When initially configuring the BIG-IP system using the config utility, which two parameters can be set? (Choose two.)
A. the netmask of the SCCP
B. the IP address of the SCCP
C. the port lockdown settings for the SCCP
D. the netmask of the host via the management port
E. the IP address of the host via the management port
F. the port lockdown settings for the host via the management port
The incoming client IP address is 205.12.45.52. The last five connections have been sent to members C, D, A, B, B. Given the virtual server and pool definitions and the statistics shown in the graphic, which member will be used for the next connection?
A. 10.10.20.1:80
B. 10.10.20.2:80
C. 10.10.20.3:80
D. 10.10.20.4:80
E. 10.10.20.5:80
A standard virtual server has been associated with a pool with multiple members. Assuming all other settings are left at their defaults, which statement is always true concerning traffic processed by the virtual server?
A. The client IP address is unchanged between the client-side connection and the server-side connection.
B. The server IP address is unchanged between the client-side connection and the server-side connection.
C. The TCP ports used in the client-side connection are the same as the TCP ports server-side connection.
D. The IP addresses used in the client-side connection are the same as the IP addresses used in the server-side connection.
Which statement is true concerning cookie persistence?
A. Cookie persistence allows persistence independent of IP addresses.
B. Cookie persistence allows persistence even if the data are encrypted from client to pool member.
C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.
D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system.
Which two statements are true about NATs? (Choose two.)
A. NATs support UDP, TCP, and ICMP traffic.
B. NATs can be configured with mirroring enabled or disabled.
C. NATs provide a one-to-one mapping between IP addresses.
D. NATs provide a many-to-one mapping between IP addresses.
Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in a redundant pair configuration?
A. bandwidth utilization
B. duplicate IP address
C. CPU utilization percentage
D. VLAN communication ability
Which two statements describe differences between the active and standby systems? (Choose two.)
A. Monitors are performed only by the active system.
B. Fail-over triggers only cause changes on the active system.
C. Virtual server addresses are hosted only by the active system.
D. Configuration changes can only be made on the active system.
E. Floating self-IP addresses are hosted only by the active system.
Which action will take place when a failover trigger is detected by the active system?
A. The active device will take the action specified for the failure.
B. The standby device also detects the failure and assumes the active role.
C. The active device will wait for all connections to terminate and then fail-over.
D. The standby device will begin processing virtual servers that have failed, but the active device will continue servicing the functional virtual servers.
Assuming that systems are synchronized, which action could take place if the fail-over cable is connected correctly and working properly, but the systems cannot communicate over the network due to external network problems?
A. If network fail-over is enabled, the standby system will assume the active mode.
B. Whether or not network fail-over is enabled, the standby system will stay in standby mode.
C. Whether or not network fail-over is enabled, the standby system will assume the active mode.
D. If network fail-over is enabled, the standby system will go into active mode but only until the network recovers.
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?
A. 172.16.20.1:80
B. 172.16.20.2:80
C. 172.16.20.3:80
D. 172.16.20.4:80
E. 172.16.20.5:80