101 : Application Delivery Fundamentals : Part 03

  1. FastCache will NOT work with compressed objects.

    • True
    • False
  2. Which of the following can be accomplished using iRules?

    • Track inbound and outbound traffic
    • Perform deep packet inspection
    • Inspect traffic and drop it
    • All of the above
    • Intercept traffic and redirect it
  3. GTM uses Auto Discovery to add virtual servers from both LTM and non-BIG-IP load balancers.

    • True
    • False
  4. Which four of the following statements about LDNS probes are true? (Choose four.)

    • Only GTM devices can act as a prober.
    • They check each requesting LDNS that has made a request of the GTM.
    • They can determine available cache size on the client.
    • They are used to develop path metrics.
    • They verify the link between a data center and an LDNS.
    • Probing only takes place if GTM is configured to use dynamic load balancing.
  5. Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.

    • True
    • False
  6. Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:

    • True
    • False
  7. An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?

    • They want GTM to examine all DNS queries.
    • They want GTM to make load balancing decisions based on metrics.
    • They have data centers in several countries.
    • They are using several operating systems for the local DNS servers.
  8. The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.

    What security benefit does this provide to customers?

    • Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
    • provides enhanced support for DNS servers.
    • Establishes highly detailed policies based on your customer’s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
    • Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process
  9. Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.

    • F5 can ensure a DNS DDoS attack is not successful.
    • F5 has high performance DNS services.
    • F5 can answer the DNS queries directly.
    • With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
    • F5 can ensure a customer never faces a DNS DDoS attack.
  10. Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)

    • Secure the connection between WAN sites.
    • Improve application availability and scalability.
    • Authenticate and authorize users.
    • Boost application performance.
    • Include application security. 
    • Act as a Web application firewall
  11. If a customer has an application that uses a customized protocol, what LTM feature can help optimize the traffic from the application?

    • iRules
    • Network virtual servers
    • HTTP classes
    • Packet filtering
    • Transparent virtual servers
  12. An LTM object represents a downstream server that hosts a secure Web site and contains the IP address and port combination 192.168.9.250:443. What is this object?

    • Self IP
    • Virtual Server
    • Pool
    • Node
    • Pool Member
  13. Adding more RAM to a GTM device drastically improves query performance.

    • True
    • False
  14. Which of the following are four of the security benefits of TMOS? (Choose four.)

    • It verifies traffic based on antivirus signatures.
    • It provides protection against DDoS.
    • It uses SYN cookies and dynamic connection reapers.
    • It supplies guidance for poorly developed applications.
    • It denies all traffic that hasn’t been defined.
    • It can hide confidential information from outbound traffic.
  15. The LTM “Manager” authentication role can create iRules.

    • True
    • False
  16. Which of the following statements about cookie persistence is NOT true?

    • The cookie’s timeout value can be customized.
    • They are F5’spreferred persistence method.
    • No persistence information is placed on LTM.
    • Web servers must be configured to send cookies to clients.
    • They do not add a performance impact on LTM.
  17. An LTM object that represents a downstream server contains the IP address 192.168.9.250 and no port. What is this object?

    • Pool member
    • Virtual server
    • Pool
    • Self IP
    • Node
  18. Which three of the metrics listed below can GTM use when making load balancing decisions for a client? (Choose three.)

    • TCP payload
    • IP geolocation
    • Hop count
    • Round trip time
    • Browser user agent
  19. In order to improve GTM performance, administrators should use multiple complex monitors to ensure resources are functioning properly:

    • True
    • False
  20. Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)

    • VLANs
    • Load-balancing pools
    • Secure remote access
    • TMOS
    • OneConnect
    • iRules
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments