This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 19:36:46 2024 / +0000 GMT ___________________________________________________ Title: 101 Exam Dumps, 101 Practice Test Questions [Q86-Q109] --------------------------------------------------- 101 Exam Dumps, 101 Practice Test Questions PDF (New 2023) Actual F5 101 Exam Questions NEW QUESTION 86Which four of these benefits does APM provide? (Choose four.)  Enables remote access by several thousand simultaneous users.  Basic Web application firewall capabilities.  User authentication based on identity.  Acceleration of Web content to the client.  Granular authorization to resources.  Client workstation security checking. Explanation/Reference:Explanation:NEW QUESTION 87There are many user roles configurable on the BIG-IP ASM System. Which of the following user roles have access to make changes to ASM policies? (Choose 3)  Guest  Operator  Administrator  Web Application Security Editor  Web Application Security Administrator NEW QUESTION 88Which two of the following LTM load balancing methods require the least amount of resources?  Round robin  Ratio  Observed  Fastest  Predictive  Least connections NEW QUESTION 89The least connections load balancing method functions best when all pool members share similar characteristics.  True  False Explanation/Reference:NEW QUESTION 90A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an example of asub-zone?  www.F5.com/sub  www.F5.com  www.gslb.F5.com  .com  f5.com NEW QUESTION 91AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH command to create this new VLAN on the BIG-IP?  Create/net wan internal interfaces add {1 1 (tagged }} tag 706  Create/net vlan internal trunk add (11 {tagged)}  add /net vlan internal interfaces add (11) tag 705  add / net vlan internal tunk add {1 1 (tagged)) tag 705 NEW QUESTION 92Assuming other fail-over settings are at their default state, what would occur if the fail-over cable were to be disconnected for five seconds and then reconnected.  As long as network communication is not lost, no change will occur.  Nothing. Fail-over due to loss of voltage will not occur if the voltage is lost for less than ten seconds.  When the cable is disconnected, both systems will become active. When the voltage is restored, unit two will revert to standby mode.  When the cable is disconnected, both systems will become active. When the voltage is restored, both systems will maintain active mode. NEW QUESTION 93Which of the following is a benefit of using iRules?  They provide a secure connection between a client and LTM  They enable granular control of traffic  They can be used as templates for creating new applications  They can use Active Directory to authenticate and authorize users  They provide an automated way to create LTM objects NEW QUESTION 94An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?  The HTTP service only listens on localhost  The users IP needs to be allowed to access  The server needs to be restarted  The HTTPS service Is not running NEW QUESTION 95The BIG-IP ASM System is configured with a virtual server that contains an HTTP class profile and the protected pool members are associated within the HTTP class profile pool definition. The status of this virtual server is unknown (Blue). Which of the following conditions will make this virtual server become available (Green)?  Assign a successful monitor to the virtual server  Assign a successful monitor to the members of the HTTP class profile pool  Associate a fallback host to the virtual server and assign a successful monitor to the fallback host  Associate a default pool to the virtual server and assign a successful monitor to the pool members NEW QUESTION 96Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.  F5 can ensure a DNS DDoS attack is not successful.  F5 has high performance DNS services.  F5 can answer the DNS queries directly.  With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.  F5 can ensure a customer never faces a DNS DDoS attack. Explanation/Reference:Explanation:NEW QUESTION 97In the next few years, 75% of new storage capacity will shift to unstructured data (also known as file data).Which two of the following are examples of unstructured data? (Choose two.)  CAD drawings  Location data in a GIS (geographic information system)  Customer records and product records in a CRM (customer relationship management) database  Microsoft Office and PDF documents Explanation/Reference:NEW QUESTION 98Network Security personnel are entirely responsible for web application security.  True  False NEW QUESTION 99When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?  HTTP caching  OneConnect  TCP connection queuing  Content spooling  Priority activation Explanation/Reference:Explanation:NEW QUESTION 100When using a single BIG-IP with APM, an organization can support up to 60,000 concurrent remote access users.  True  False Explanation/Reference:NEW QUESTION 101Which is NOT an ASM protection method for cross site scripting?  Signatures  URl character set limiting  Token injection  Parameter character set limiting NEW QUESTION 102Which statement is true concerning cookie persistence.  Cookie persistence allows persistence independent of IP addresses.  Cookie persistence allows persistence even if the data are encrypted from client to pool member.  Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.  If a client’s browser accepts cookies, cookie persistence will always cause a cookie to be written to the client’s file system. NEW QUESTION 103Select the question you would ask your customer related to DNS attacks. Based on the material, choose the most appropriate question.  How do you secure you DNS infrastructure against attacks?  Do you rely on your network firewall to protect you DNS server?  Do you over-provision your DNS infrastructure?  Do you regularly update BIND or some other DNS application to the latest release? Explanation/Reference:Explanation:NEW QUESTION 104Why does deploying LTM into an existing network immediately improve security?  Only requests for specific ports are allowed through LTM  All traffic through LTM is checked for DDoS attacks  No traffic A allowed through LTM until it has been specified  All users must authenticate before accessing applications through LTM  Only LAN administrators can access resources through LTM NEW QUESTION 105A client is transmitting a large amount of data to a server During this process, the server sets the window size to zero What is the likely cause of this issue?  The server is unable to accept more data  The server resets the connection  The client runs out of network buffers  The server reaches its maximum segment sizehtlps://wiki wireshark orgn/TCP%20ZeroWindow NEW QUESTION 106Which of the following does NOT describe network performance management?  Updating software on various devices  Seeing graphs in near real-time  Visibility into multiple network devices  Being alerted to an issue as it happens  Viewing virtual server statistics NEW QUESTION 107The current status of a given pool is ffline.(red). Which condition could explain that state. Assume the descriptions below include all monitorsThe current status of a given pool is .ffline.(red). Which condition could explain that state. Assume the descriptions below include all monitors assigned for each scenario.  No monitors are currently assigned to any pool, member or node.  The pool has a monitor assigned to it, and none of the pool members passed the test. The pool has a monitor assigned to it, and none of the pool. members passed the test.  The pool has a monitor assigned to it, and only some of the pool’s members passed the test.  A monitor is assigned to all nodes and all nodes have passed the test. The pool’s members have no specific monitor assigned to them. NEW QUESTION 108In most cases, F5 recommends using round robin load balancing.  True  False ExplanationUsing round robin load balancing is recommended when Server is not so strong and using easy WebApplication.NEW QUESTION 109DRAG DROPMatch the security-related term with the correct definition.1. OWASP Top 102. Secure Socket Layer (SSL)3. Bot4. Certificate5. Content scrubbingSelect and Place:  Loading … F5 101 Certification Exam is an excellent opportunity for professionals who want to enhance their skills and knowledge in application delivery fundamentals. With the right preparation and study materials, candidates can pass the exam and obtain the certification, which can lead to new career opportunities and professional growth. F5 101 Exam is a computer-based exam that consists of multiple-choice questions. Candidates are given 90 minutes to complete the exam, and the passing score is 69%. 101 exam is offered in different languages, including English, Japanese, Chinese, and Korean. Candidates who pass the F5 101 Exam will receive a certification that is recognized globally, demonstrating their proficiency in application delivery fundamentals.   Updated Nov-2023 Pass 101 Exam - Real Practice Test Questions: https://www.actualtests4sure.com/101-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-11-06 09:49:30 Post date GMT: 2023-11-06 09:49:30 Post modified date: 2023-11-06 09:49:30 Post modified date GMT: 2023-11-06 09:49:30