101 : Application Delivery Fundamentals : Part 02
-
Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin.
- True
- False
-
Which three of these software modules can you layer on top of LTM on a BIG-IP device? (Choose three.)
- Web Accelerator
- APM
- ARX
- GTM
- Firepass
- Enterprise Manager
Explanation:
These software modules can you layer on top of LTM on a BIG-IP device are AAM, APM and GTM.
-
Customers can purchase LTM as a stand-alone product, or layer it with additional software modules to increase the functionality of the BIG-IP device.
- True
- False
-
Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?
- Floating IPs
- Fallback host
- Auto last hop
- SNAT automap
- Pool offload
- Priority group activation
Explanation:
http://support.f5.com/kb/en-us/products/bigip_ltm/manuals/product/ltm_configuration_guide_10_0_0/ltm_pools.html
-
The least connections load balancing method functions best when all pool members share similar characteristics.
- True
- False
-
FILL BLANK
The layer 3 security feature _______ Cookies that protects against SYN floods, DoS, and DDoS attacks. (Fill in)
- contain
- include
-
A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an example of a sub-zone?
- www.F5.com/sub
- www.F5.com
- www.gslb.F5.com
- .com
- f5.com
-
FILL BLANK
A _______ object maps a FQDN to virtual servers. (Fill in)
- Wide IP
-
Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)
- Connect the GTM and LTM with a network crossover cable.
- Synchronize the big3d versions between GTM and LTM.
- Add the LTM object to the GTM configuration.
- Configure the GTM and LTM to we MAC masquerading.
- Ensure that GTM and LTM use the same floating IP address.
- Exchange SSL certificates between the two devices.
Explanation:
Integrating LTM systems with GTM systems on a network
Running the bigip_add utility
Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM.
Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other.
When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems.
http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm-implementations11-3-0/7.html
Note:
The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port. -
DNSSEC is a GTM add-on licensing feature.
- True
- False
-
FILL BLANK
GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM devices. (Fill in)
-
iQuery
-
-
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers? (Choose four.)
- ping
- Application monitors
- Inband monitors
- SSH
- iQuery
- SNMP
Explanation:
http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm-concepts-11-30/1.html
Configuring
GTM to determine packet gateway health and availability
http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm-implementations11-5-0/9.html
sol13690:
Troubleshooting BIG-IP GTM synchronization and iQuery connections (11.x)
http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13690.html -
What happens when the data center that GTM recommends for a client is unavailable?
- GTM uses cached information to determine an alternate route.
- GTM queries the local DNS server.
- GTM sends subsequent queries to the next preferred data center.
- GTM directs the client to use its DNS cache to select an alternate location.
- The client continues to attempt to access the preferred data center.
-
GTM can load balance to LTM in addition to non-BIG-IP hosts.
- True
- False
-
Which of the following is NOT included on the F5 DevCentral site?
- Subscription purchasing options
- Actual iRules written by other customers
- iRules reference materials
- Forums
- The F5 iRule editor
Explanation:
Subscription purchasing options is in Partner Resource Center
-
If LTM uses the least connections load balancing method, which pool member in the following diagram receives the next request?
- A
- B
- C
- D
-
Why does deploying LTM into an existing network immediately improve security?
- Only requests for specific ports are allowed through LTM.
- All traffic through LTM is checked for DDoS attacks.
- No traffic A allowed through LTM until it has been specified.
- All users must authenticate before accessing applications through LTM.
- Only LAN administrators can access resources through LTM.
-
You can use an HTTP class profile to forward traffic that matches which three of these types of criteria? (Choose three.)
- Port
- HTTP header
- URI path
- User name
- Protocol
- Host name
-
When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?
- HTTP caching
- OneConnect
- TCP connection queuing
- Content spooling
- Priority activation
-
As a full TCP proxy, LTM acts as the termination point for both requests from the client and responses from the server.
- True
- False