Which three of the following statements describe a data center object?
A. It attempts to match a DNS request with a configured wide IP.
B. It is attached to multiple Internet links.
C. It becomes available for use when an assigned server is up.
D. It retains statistics for each data center.
E. It is a logical representation of a physical location.
F. It specifies how users access the Internet.
A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it:
A. pool1
B. pool2
C. None. The request will be dropped.
D. Unknown. The pool cannot be determined from the information provided.
Which of the following is NOT a logging option within an APM access control entry?
A. Packet
B. Verbose
C. Nominal
D. Summary
E. None
An LTM has the 3 virtual servers, 2 SNATs, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below. Settings not shown are at their defaults. Assume port exhaustion has not been reached.
A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:443. When the request is processed, what will be the source and destination IP addresses?
A. Source IP: 10.10.2.103; Destination IP: pool member in the 192.168/16 network
B. Source IP: 10.10.201; Destination IP: pool member in the 192.168/16 network G
C. Source IP: 10.10.2.103; Destination IP: 10.10.2.102
D. The request will be dropped.
E. Source IP: 10.20.10.50; Destination IP: pool member in the 192.168/16 network
F. Source IP: 10.10.201; Destination IP: 10.102.102
A pool is using Round Trip Time as its load balancing method (Alternate: Round Robin; Fallback:
None). The last five resolutions have been C, D, C, D, C. Given the current conditions shown in the table below, which address will be used for the next resolution?
A. A
B. B
C. C
D. D
Logging profiles are assigned to?
A. HTTP class
B. Security policies
C. Web applications
D. Attack signatures
To share device information with F5 technical support, a customer must either verbally share the information over the phone or copy and send the information in an Email.
A. True
B. False
Ping and Traceroute outputs are provided for a connectivity issue.
What is the cause of these results?
A. routing loop
B. packets that are routed with a high metric
C. multiple paths toward the destination
10:20:
37 .00749:IP 199.16.255.254.36664>10.0.1.10 http : flags (s) seq 700424862, Win 29200 A website is fronted by a toad balancer that implements a full proxy architecture with SNAT enabled Behind the load balancer there are bro nodes Node 1 and node2 She administrator is debugging an issue on node 1 using icpdump and records the above out about a received packet o watch device does the IP address 192 168 265 254" belong?
A.
node2
B.
node 1
C.
load balancer
D.
web Client
A user fails to provide credentials when requesting a web resource that requires authentication. Which HTTP response code does the server send?
A. HTTP 200
B. HTTP 302
C. HTTP 401
D. HTTP 502