[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 121-130

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.121

The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C, E, D and B. Given the virtual server, pool, and persistence definitions and statistics shown in the above graphic, which member will be used for the next connection?

image

A. 10.10.20.1:80

B. 10.10.20.2:80

C. 10.10.20.3:80

D. 10.10.20.4:80

E. 10.10.20.5:80

F. It cannot be determined with the information given.

Correct Answer: C

Question No.122

A standard virtual server is defined with a pool and a SNAT using automap. All other settings for the virtual server are at defaults. When client traffic is processed by the BIG-IP, what will occur to the IP addresses?

  1. Traffic initiated by the pool members will have the source address translated to a self-IP address but the destination address will not be changed.

  2. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address.

  3. Traffic initiated by selected clients, based on their IP address, will have the source address translated to a self-IP address but the destination will only be translated if the traffic is destined to the virtual server.

  4. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address. Traffic arriving destined to other destinations will have the source translated to a self-IP address only.

Correct Answer: B

Question No.123

Which statement is true concerning SNATs using automap?

  1. Only specified self-IP addresses are used as automap addresses.

  2. SNATs using automap will translate all client addresses to an automap address.

  3. A SNAT using automap will preferentially use a floating self-IP over a nonfloating self-IP.

  4. A SNAT using automap can be used to translate the source address of all outgoing traffic to the same address regardless of which VLAN the traffic is sent through.

Correct Answer: C

Question No.124

IP Enforcer blocks IP addresses that have repeatedly and regularly attacked the site.

  1. True

  2. False

Correct Answer: A

Question No.125

What is the purpose of the IP addresses listed in the Trusted IP section when using Policy Builder?

  1. Incoming requests with these IP addresses will never get blocked by BIG-IP ASM.

  2. Incoming requests with these IP addresses will not be taken into account as part of the learning

    process, they will be allowed to do anything.

  3. Incoming requests with these IP addresses will automatically be accepted into the security www.braindumps.com 87 F5 101 Exam policy, Policy Builder will validate that future requests with this traffic will not create a violation.

  4. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more advanced security policy, this additional policy will not be enabled unless forced by the administrator.

Correct Answer: C

Question No.126

In most cases, F5 recommends using round robin load balancing.

  1. True

  2. False

Correct Answer: B

Explanation:

Using round robin load balancing is recommended when Server is not so strong and using easy WebApplication.

Question No.127

Which statement describes advanced shell access correctly?

  1. Users with advanced shell access can always change, add, or delete LTM objects in all partition.

  2. Users with advance shell access are limited to changing, adding, or deleting LTM object in any single partition.

  3. Users with advance shell access have the same right as those with mesh access, but right extend to all partition rather than to a single partition.

  4. All Users can be given advanced shell access.

Correct Answer: A

Question No.128

Which of the following is correct regarding User-defined Attack signatures?

  1. User-defined signatures use an F5-supplied syntax

  2. User-defined signatures may only use regular expressions

  3. Attack signatures may be grouped within system-supplied signatures

  4. User-defined signatures may not be applied globally within the entire policy

Correct Answer: A

Question No.129

FastCache will NOT work with compressed objects.

  1. True

  2. False

Correct Answer: A

Question No.130

Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:

  1. True

  2. False

Correct Answer: A

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.