[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 161-170

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.161

What are the two most common methods of placing a BIG-IP device into a network environment? (Choose two.)

  1. Channeled configuration

  2. VLAN configuration

  3. NAT configuration

  4. SNAT configuration

  5. Asymmetric configuration

  6. Routed configuration

Correct Answer: DF

Question No.162

Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effectively than any other firewalls?

  1. Because F5 has unlimited capacity to handle SSL traffic.

  2. Because F5 has full visibility and control of SSL traffic.

  3. Because F5 has a separate iApp to handle SSL traffic.

  4. Because F5 supports large SSL key sizes.

Correct Answer: B

Question No.163

A client sends a request to a virtual server http://www.foo.com configured on the BIG-IP ASM System. The virtual server has an HTTP class profile associated with Application Security enabled, all class filters set to match all, and a pool consisting of foo.com members. The virtual server also has a default pool associated with it. When the client sends a request for http://www.foo.com, this traffic will be forwarded to which of the following?

  1. The fallback host

  2. The default pool

  3. The HTTP class profile pool

  4. The request will be dropped

Correct Answer: C

Question No.164

The Rapid Deployment Policy is used to:

  1. Improve website performance

  2. Quickly protect web sites for most common attacks

  3. Improve ASM performance

  4. Provide wizard functionality for quick policy creation

Correct Answer: B

Question No.165

What feature of the F5 Exchange solution helps administrators to streamline implementation for added security and granular control?

  1. iControl

  2. Enterprise Manager

  3. iApps

  4. WebAccelerator

Correct Answer: A

Question No.166

ASM can detect Layer 7 DoS attacks by which four ways of monitoring: (Choose four.)

  1. Monitoring for a threshold of increased number of transactions per second per URL.

  2. Monitoring for a % change in transactions per second per URL.

  3. Monitoring for a % change in server latency or TPS.

  4. Monitoring for a threshold of increased server latency or TPS.

  5. Monitoring ASM policy builder performance.

  6. Monitoring BIG-IP CPU utilization.

  7. Deep Packet inspection.

Correct Answer: ABCD

Question No.167

One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.

  1. True

  2. False

Correct Answer: A

Question No.168

How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)

  1. any text string within a cookie

  2. any bytes within the initial client request packet

  3. an IP address

  4. the value in the tcp acknowledgement field

Correct Answer: AC

Question No.169

A site has assigned the ICMP monitor to all nodes and a custom monitor, based on the HTTP template, to a pool of web servers. The HTTP-based monitor is working in all cases. The ICMP monitor is failing for 2 of the pool member 5 nodes. All other settings are default. What is the status of the monitor is working in all cases? What is the status of the pool members?

  1. All pool members are up since the HTTP-based monitor is successful.

  2. All pool members are down since the ICMP-based monitor is failing in some cases.

  3. The pool members whose nodes are failing the ICMP-based monitor will be marked disabled.

  4. The pool members whose nodes are failing the ICMP-based monitor will be marked unavailable.

Correct Answer: D

Question No.170

Which of the following statements are correct regarding positive and negative security models? (Choose two.)

  1. Positive security model allows all transactions by default.

  2. Negative security model denies all transactions by default.

  3. Negative security model allows all transactions by default and rejects only transactions that contain attacks.

  4. Positive security mode l denies all transactions by default and uses rules that allow only those transactions that are considered safe and valid.

Correct Answer: CD

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress