♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 101 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/101-exam/

Want to know Actualtests 101 Exam practice test features? Want to lear more about F5 Networks Application Delivery Fundamentals certification experience? Study Realistic F5 Networks 101 answers to Renew 101 questions at Actualtests. Gat a success with an absolute guarantee to pass F5 Networks 101 (Application Delivery Fundamentals) test on your first attempt.

2016 Dec 101 exams

Q91. A BIG-IP has two SNATs, a pool of DNS servers and a virtual server configured to loabalanceUDP traffic to the DNS servers. One SNAT's address is 64.100.130.10; this SNATis defined for all addresses. The second SNAT's address is 64.100.130.20; this SNAT isdefined for three specific addresses, 172.16.3.54, 172.16.3.55, and 172.16.3.56. The virtualserver's destination is 64.100.130.30:53. The SNATs and virtual server have default VLANassociations. If a client with IP address 172.16.3.55 initiates a request to the virtual server, 

What is the source IP address of the packet as it reaches the chosen DNS server? 

A. 64.100.130.30 

B. 172.16.3.55 

C. 64.100.130.20 

D. 64.100.130.10 

Answer:


Q92. Which is a potential result when a trunk is configured on a BIG-IP? 

A. No additional trunks can be configuration since each BIG-IP is limited to one trunk 

B. Packets flowing to the VLAN could arrive on any of the interfaces in the trunk 

C. Since any VLANs associated with the trunk are necessarily associated with multipleinterfaces, the VLAN using the must use tagged packets. 

D. VLAN fail-safe is not available for any VLAN associated with any trunks. 

Answer:


Q93. A virtual server at 10.10.1.100:80 has the rule listed below applied. when HTTP_REQUEST { if {[HTTP::uri]ends_with "htm" } { pool pool1 } elseif {[HTTP::uri] ends_with "xt" } { pool pool2 } If a user connects tohttp://10.10.1.100/foo.txt which pool will receive the request? 

A. pool1 

B. pool2 

C. None. The request will be dropped. 

D. Unknown. The pool cannot be determined from the information provided. 

Answer:


Q94. Which are immediate results of entering the following command: b pool PoolA . { lb method predictive member10.10.1 .1:80 member 10.10.1.2:80 } 

A. Requests sent to this BIG-IP system with a destination port of 80 are load-balanced between the membersof PoolA. 

B. No changes will take place since the command is missing the monitor component for PoolA. 

C. The /config/bigip.cinf file is updated to include a definition for the pool named PoolA. 

D. A new pool is available for association with any iRule or virtual server. 

Answer:


Q95. There is multiple HTTP class profiles assigned to a virtual server. Each profile hasApplication Security enabled. Which statement is true? 

A. Traffic will process through every HTTP class profile every time. 

B. Traffic will process through the first HTTP class profile that it matches and then stops. 

C. Traffic will process through one HTTP class profile and if the traffic matches another 

D. Traffic will only process through the HTTP class profile that it matches but alwaysprocesses through the whole list and will process through each HTTP class profile itmatches. 

Answer:


Renewal 101 free download:

Q96. What will likely happen if you were to define a LTM System in the wrong Data Center? 

A. There would be no effect if the LTM System is defined in the wrong Data Center. 

B. The GTM System would not be able to communicate with that LTM System loadbalancing decisions. 

C. Data from probes from that LTM System might result in inaccurate path metrics and 

D. The GTM System would not be able to resolve Wide-IPs to the addresses associatedwith that LTM System’s Virtual Servers. 

Answer:


Q97. Which of the following methods of protection is not available within the Protocol SecurityManager for HTTP traffic? 

A. Data guard 

B. Attack signatures 

C. Evasion techniques 

D. File type enforcement 

Answer:


Q98. When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose2) 

A. All client requests 

B. All server responses 

C. Specific client requests 

D. Specific server responses 

Answer: B,D 


Q99. The Flow Login feature prevents which web vulnerability from occurring? 

A. Buffer overflow 

B. Cookie poisoning 

C. Forceful browsing 

D. Cross site scripting 

Answer:


Q100. Which two statements describe differences between the active and standby systems? (Choose two.) 

A. Monitors are performed only by the active system. 

B. Fail-over triggers only cause changes on the active system. 

C. Virtual server addresses are hosted only by the active system. 

D. Configuration changes can only be made on the active system. 

E. Floating self-IP addresses are hosted only by the active system. 

Answer: C,E