♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 101 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/101-exam/

Want to know Ucertify 101 Exam practice test features? Want to lear more about F5 Networks Application Delivery Fundamentals certification experience? Study Downloadable F5 Networks 101 answers to Updated 101 questions at Ucertify. Gat a success with an absolute guarantee to pass F5 Networks 101 (Application Delivery Fundamentals) test on your first attempt.

2017 Jan 101 practice question

Q11. Which is the result when multiple monitors are assigned to a pool member? 

A. The member is marked available if sufficient monitors succeed, and as unavailable ifinsufficient monitors succeed. 

B. The member is marked as available if any of the monitors succeed. 

C. The member is marked as unavailable if any of the monitors fails. 

D. The member is marked available if all monitors succeed, and as marginal if one or moremonitors fail(s). 


Q12. Which statement is true concerning cookie persistence? 

A. Cookie persistence allows persistence independent of IP addresses. 

B. Cookie persistence allows persistence even if the data are encrypted from client to pool member. 

C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in cleartext. 

D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to theclient's file system. 


Q13. What is the purpose of the IP addresses listed in the Trusted IP section when using Policy 


A. Incoming requests with these IP addresses will never get blocked by BIG-IP ASM. 

B. Incoming requests with these IP addresses will not be taken into account as part of the learning process, they will be allowed to do anything. 

C. Incoming requests with these IP addresses will automatically be accepted into the security policy, Policy Builder will validate that future requests with this traffic will not create a violation. 

D. Incoming requests with these IP addresses will be used by Policy Builder to create an alternate more advanced security policy, this additional policy will not be enabled unless forced by the administrator. 


Q14. A BIG-IP has two load balancing virtual servers at and 

The port 80virtual server has SNAT automap configured. 

There is also a SNAT configured at set for asource address range of / 

All other settings are at their default states. If a clientwith the IP address sends a request to, what is the source IP address whenthe associated packet is sent to the pool member? 



C. Floating self IP address on VLAN where the packet leaves the system 

D. Floating self IP address on VLAN where the packet arrives on the system 


Q15. Where is the load-balancing mode specified? 

A. within the pool definition 

B. within the node definition 

C. within the virtual server definition 

D. within the pool member definition 


Leading 101 test preparation:

Q16. A site has six members in a pool. All of the servers have been designed, built, and configuredwith the sameapplications. It is known that each client's interactions vary significantly and can affect the performance of theservers. If traffic should be sent to all members on a regular basis, which load-balancing mode is mosteffective if the goal is to maintain a relatively even load across all servers? 

A. Ratio 

B. Priority 

C. Observed 

D. Round Robin 


Q17. What does the insert XForwarded option in an HTTP profile do? 

A. A BIG-IP self-IP is inserted in the source address field on the server-side connection. 

B. A BIG-IP self-IP is inserted in the source address field on the client-side connection. 

C. The client IP addresses are inserted into messages sent to remote syslog servers. 

D. The client IP addresses are inserted into HTTP header. 


Q18. Tightening is a feature of which type of entity? 

A. Explicit URLs 

B. Attack signatures 

C. Flow login URLs 

D. Wildcard parameters 


Q19. Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in aredundant pair configuration? 

A. bandwidth utilization 

B. duplicate IP address 

C. CPU utilization percentage 

D. VLAN communication ability 


Q20. What are two advantages of the Quality of Service (QoS) load balancing method? (Choosetwo.) 

A. It resolves requests to the site with the highest QoS value in the IP header. 

B. It combines multiple load balancing metric values in a single load balancing method. 

C. It allows the GTM administrator to place relative values on each metric used to determinethe optimum site. 

D. It allows the GTM System to select the optimum virtual server based on all available pathand server metrics. 

Answer: B,C