Which protocol Authenticates network traffic between hosts end without encryption?
10:20: 37 .00749:IP 199.16.255.254.36664>10.0.1.10 http : flags (s) seq 700424862, Win 29200
A website is fronted by a toad balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there are bro nodes Node 1 and node2
She administrator is debugging an issue on node 1 using icpdump and records the above out about a received packet o watch device does the IP address 192 168 265 254" belong?
Which function does a caching profile provide on the BIG IP server?
A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero
What does this mean?
What are two examples of network layer protocols? (Choose two)
A BIG IP Administrator need to perform a packet capture and identify the source IP that is connecting to the Virtual Server.
Which utility should the administrator use on the BIG IP device?
A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?
Which three security controls are used in an SSL transaction? (Choose three.)
The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?
Which command should a BIG-IP Administrator use to resolve the domain www. F5.com?
Which protocol emphasizes reduced latency over reliability?
A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?
In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?
An administrator needs a remote VPN solution for corporate users. The existing network infrastructure has web-based services. The administrator needs to select the VPN that is the least complicated to deploy.
Which VPN solution should the administrator choose?
What is an advantage of packet forwarding architecture?
Which FTP mode should be used by a client behind a firewall that has no special configurator?
User A and User B's workload are on the same VLAN, but connected through a transparent layer 2 bridge in use B's ARP table. Which MAC address is reported for user A's workstation?
The 2001:db8: : IP6 address block is allocated to a load balancer for use as virtual server addresses. The address block is routed to a balancer self IP address using a static route. What is the correct representation for the last address in the address block that a virtual server can use?
What is used to establish trust relationships between BIG-IP devices?
An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly
Which F5 technology should the administrator use?
An administrator notices the following log message generated by a BIG IP system " diskmonitor 011d005: Disk partition shared has less than 30% tree" Which command should the administrator use to troubleshoot the problem?
In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic
What should be used for this task?
A BIG-IP Administrator needs to configure a network to separate traffic into three different VLANs using a single port on the BIG-IP device. What means should be used to allow this?
What are the two primary functions of the OSI 7 layer model (Choose two)
End users report widespread issues accessing multiple network resources
What tool should the BIG IP Administrator use to view the status of all virtual servers and associated resources in one place?
What is a primary benefit of employing a load balancer to manage traffic for an application?
Which protocol could be used to provide AAA Accounting?
Host A sends 10 TCP packets to Host B. All packets arrive at Host B quickly, but some arrive out of order.
What will Host B do?
An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer.
Which type of solution is this?
In 200 db8 IPv6 address block is allocated to a load balancer for use as virtual server addresses. The address block balancer set ip address using a static route. What is the representation for the last address in the address block that a virtual server can use?
A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192.168.0.0/24 net. What is required to enable the several and BIG-IP device to communicate properly?
A new VLAN segment has been added to the network. Only the existing connected interface may be used. What should the BIG-IP Administrator do to allow traffic to both the existing and the new VLAN?
HTTP pool attached to a Virtual Server has three members
Pool member A default HTTP monitor in red
Pool member 6 custom HTTP monitor in green
Pool member C does not monitor
Which pool members participate in the load balancing?
ARP provides translation between which two address types?
Where is the MAC masquerade address configured?
A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Mufti VLANS exist on LACPO1.Which TMSH command should the BIGIP Administrator issue to add the new VLAN to the existing LACP trunk?