Which three are GTM server dynamic load balancing modes? (Choose three.)
A. Packet Rate
B. Virtual Server Score
C. CPU
D. Fallback IP
E. Ratio
What is the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder?
A. Incoming requests with these IP addresses will never get blocked by BIG-IP ASM.
B. Incoming requests with these IP addresses will not be taken into account as part of the learning process, they will be allowed to do anything.
C. Incoming requests with these IP addresses will automatically be accepted into the security www.braindumps.com 87 F5 101 Exam policy, Policy Builder will validate that future requests with this traffic will not create a violation.
D. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more advanced security policy, this additional policy will not be enabled unless forced by the administrator.
If LTM uses the round robin load balancing method, which pool member in the diagram above will receive the next request?
A. A
B. C
C. D
D. B
The SNMP monitor can collect data based on which three metrics? (Choose three.)
A. packet rate
B. memory utilization
C. content verification
D. current connections E. hops along the network path
A BIG-IP has the following objects configured: A SNAT pool with 2 members:
A virtual server at 150.10.30.30:80 that is associated with both the SNAT pool and the load balancing pool. If a client at IP address 200.10.10.10 initiates a connection to the virtual server, what will the source IP address be in the packets sent
to the chosen pool member?
A. 150.10.30.30
B. 150.10.33.33
C. 10.10.1.10
D. It could be any of the addresses of the members of the load balancing pool.
E. 10.10.1.33
F. 200.10.10.10
An Administrator enables HTTP keep alive. How does this affect the network?
A. HTTP connections will remain open longer
B. Fewer TCP connections will need to be opened
C. HTTP connections will close when the keep-alive times out
D. More TCP connections will need to be opened
Ethernet frame FCS errors occur when which calculation fails?
A. FSCM
B. CRC
C. CSR
D. HSTS
Which protocol data unit (PDU) is associated with the OSI model's Physical layer?
A. Frame
B. Datagram
C. Segment
D. Bit
Which security model provides protection from unknown attacks?
A. ACL Security model
B. closed security model
C. Negative security model
D. Positive security model
In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic
What should be used for this task?
A. Big-IP Global Traffic Manager appliance
B. Big-lP standard virtual edition
C. Big-IP Local Traffic Manager appliance
D. Big-IP virtual edition with FIPS