[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 361-370

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.361

How many events can be referenced in a given iRule?

  1. iRules are limited to one event, but a virtual server could be associated with multiple rules.

  2. iRules can have multiple events.

  3. Exactly one.

  4. iRules can have up to event if one is client-side and one is server-side.

Correct Answer: B

Question No.362

When initially configuring the GTM System using the config tool, which two parameters can be set? (Choose two.)

  1. System hostname

  2. IP Address of management port

  3. IP Address of the external VLAN

  4. Default route for management port

  5. Port lockdown of management port

Correct Answer: BD

Question No.363

The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy. The two types are main and frame cookies. What is the purpose of the frame cookie? (Choose two.)

  1. Validates domain cookies

  2. Detects session expiration

  3. Stores dynamic parameters and values

  4. Handles dynamic parameter names and flow extractions

Correct Answer: CD

Question No.364

When choosing Fundamental as the Policy Builder security policy type, BIG-IP ASM will learn and enforce the following components? (Choose two.)

  1. Attack signatures

  2. Global parameters

  3. HTTP protocol compliance

  4. URLs and meta characters

Correct Answer: AC

Question No.365

Which two can be a part of a pool#39;s definition? (Choose two.)

  1. rule(s)

  2. profile(s)

  3. monitor(s)

  4. persistence type

  5. load balancing mode

Correct Answer: CE

Question No.366

An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the graphic below. Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached. A connection attempt is made with a source IP and port of 10.20.10.50:2222 and a destination IP and port of 10.10.2.102:80. When the request is processed, what will be the source and destination IP addresses?

image

image

  1. Source IP: 10.20.10.50; Destination IP: pool member in the 172.16/16 network

  2. Source IP: 172316.20.50; Destination IP: pool member in the 182.16/16 network

  3. Source IP: 192.168.1.1; Destination IP: pool member in the 192.168/16 network

  4. The request will be dropped.

  5. Source IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network

  6. Source IP: 182.16.1.1; Destination IP: pool member in the 172316/16 network

  7. Source IP: 192.168.10.50; Destination IP: pool member in the 192.168/16 network

  8. Source IP:192.168.10.50; Destination IP: pool member in the 192.168./16 network

Correct Answer: F

Question No.367

An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached. A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:443.

When the request is processed, what will be the source and destination IP addresses?

image

  1. Source IP: 10.10.2.103; Destination IP: pool member in the 192.168/16 network

  2. Source IP: 10.10.201; Destination IP: pool member in the 192.168/16 network G C. Source IP: 10.10.2.103; Destination IP: 10.10.2.102

  1. The request will be dropped.

  2. Source IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network

  3. Source IP: 10.10.201; Destination IP: 10.102.102

Correct Answer: C

Question No.368

When probing LDNSs, which protocol is used by default?

  1. TCP

  2. ICMP

  3. DNS_REV

  4. DNS_DOT

Correct Answer: B

Question No.369

What are the best reasons for using the Deployment Wizard? (Choose three.)

  1. Flow level parameters checking is required.

  2. The application encoding scheme needs to be determined by the BIG-IP ASM System.

  3. Sufficient time is available to allow completely automated policy building based on observing live traffic.

  4. The application platform must be protected against known attacks for the specific operating system, web server, and database.

Correct Answer: BCD

Question No.370

Adding more RAM to a GTM device drastically improves query performance.

  1. True

  2. False

Correct Answer: B

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress