101 : Application Delivery Fundamentals : Part 03
-
FastCache will NOT work with compressed objects.
- True
- False
-
Which of the following can be accomplished using iRules?
- Track inbound and outbound traffic
- Perform deep packet inspection
- Inspect traffic and drop it
- All of the above
- Intercept traffic and redirect it
-
GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.
- True
- False
-
Which four of the following statements about LDNS probes are true? (Choose four.)
- Only GTM devices can act as a prober.
- They check each requesting LDNS that has made a request of the GTM.
- They can determine available cache size on the client.
- They are used to develop path metrics.
- They verify the link between a data center and an LDNS.
- Probing only takes place if GTM is configured to use dynamic load balancing.
-
Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.
- True
- False
-
Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:
- True
- False
-
An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?
- They want GTM to examine all DNS queries.
- They want GTM to make load balancing decisions based on metrics.
- They have data centers in several countries.
- They are using several operating systems for the local DNS servers.
-
The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.
What security benefit does this provide to customers?
- Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
- provides enhanced support for DNS servers.
- Establishes highly detailed policies based on your customer’s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
- Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
-
Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.
- F5 can ensure a DNS DDoS attack is not successful.
- F5 has high performance DNS services.
- F5 can answer the DNS queries directly.
- With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
- F5 can ensure a customer never faces a DNS DDoS attack.
-
Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)
- Secure the connection between WAN sites.
- Improve application availability and scalability.
- Authenticate and authorize users.
- Boost application performance.
- Include application security.
- Act as a Web application firewall
-
If a customer has an application that uses a customized protocol, what LTM feature can help optimize the traffic from the application?
- iRules
- Network virtual servers
- HTTP classes
- Packet filtering
- Transparent virtual servers
-
An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?
- Self IP
- Virtual Server
- Pool
- Node
- Pool Member
-
Adding more RAM to a GTM device drastically improves query performance.
- True
- False
-
Which of the following are four of the security benefits of TMOS? (Choose four.)
- It verifies traffic based on antivirus signatures.
- It provides protection against DDoS.
- It uses SYN cookies and dynamic connection reapers.
- It supplies guidance for poorly developed applications.
- It denies all traffic that hasn’t been defined.
- It can hide confidential information from outbound traffic.
-
The LTM “Manager” authentication role can create iRules.
- True
- False
-
Which of the following statements about cookie persistence is NOT true?
- The cookie’s timeout value can be customized.
- They are F5’spreferred persistence method.
- No persistence information is placed on LTM.
- Web servers must be configured to send cookies to clients.
- They do not add a performance impact on LTM.
-
An LTM object that represents a downstream server contains the IP address 192.168.9.250 and no port. What is this object?
- Pool member
- Virtual server
- Pool
- Self IP
- Node
-
Which three of the metrics listed below can GTM use when making load balancing decisions for a client? (Choose three.)
- TCP payload
- IP geolocation
- Hop count
- Round trip time
- Browser user agent
-
In order to improve GTM performance, administrators should use multiple complex monitors to ensure resources are functioning properly:
- True
- False
-
Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)
- VLANs
- Load-balancing pools
- Secure remote access
- TMOS
- OneConnect
- iRules
Subscribe
0 Comments
Newest