[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 221-230

Get Full Version of the Exam

Question No.221

The administrator must specify APM access control entries as either L4 or L7.

  1. True

  2. False

Correct Answer: B

Question No.222

Assume a client#39;s traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?

  1. The BIG-IP would drop the request since the traffic didn#39;t arrive destined to the NAT address.

  2. The source address would not change, but the destination address would be changed to the NAT address.

  3. The source address would be changed to the NAT address and destination address would be left unchanged.

  4. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP.

Correct Answer: C

Question No.223

A request is sent to the BIG-IP ASM System that generates a Length error violation. Which of the following length types provides a valid learning suggestion? (Choose three.)

  1. URL

  2. Cookie

  3. Response

  4. POST data

  5. Query string

Correct Answer: ADE

Question No.224

GTM uses the F5 protocol to synchronize performance metrics between GTM devices. (Fill in)

Correct Answer: iQuery

Question No.225

The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client. What security benefit does this provide to customers?

  1. Offloads security functionality from other devices such as network firewalls and Intrusion Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.

  2. provides enhanced support for DNS servers.

  3. Establishes highly detailed policies based on your customer#39;s business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.

  4. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process

Correct Answer: D

Question No.226

In the next few years, 75% of new storage capacity will shift to unstructured data (also known as file data). Which two of the following are examples of unstructured data? (Choose two.)

  1. CAD drawings

  2. Location data in a GIS (geographic information system)

  3. Customer records and product records in a CRM (customer relationship management) database

  4. Microsoft Office and PDF documents

Correct Answer: AD

Question No.227

A standard virtual server has been associated with a pool with multiple members. Assuming all other settings are left at their defaults, which statement is always true concerning traffic processed by the virtual server?

  1. The client IP address is unchanged between the client-side connection and the server-side connection.

  2. The server IP address is unchanged between the client-side connection and the server-side connection.

  3. The TCP ports used in the client-side connection are the same as the TCP ports server-side connection.

  4. The IP addresses used in the client-side connection are the same as the IP addresses used in the server-side connection.

Correct Answer: A

Question No.228

What is the expected difference between two source address persistence profiles if profile A has a mask of and profile B has a mask of

  1. Profile A will have more clients matching existing persistence records.

  2. There are no detectable differences.

  3. Profile B has a greater potential number of persistence records.

  4. Profile B will have fewer persistence records for the sane client base.

Correct Answer: D

Question No.229

APM provides access control lists at which two 051 layers

  1. Layer 6

  2. Layer 5

  3. Layer 7

  4. Layer 4

  5. Layer 3

  6. Layer 2

Correct Answer: CD

Question No.230

Which of the following are four of the security benefits of TMOS? (Choose four.)

  1. It verifies traffic based on antivirus signatures.

  2. It provides protection against DDoS.

  3. It uses SYN cookies and dynamic connection reapers.

  4. It supplies guidance for poorly developed applications.

  5. It denies all traffic that hasn#39;t been defined.

  6. It can hide confidential information from outbound traffic.

Correct Answer: BCEF

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress