A pool is using Global Availability as its load balancing method (Alternate:Round Robin; Fallback: Return to DNS). The last five resolutions have been C, D, C, D, C. Given the current conditions shown in the table, which address will be used for the next resolution?
A. A
B. B
C. C
D. D
All members of a pool must share the same service port?
A. True
B. False
Which event is always triggered when a client initially connects to a virtual server configured with an HTTP profile?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. CLIENT_ACCEPTED
When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?
A. The size of the response
B. The requested resource (URI)
C. The response code from the web server
D. The parameter values of static based parameters
When choosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the following components? (Choose two.)
A. Attack signatures
B. Global parameters
C. HTTP protocol compliance
D. URLs and meta characters
Which statement is true concerning iRule events.
A. All iRule events relate to HTTP processes.
B. All client traffic has data that could be used to trigger iRule events.
C. All iRule events are appropriate at any point in the client-server communication.
D. If an iRule references an event that doesn't occur during the client's communication, the client's connection will be terminated prematurely.
Which of the following statements are correct regarding Attack signatures? (Choose two.)
A. Attack signatures can apply to requests, responses, and parameters.
B. Attack signatures are the basis for positive security logic with the BIG-IP ASM System.
C. Any new Attack signature downloaded manually or automatically will be active and assigned directly to the security policy.
D. Individual Attack signatures can be assigned to the security policy. Only Attack signature sets can apply to the security policy.
Complete the statement below by choosing the correct word or phrase to complete the sentence. By identifying IP addresses and security categories associated with malicious activity, the BIG-IP _______ service can incorporate dynamic lists of threatening IP addresses into the BIG-IP platform, adding context to policy decisions.
A. Edge Client
B. iRules
C. LTM
D. IP intelligence
E. iApps
Select F5 platforms have which three certifications? (Choose three.)
A. FIPS
B. SECG
C. NEBS
D. IEEE
E. Common Criteria
F. AFSSI
An LTM object contains both IP address and port combinations 20.18.9.250:80 and 20.18.9.251:80 and host the same Web application. What is this object?
A. Pool
B. Self-IP
C. Node
D. Pool member
E. Virtual Server
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only F5 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 101 exam preparations and F5 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.