Which three files/data items are included in a BIG-IP UCS backup file? (Choose three.)


A.

The BIG-IP administrative addresses.


B.

The BIG-IP license.


C.

The BIG-IP log files.


D.

The BIG-IP default traps.


E.

The BIG-IP host name.





A.
  

The BIG-IP administrative addresses.



B.
  

The BIG-IP license.



E.
  

The BIG-IP host name.



Could an iRule perform persistence based on a cookie?


A.

Yes An iRule could be designed to persist based on the contents of a cookie.


B.

No. iRules cannot affect persistence.


C.

Yes. An iRule could be desiged to persist based on the contents of a cookie.


D.

No. Cookie persistence is only is based on a cookie persistence profile.





C.
  

Yes. An iRule could be desiged to persist based on the contents of a cookie.



How is traffic flow through transparent virtual servers different from typical virtual servers?


A.

Traffic flow through transparent virtual servers must be forwarded through a single
routingdevice.


B.

Traffic flow through transparent virtual servers does not have IP address translationperformed.


C.

Traffic flow through transparent virtual severs is not load balabced.


D.

Traffic flow through transparent virtual servers is bridged ( leave IP and lMAC.addressesintact)
rather than routed (leave IP address intact but change the MAC.addresses).





B.
  

Traffic flow through transparent virtual servers does not have IP address translationperformed.



Adivinar (?)


A.

Any text string within a cookie.


B.

Any bytes within the initial client request packet.


C.

An IP address.


D.

The value in the tcp acknowledgement field.





A.
  

Any text string within a cookie.



C.
  

An IP address.



A monitor has been defined with an alias port of 443. All other options are left at their defaults. The
administrator wishes to assign it to a pool of members where the members' ports vary.
Which is the result?


A.

For each member, if the member port is not 443, the member will be marked down.


B.

For each member, the monitor will test member node at port 443.


C.

For each member, if it is running an SSL service at the member port, the monitor
maywork.Otherwise, the monitor willfail and the member will be marked down.


D.

This assignment is not allowed since the port do not match.





B.
  

For each member, the monitor will test member node at port 443.



Which two processes are involved when BIG-IP systems issue traps? (Choose two.)


A.

bigd


B.

alertd


C.

smtpd


D.

sysloging





B.
  

alertd



D.
  

sysloging



A monitor has been defined using the HTTP monitor template. The send and receive strings were
customized, but all other settings were left at their defaults. Which resources can the monitor be
assigned to?


A.

Only specific pool members.


B.

Most virtual severs.


C.

Most nodes.


D.

Most pools





D.
  

Most pools



After editing and saving changes to the configuration file containing virtual servers, what is the
immediate result?


A.

The new configuration is verified and loaded.


B.

The new configuration is verified not loaded.


C.

The new configuration is verified.


D.

The new configuration is loaded but not verified.


E.

The new configuration is neither verified nor loaded.


F.

The new configuration is verified and loaded if is it syntactically correct.





E.
  

The new configuration is neither verified nor loaded.




Page 9 out of 36 Pages
Previous