Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
Exam Questions 101
Application Delivery Fundamentals
[Link]
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 1
Tl SISSL prides which functionary when a web browser connects to web site using the HTTPS protocol?
A. delivers secure communication over a network connection
B. prevents the web server from being compromised
C. protects network packets from interception by intermedianes
D. stop the web browser from automatically downloading malware
Answer: A
NEW QUESTION 2
A load balancing decision needs to be made based on custom a What is the most appropriate F5 feature (or this purpose?
A. iApps
B. Scale
C. iControl
D. iRules
Answer: D
NEW QUESTION 3
What does HTTP status code 500 mean?
A. Service unavailable
B. Internal server error
C. Gateway timeout
D. Had gateway
Answer: B
NEW QUESTION 4
An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?
A. The HTTP service only listens on localhost
B. The users IP needs to be allowed to access
C. The server needs to be restarted
D. The HTTPS service Is not running
Answer: A
NEW QUESTION 5
An administrator needs to assess an LTM for potential configuration issues and required security updates. Which F5 website con automate this task?
A. [Link]
B. [Link]
C. Devcentral [Link]
D. [Link]
Answer: B
Explanation:
[Link] [Link]/services/support/support-offerings/big-ip-ihealth-diagnostic-tool
NEW QUESTION 6
A BIG-IP Administrator contacts F5 Support and is asked to upload a Support Snapshot. Which command should be entered to the CLI to generate the requested
file?
A. imsh generate snapshot
B. tmsh tcpdump
C. tmsh save sys ucs support
D. tmsh qkview
Answer: D
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 7
Which OSI layer provides reliable transmission of frames between adjacent nodes and is built on top of the provides reliable transmission of frames adjacent
nodes and is built on top of the Physical layer?
A. Data link
B. Transport
C. Network
D. Application
Answer: A
NEW QUESTION 8
What should a BIG-IP Administrator configure to minimize impact during a failure?
A. MAC masquerading
B. Clone pool
C. External monitors
D. One Connect profile
Answer: A
NEW QUESTION 9
Which high availability feature allows two different BIG-IP devices to use the MAC address for the same server IP?
A. HSRP virtual MAC address
B. Device group
C. Sync- failover
D. MAC masquerade
Answer: D
NEW QUESTION 10
A BIG-IP Administrator is trying to send traffic to a server on the same subnet and sees an incomplete in the BIG-IP devices ARP table. What could cause the
incomplete status?
A. BIG-IP device connection is half-duplex
B. Router does not have a default gateway
C. Firewall is blocking ICMP
D. Server's switch connection is in the wrong VLAN
Answer: D
NEW QUESTION 10
End users report widespread issues accessing multiple network resources
What tool should the BIG IP Administrator use to view the status of all virtual servers and associated resources in one place?
A. Pool statistics
B. Network Map
C. System performance
D. Virtual server statistics
Answer: B
Explanation:
The network map shows a list Virtual, Pools and iRules with the status of each.
NEW QUESTION 12
What is the correct procedure to comply with the recommendation?
A. Download the product version image from ihealth f5 com
B. Download the product version image from support 6 com
C. Download the product version image from dovcentral [Link]
D. Download the product version image from downloads [Link]
Answer: D
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 17
An organization needs to cryptographically sign its domains. Which F5 product provides this functionality?
A. GTM
B. LTM
C. ASM
D. APM
Answer: A
Explanation:
https //devcentral f5 com/articles/the-tNg-ip gtm-configuring-dnssec
NEW QUESTION 22
What are Iwo examples of failover capabilities of BIG-IP? (Choose two )
A. failing over based on an over temperature alarm
B. failing over serial cable based on electric failure code
C. II failing over network connection based on heartbeat detection
D. fading over network connection based on SNMP error
E. failing over serial cable based on voltage detection
Answer: CE
NEW QUESTION 23
Which HTTP response code is returned when a web server requires authentication to access a resource?
A. 500
B. 401
C. 302
D. 100
Answer: B
NEW QUESTION 25
Which command should a BIG-IP Administrator use to resolve the domain www. [Link]?
A. grep
B. ping
C. dig
D. find
Answer: C
NEW QUESTION 30
The users in a company are unable to send and receive SMTP e-mails using the BIG-IP Virtual Server. The administrator logs into the BIG IP device to verify if the
mail pool member with an IP address of 192. 168. 10. 100. 18 is serving SMTP traffic.
Which command on the BIG-IP device should the administrator use to verify the traffic?
A. tcpdump - 0 0 host 192 168 10 100 and port 143
B. curf - 1 smtp1/192 168 10 100
C. Icpdurnp - 0:0 host 192. 168. 10. 100 and port 25
D. telnet 192. 168. 10. 100. 143
Answer: C
NEW QUESTION 35
Which type of certificate is pre-installed in a web browser’s trusted store?
A. Root Certificate
B. Server Certificate
C. Client Certificate
D. intermediate Certificate
Answer: A
NEW QUESTION 39
Which function does the Presentation Layer provide?
A. translation and encryption
B. transmission over a medium
C. internetworking capabilities
D. access to available resources
Answer: A
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 42
Which IP subnet mask can be used to send traffic to all network nodes?
A. 192 168.0. 255/23
B. 192. 168. 1. 11/31
C. 172. 16. 1255/22
D. 192. 168. 0. 11/30
Answer: D
NEW QUESTION 43
An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality?
A. iCall
B. iRules
C. iSession
D. iControl
Answer: B
NEW QUESTION 48
Which protocol is used for control and session establishment for streaming media?
A. RTP
B. DTLS
C. SMB
D. RTSP
Answer: D
Explanation:
Referance: [Link] com/questions/4303439/what-is-the-difference between- rtp-or-rtst-in-streaming-server
NEW QUESTION 53
What is an advantage of a packet forwarding architecture?
A. allows for manipulation of HTTP headers
B. allows for SSL offload
C. reduces latency
D. handles larger packet sizes
Answer: C
NEW QUESTION 56
An administrator lakes a capture of five Traffic using tcpdump. The administrator notices that different ephemeral port numbers are architecture does this indicate?
A. packet-based architecture
B. full proxy architecture
C. hub and spoke architecture
D. ring network architecture
Answer: B
NEW QUESTION 60
A Network Administrator needs a new networking device can perform NAT to connect several devices on a computer network.
What is the most appropriate device for this requirement?
A. Switch
B. Router
C. Bridges
D. Hub
Answer: B
NEW QUESTION 63
A website is using source address persistence with a 30 second timeout A client is idle for 35 seconds What happens to their connection?
A. The client receives a "404 Page Not Found'" error
B. The client connection is dropped
C. The client remains on the same server
D. The Client request is load balanced
Answer: D
Explanation:
[Link]
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
ip_Itm/manuals/product/Itm-concepts-1-1-2- 1/Itm_persist_files.html
NEW QUESTION 66
Ethernet frame FCS errors occur when which calculation fails?
A. FSCM
B. CRC
C. CSR
D. HSTS
Answer: B
NEW QUESTION 69
An administrator configures a custom MAC masquerade address on a redundant BIG-IP system What will be the result?
A. The administrator will be prompted during configuration to define which until will use the MAC masquerade address
B. The MAC masquerade address will be concurrently used by both active and standby unit
C. The MAC masquerade address will only be used by the active uni
D. The standby unit in use the system's actual interfaces (s) MAC address
E. The MAC masquerade address will only be used by the un.t with higher unit ID The other unit wilt use the system's actual interface(s) MACaddress
Answer: C
Explanation:
[Link]
NEW QUESTION 74
A BIG-IP Administrator needs to configure a MAC masquerade address for traffic-group 1. Where on the GUI should this configuration be performed?
A. System > Configuration Device General > lraffic-group-1
B. Local Traffic > Traffic Class > traffic -group-1
C. Device Management > Traffic Groups > traffic-group-1
D. Network > ARP Static List > traffic-group-1
Answer: C
NEW QUESTION 78
[Link] 37 .00749:IP [Link].36664>[Link] http : flags (s) seq 700424862, Win 29200
A website is fronted by a toad balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there are bro nodes Node 1 and
node2
She administrator is debugging an issue on node 1 using icpdump and records the above out about a received packet o watch device does the IP address 192 168
265 254" belong?
A. node2
B. node 1
C. load balancer
D. web Client
Answer: C
NEW QUESTION 81
A BIG IP Administrator is trying to reach the internal web server from a workstation
* The workstation has a MAC address of 00:00 00 00 00 01 and an IP address or 192. 168. 0. 1
* An internal web server has a MAC address of 00 00 00 00 00 02 and an IP address of 10. 10. 1. 1
* The workstations default gateway has a MAC address of 00 00 00 00 00 03 and IP address of 192 168 0 254
What is the destination hardware address of the outbound packet when it leaves the workstation?
A. 00:00.[Link]
B. [Link] :00:00:00
C. [Link]
D. [Link] 02
Answer: C
NEW QUESTION 86
Which service should be configured to allow BIG-IP devices to be externally monitored?
A. SSHD
B. TMSH
C. SMTP
D. SNMP
Answer: D
NEW QUESTION 91
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?
A. when users are unable to install software on their PC
B. when users require a secure connection to the corporate network
C. when users work remotely
D. when users require the ability to RDP to internal resources
Answer: C
NEW QUESTION 93
Which protocol data unit (PDU) is associated with the OSI model Network layer?
A. Frame
B. Packet
C. Segment
D. Bit
Answer: B
Explanation:
[Link]
NEW QUESTION 97
An administrator needs to restore the BIG-IP configuration from a UCS file In which section in the BIG IP Configuration utility is this task performed?
A. System > Archives
B. System > Services > Backup
C. System > Backup
D. System > File Management
Answer: A
NEW QUESTION 100
A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?
A. Public Key
B. SSL extension
C. A negotiated security algorithm
D. private Key
Answer: A
NEW QUESTION 105
An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?
A. negative security model
B. Closed security model
C. positive Security model
D. ACL Security model
Answer: C
Explanation:
https //www [Link]/[Link]/Positive_security_model
NEW QUESTION 109
A BIG IP administrator is testing a web server behind ADC. The connection to a Virtual Server is successful but the page is still not loading Where should the
administrator test to determine if theserver is available?
A. from server-side interface in ADC.
B. from client side interface in ADC
C. from Workstation client
D. from switch connected to ADC and Server
Answer: A
NEW QUESTION 113
A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show
the synchronization status with the Network Time Protocol servers ?
A. ntpdate
B. time
C. mpa
D. date
Answer: C
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 115
For an IP of 192 168 10.10 with a subnet mask of 255 255.240 0 an administrator is asked to provide
• The first network address
• The broadcast address, and
• The number of hosts available per subnet host What should be the administrator's response'?
A. 192. 168. 0. 1 is the network addres
B. 192.168.10 255 is the broadcast addres
C. There are 16382 addressable hosts
D. 192. 168. 0. 0 is the network address 192 168 15 255 is the broadcast addres
E. There are 4094 addressable hosts
F. 192.168. 0.0 is the network addres
G. 192 168 16 255 is the broadcast addres
H. There are 1022 addressable hosts
I. 192. 168.16. 0 is the network address, 192 168 31 255 is the broadcast addres
J. There are 409J addressable hosts
Answer: B
NEW QUESTION 120
An administrator needs to selectively compress HTTP traffic based on geographical location Which FS Feature should the administrator use?
A. One Connect
B. iRules
C. SPDY profile
D. iSessions
Answer: B
NEW QUESTION 123
What should a BIGIP Administrator configure to provide remote access and ensure data privacy?
A. Security policy
B. Packet filter
C. VPN
D. GRE
Answer: C
NEW QUESTION 128
Which protocol data unit (PDU) is associated with the OSI model’s Transport layer?
A. Segment
B. Datagram
C. Packet
D. Bit
Answer: A
Explanation:
[Link]
NEW QUESTION 132
A company recentlyopened a new branch site. The site needs to access the internet through a link to [Link] at the branch Branch1 the router at HQ is
Called core1. The computers at the branch site reside on the network 192 168 1 0/24 directly connected to Branch1 Users at HQ can already access the
[Link] routing must be configured to achieve the required internet connectivity for the branch site?
A. a route for 0. 0. 0.0/0 on Branch1 to Core1, and a route for 192 168 1 0/24 from Core 1 to Branch1
B. a route for 0. 0. 0.0/0 on Core 1 to Branch1. and a route (or 192 168 1.0/24 from Branch 1 to Core.
C. only a route for 192 168 0 0724 from Corel to Branch1
D. only a route for 0. 0.0.0/0 on Branch1 to Core1
Answer: A
NEW QUESTION 135
An organization needs to protect its data center from layer three-based and layer four-based exploits. Which F5 product provides this functionality
A. AFM
B. ASM
C. GTM
D. APM
Answer: A
Explanation:
[Link]
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 136
What advantage does an active-standby configuration have over an active-active configurations?
A. Active-standby configuration allows for the backup of the peer configuration
B. Active-standby utilizes the hardware more efficiently
C. Active standby Uses significantly less power consumption than active-active
D. Active-standby is less complex to troubleshoot
Answer: D
NEW QUESTION 141
A certificate chain can be used for which purpose?
A. Creating anonymous connections on the internet
B. anchoring the geographic location of a client or server
C. Ensuring multiple layers of decryption and encryption
D. Determining a client or server should be trusted
Answer: D
NEW QUESTION 146
A BIG IP Administrator observes that the pool member status is a blue square What does this status indicate?
A. The object is available
B. The availability of the object is unknown.
C. The object has reached its configured connection limit
D. The object is unavailable.
Answer: B
NEW QUESTION 147
Which function does a caching profile provide on the BIG IP server?
A. caches client IP addresses to improve response times
B. caches HTTP headers lo improve server load times.
C. caches selected pool members to improve load balancing times.
D. caches data for reuse to cut down on transfer time for future requests
Answer: D
Explanation:
The Itmcache profile is a memory cache of data from pool members
NEW QUESTION 149
in which scenario is a full proxy TCP connection required?
A. when compression is actuated
B. When Source NAT configured
C. when a virtual server is configured
D. When Source IP persistence is required
Answer: A
Explanation:
https//devcentral f5 com/articles/the-full-proxy-data-center-architecture
NEW QUESTION 153
What is a common use of an iRule?
A. to modify application traffic between the client and server
B. to create a reuseable application delivery template
C. to integrate a BIG IP into an enterprise orchestration tool
D. to create an accelerated session between two BIG-IP devices
Answer: A
NEW QUESTION 158
An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following
error code.
* 11. Times exceeded What does this mean?
A. A faulty router on the network is unable to process the packet in a timely manner
B. A switch on the network the frame due to an incorrect checksum
C. The TTL field of the IP header was set to 255. and this was consequently dropped by a router
D. The TTL field of the IP header was decremented to 0. and this was consequently dropped by a router
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
Answer: D
NEW QUESTION 162
What is a benefit of configuring BIG-IP devicesin active-active high availabilitymode?
A. avoid Overload on the BIG-P system in theevent of a failover
B. allows full utilization of hardware purchased
C. reduces troubleshooting complexity
D. provides ability to upgrade a member of the pair without disruption
Answer: B
NEW QUESTION 167
What is used to provide mutual authentication for TLS/SSL?
A. X 509 Certificate
B. Access List
C. Shared Secret key
D. Mutually Trusted issuer
Answer: A
NEW QUESTION 170
Which HTTP response code indicates an OK status?
A. 302
B. 404
C. 200
D. 100
Answer: C
NEW QUESTION 172
ICMP is used by which command line tool?
A. curt
B. tcpdump
C. traceroute
D. nslookup
Answer: C
NEW QUESTION 174
Given the service list of a server shown, the administrator needs to determine why users are unable to resolve the IP [Link].
What is the causing this issue?
A. bigd is down
B. named is down
Answer: B
Explanation:
berkely internetname daemon (DNS) bigd is the health checking daemon
NEW QUESTION 175
A company deploys F5 load balancers to manage number of secure applications. The company needs to centrally manage certificates.
Which F5 product provides this functionality?
A. BIG IQ
B. GTW
C. iHeath
D. LTM
Answer: A
NEW QUESTION 180
Which of the following is a valid IP address and prefix length?
A. 192. 168.:0 177/25
B. 192 168:0. 129/25
C. 192.168:0 128/25
D. 192 168 :0 255/25
Answer: B
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 185
ARP provides translation between which two address types?
A. IP addresses and hardware addresses
B. Hardware addresses and VLAN
C. VLAN and IP addresses
D. Hostnames and IP addresses
Answer: A
NEW QUESTION 188
A client needs to learn if a web server supports POST Which HTTP method is used?
A. OPTIONS
B. TRACE
C. LIST
D. GET
Answer: A
Explanation:
https //developer [Link]/en-US/docs/Web/HTTP/Methods/OPTION
NEW QUESTION 190
A server is operating on the network 10.100/24. The BIG-IP device is operating on the [Link]/24 net. What is required to enable the several and BIG-IP
device to communicate properly?
A. Firewall
B. Switch
C. Router
D. Hub
Answer: C
NEW QUESTION 194
Which Datalink sublayer has the primary [Link] of proving node lo node flow and error control?
A. LLC
B. ARP
C. MAC
D. UDP
Answer: A
Explanation:
hltps://en wikipedia org/wiki/Logical_link_control
NEW QUESTION 196
In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is
the most likely reason for this scenario?
A. The pool members health monitor has been disable
B. The pool members have been disabled
C. The pool members have been powered off
D. The pool member services have been shut down
Answer: D
NEW QUESTION 197
A BIG-IP Administrator has a cluster of devices.
What should the administrator do after creating a new Virtual Server on device 1?
A. synchronize the settings of device 1 to the group
B. create a new cluster on device 1
C. create the new virtual server on device 2
D. synchronize the settings of the group to device 1
Answer: A
NEW QUESTION 199
A BIG-IP Administrator needs a solution to tunnel traffic and transmit encrypted connections over the Internet using only a standard browser and common ports
and protocols. Which solution should the administrator select?
A. GRE Tunnel
B. iPsec VPN
C. SSH Tunnel
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
D. SSL VPN
Answer: D
Explanation:
This is APMs use of the netscape plugin api (NPAPI) that most browsers have deprecated at this point.
NEW QUESTION 204
A web administrator has added content to a web application, but users are unable to access the new content What could be preventing them from accessing the
content?
A. The webapp uses negative security, and the attack signature is using an invalid regular expression
B. The webapp uses positive securit
C. and the nourishes database has not been updated
D. The webapp uses positive security, and the new content has not been defined as allowed behavior
E. The webapp uses negative securit
F. and the denial of service signatures have not been updated
Answer: C
NEW QUESTION 206
An administrator is given the IP Address of [Link] and needs 64 subnets. How many hosts per network are allowed?
A. 4
B. 8
C. 6
D. 2
Answer: D
NEW QUESTION 208
The BIG IP device is connected to the same network as a server
Which communication protocol will the BIG IP device use to discover the link layer address of the server?
A. Ping
B. ICMP
C. RARP
D. ARP
Answer: D
NEW QUESTION 213
A BIG IP Administrator needs to create a virtual server for a new secure end-to-end web application After change in configuration the virtual server .3 still marked
down. The configuration of the virtual server and the pool member are correct. A quick server shows the status.
To fix the issue, what should the BIG-IP Administrator inform the web server administrator to do?
A. change web server configuration to use SSL/TLS
B. reboot the server
C. restart the web service
D. change web server configuration lo use SSH/SCP
Answer: A
Explanation:
If the application needs to be secure ‘end-to-end’’ the web server needs to use SSL as well. Most web servers will not required to HTTP requests when
configured with HTTPS, so the monitor is failing.
NEW QUESTION 217
An administrator connects two devices using an Ethernet cable. The link fails to come up on either device, which setting could prevent the link from being
established?
A. Proxy settings
B. IP configuration
C. Link speed
D. DNS resolvers
Answer: C
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
NEW QUESTION 221
An IPV6 clients tries to connect to [Link]
[Link] type of DNS request should the client send to its configured server?
A. type MX
B. type AAAA
C. type NS
D. type A
Answer: B
NEW QUESTION 223
An administrator needs a data a format that is support authentication against an external security domain. The data format must format support SSO. Which data
format should the administrator choose?
A. AAA
B. Kerberos
C. SAML
D. EAP
Answer: C
NEW QUESTION 224
Which protocol could be used to provide AAA Accounting?
A. karberos
B. SAML
C. DIAMETER
D. LDAP
Answer: C
Explanation:
[Link]
NEW QUESTION 227
Web application [Link] at [Link].110, is unresponsive. A recent change migrated DNS to a new platform
A. telnet www example com 80
B. curl http //www example com
C. dig www example com
D. telnet 10.10.1. 110. 80
Answer: C
Explanation:
Telnet will open a socket to the http server, but the request would need to be manually input Curlwill send a request and output the response.
NEW QUESTION 231
An application has a mix of both and short and long lived connections. Which algorithm would provide and event distributionof all connections across the pool?
A. Priority group activate
B. Least connections
C. Static ration
D. Round robin
Answer: B
NEW QUESTION 233
What does response code HTTP 302 represent?
A. The server encountered an unexpected condition that prevented it from Milling the request.
B. The server has not found anything matching the Request URI
C. The request has succeeded.
D. The requested resource resides temporary under a different URI
Answer: D
NEW QUESTION 235
Which protocol data unit (POU) is associated with the OSI model’s Network layer
A. Segment
B. Datagram
C. Bit
D. Frame
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
Answer: B
NEW QUESTION 236
The BIG-IP device has the following configured routes:
Which gateway will be chosen to send the packet to the destination 10 238 10 11?
A. 192. 168 10 20
B. 192. 168.10. 40
C. 192 168. 10. 30
D. 192. 168. 10. 10
Answer: A
NEW QUESTION 238
What is used to resolve IP address to MAC address mappings?
A. DHCP
B. ARP
C. DNS
D. ICMP
Answer: B
Explanation:
[Link]
NEW QUESTION 242
Which device type in the topology will forward network packets without an OSI layer 3 address assigned to a data plane interface?
A. Router
B. Firewall
C. Application Server
D. Switch
Answer: D
NEW QUESTION 245
A BIG IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show
the synchronization status with the Network Time Protocol servers?
A. time
B. ntpdate
C. date
D. ntpq
Answer: D
Explanation:
nlpq -pn will show thesynchronization status of configured ntp servers
NEW QUESTION 249
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?
A. measure usage
B. provide authentication
C. provide availability
D. provide session auditing
E. filter access
Answer: BD
NEW QUESTION 251
What is a primary benefit of employing a load balancer to manage traffic for an application?
A. It reduces the number of client connections
B. It provides a more uniform client experience
C. It allows easy scaling up of the application
D. It Reduces dropped connections
Answer: C
NEW QUESTION 252
At which layer of the OSJ model does the DNS resolution process occur?
A. Layer 7
B. Layer 4
C. Layer 2
D. Layer 3
Answer: A
NEW QUESTION 256
A BIG IP Administrator reviews the Virtual Server configuration and sees the object status represented by a blue square tor an unknown [Link] should the
administrator change the unknown status?
A. restart the BIG-IP device
B. assign a monitor to the pool
C. restart the backend webserver
D. run a packet capture on the BIG-IP device
Answer: B
NEW QUESTION 259
If there are multiple applications authenticated against a single identity store, which technology solution will simplify access to all applications?
A. RADIUS
B. single sign on
C. multifactor authentication
D. LDAP
Answer: B
NEW QUESTION 263
What is one way that a application delivery controller lowers the CPU-load on web servers?
A. use SSL termination at the application delivery controller
B. make the application delivery controller function as a Firewall
C. make the application delivery controller a member of both external and internal VLANs
D. use cookie persistence on the application delivery controller
Answer: A
NEW QUESTION 267
Which TransportLayer Security (TLS) extension can be used to enable a single virtual server to serve multiple HTTPS websites in different can be used to enable
a single virtual server to server domains?
A. Session Tickets
B. OCSP Staping
C. Server Name indication
D. Certificate Status Request
Answer: C
NEW QUESTION 270
Cryptographic hash functions can be used to provide which service?
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
A. data modification
B. data encryption
C. data validation
D. data decryption
Answer: C
Explanation:
https ://[Link]/wiki/Hash_function
NEW QUESTION 274
A company is creating a new department for Security Engineering and needs to create a segregated network segment with only 24 IPS.
What should be configured?
A. configure a new VLAN and assign a netmask of /29
B. use an existing VLAN and assign a netmask of /28
C. use an existing VLAN and assign a netmask of /30
D. configure a new VLAN and assign a netmask of /27
Answer: D
Explanation:
a /28contains 14 usable IPs and a 127contains 30 usable IPs
NEW QUESTION 278
What are two examples of network layer protocols? (Choose two)
A. ARP
B. TCP
C. IPv4
D. BGP
E. ICMP
Answer: AE
NEW QUESTION 279
in which scenario is a full proxy TCP connection required?
A. when SIP UP P load balancing is defined
B. when DNS load balancing is configured
C. when compression is enabled
D. when layer 3 load balancing is configured
Answer: C
NEW QUESTION 284
An administrator needs to deploy a VON solution that offers data integrity and origin authentication of IP packets. Which solution the administrator use?
A. IPSecVPN
B. PPTP
C. GRE
D. SSL VPN
Answer: A
NEW QUESTION 287
Which protocol Authenticates network traffic between hosts end without encryption?
A. PPTP
B. GRE
C. IPSec AH
D. iPSec ESP
Answer: C
Explanation:
https//[Link]/[Link]/37253/what-is-the-difference-between-the-ah-and- esp-port/
NEW QUESTION 292
Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?
A. context-based access control mode!
B. role-based access control mode!
C. negative security model
D. positive security model
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
Answer: D
NEW QUESTION 294
A VoIP application requires that data payloads will NOT be fragmented. Which protocol controls network behavior in this situation?
A. RTSP
B. UDP
C. TCP
D. IP
Answer: A
NEW QUESTION 299
Web application [Link] [Link] at [Link].10 is unresponsive.
A recent change installed new firewalls in the network. Which command should be used to locate where data loss has occurred within the network?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation:
Traceroute attempts to send ICMP-packets that expire further down the network and determine if a network device is responding or allowing traffic through.
NEW QUESTION 300
......
Passing Certification Exams Made Easy visit - [Link]
Welcome to download the Newest 2passeasy 101 dumps
[Link] (240 New Questions)
THANKS FOR TRYING THE DEMO OF OUR PRODUCT
Visit Our Site to Purchase the Full Set of Actual 101 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the 101
Product From:
[Link]
Money Back Guarantee
101 Practice Exam Features:
* 101 Questions and Answers Updated Frequently
* 101 Practice Questions Verified by Expert Senior Certified Staff
* 101 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 101 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year
Passing Certification Exams Made Easy visit - [Link]
Powered by TCPDF ([Link])