When it comes to computers servers is a great part of ensuring that data is stored, transferred, and retrieved whenever it is required. Organizations have been chosen to have a virtual private server which helps them to keep tabs on what happens in the network. Take up this test and get to find out what you know about creating and See moreusing virtual private servers and network address transaction.
64.100.130.10
64.100.130.20
64.100.130.30
172.16.3.55
Rate this question:
SSL
MSRDP
Source address
Expression (universal)
No persistence method works in all situations
The BIG-IP license
The BIG-IP log files
The BIG-IP host name
The BIG-IP default traps
The BIG-IP administrative addresses
Rate this question:
The virtual server must have a UDP profile.
The number of client connections is reduced.
Server-side requests can utilize existing client-side connections.
Client-side requests can utilize existing server-side connections.
Rate this question:
10.10.10.1
10.10.10.2
160.10.10.10
200.10.10.1
It could be either 10.10.10.10 or 10.10.10.11
Rate this question:
Snoop
Qkview
Tcpdump
Ethereal
Rate this question:
0
1
3
4
5
10
It cannot be determined from the given data.
Rate this question:
A new pool is available for association with any iRule or virtual server.
The /config/bigip.conf file is updated to include a definition for the pool named PoolA.
No changes will take place since the command is missing the monitor component for PoolA.
Requests sent to this BIG-IP system with a destination port of 80 are load-balanced between the members of PoolA.
Rate this question:
/config/bigip.conf
/config/BigDB.dat
/etc/bigip_base.conf
/config/bigip_base.conf
Rate this question:
The client IP addresses are inserted into an HTTP header.
The client IP addresses are inserted into messages sent to remote syslog servers.
A BIG-IP self-IP is inserted in the source address field on the client-side connection.
A BIG-IP self-IP is inserted in the source address field on the server-side connection.
Rate this question:
Search and replace all occurences of a specified string only in requests processed by a virtual server.
Search and replace all occurences of a specified string only in responses processed by a virtual server.
Search and replace all occurences of a specified string in requests and responses processed by a virtual server.
Search and replace the first occurence of a specified string in either a request or response processed by a virtual server.
Rate this question:
This assignment is not allowed since the ports do not match.
For each member, the monitor will test the members node at port 443.
For each member, if the members port is not 443, the member will be marked down.
For each member, if it is running an SSL service at the members port, the monitor may work. Otherwise, the monitor will fail and the member will be marked down.
Rate this question:
VLAN fail-safe is not available for any VLANs associated with any trunks.
Packets flowing to the VLAN could arrive on any of the interfaces in the trunk.
No additional trunks can be configured since each BIG-IP is limited to one trunk.
Since any VLANs associated with the trunk are necessarily associated with multiple interfaces, the VLANs using the trunk must use tagged packets.
Rate this question:
This cannot be performed with an iRule.
Rule Test_iRule { when CLIENT_ACCEPTED { if { [[IP::local_addr] starts_with 192.168] or [[IP::local_addr] starts_with 172.16.12.] } { snatpool employee_snat pool web_pool } else { pool web_pool }
Rule Test_iRule { when HTTP_REQUEST { if { [[IP::local_addr] starts_with 192.168] or [[IP::local_addr] starts_with 172.16.12.] } { snatpool employee_snat pool web_pool } else { pool web_pool }
Rule Test_iRule { when CLIENT_ACCEPTED { if { [[IP::remote_addr] starts_with 192.168] or [[IP::remote_addr] starts_with 172.16.12.] } { snatpool employee_snat pool web_pool } else { pool web_pool }
Rule Test_iRule { when CLIENT_ACCEPTED { if { [[IP::remote_addr] starts_with 192.168] or [[IP::remote_addr] starts_with 172.16.12.] } { snatpool employee_snat } else { pool web_pool }
Rate this question:
BIG-IP must know the name of the program.
BIG-IP must know which functions the program is going to test.
BIG-IP must know the IP addresses of the devices that will be tested.
BIG-IP must know which node or member the results are to be applied to.
BIG-IP must know all services that are running on the system to be tested.
Rate this question:
The 1500 hosts more ports than the 3400.
All BIG-IP platforms have an option of a second power supply.
All BIG-IP platforms use both an ASIC and CPU(s) to process traffic.
All BIG-IP platforms have tri-speed Ethernet ports (10 / 100 / 1000 Mbit/sec).
All BIG-IP platforms have capacity to perform bulk encryption / decryption of SSL traffic independent of the CPU.
Rate this question:
The default load-balancing method would be used.
The load-balancing method of the previous pool would be used.
The system would prompt the user for a load-balancing method.
An error would be displayed since no load-balancing method was specified.
Rate this question:
Virtual servers can keep idle server connections open indefinitely.
Virtual servers can compress data between the BIG-IP and servers.
Virtual servers cannot perform load balancing without performing address translation.
Virtual servers can reuse connections between the BIG-IP and server for multiple HTTP GETs.
Virtual server processing always translates the virtual server address to the address of the choosen pool member.
Rate this question:
Most pools
Most nodes
Most virtual servers
Only specific pool members
Rate this question:
A SNAT pool can contain virtual server addresses.
SNATs using automap preferentially translate source addresses to non-floating self-IP addresses.
SNATs using a SNAT pool translate source addresses randomly to any of the addresses in the SNAT pool.
SNATs using automap translate source addresses randomly to any of the BIG-IP's floating self-IP addresses.
Rate this question:
Only client traffic may be captured; monitor traffic may not be captured.
Viewing monitor traffic could help the administrator to define a more robust monitor.
If client traffic to the servers was failing, viewing and analyzing monitor traffic would determine the reason.
If a client were having difficulty logging into a load-balanced SSH server, viewing and analyzing the connection process would determine the reason.
Rate this question:
Bigd
Alertd
Smtpd
Snmpd
Syslog-ng
Rate this question:
All users can be given bigpipe shell access.
Users with bigpipe shell access can only enable and disable LTM objects within a given partition.
Users with bigpipe shell access can change, add, or delete LTM objects, but only within a single partition.
Users with bigpipe shell access are limited to enabling and disabling LTM objects, but can always do so in all partitions.
The member is marked as unavailable if any of the monitors fails.
The member is marked as available if any of the monitors succeeds.
The member is marked available if all monitors succeed, and as marginal if one or more monitors fail(s).
The member is marked available if sufficient monitors succeed, and as unavailable if insufficient monitors succeed.
Rate this question:
The running configuration is loaded into files for storage.
The running configuration is replaced by the configuration in the files, but only if they are syntactically correct.
The running configuration is replaced by the any portions of the configuration files that are syntactically correct.
The running configuration is compared to the configuration in files and, when changes are noted, the version in the files is loaded over what is in memory.
Rate this question:
The client's TCP port
The client's IP address
The client's IP netmask
The client's IP fragment offset
The client's router's IP address
The client's browser's preferred language
Rate this question:
Change the virtual server's default pool.
Direct a connection request to a specific pool.
Discard a client before connecting to a server.
Limit a given client to a set amount of bandwidth.
Substitute a server's response with alternate data.
Direct a client's request to a pool based on the client's browser's language.
Rate this question:
10.10.1.10
10.10.1.33
150.10.30.30
150.10.33.33
200.10.10.10
It could be any of the addresses of the members of the load-balancing pool.
Rate this question:
Filters cannot prevent access to the management port.
Filters cannot prevent the BIG-IP synching process from taking place.
The order of filters does not affect which traffic is accepted or denied.
In addition to administrator-created filters, there always exists a "deny all" filter that processes traffic last.
Rate this question:
The context must be explicitly declared.
The iRule command determines the context.
The iRule event declaration determines the context.
The results of the iRule's conditional statement determines the context.
Rate this question:
All client-side traffic for that virtual server
All server-side traffic for that virtual server
Selected traffic from the BIG-IP to the clients
Selected traffic from the pool member to the BIG-IP
Rate this question:
The context has no impact on events.
The context determines which pools are available for load balancing.
The context determines which events are available for iRule processing.
The context determines the values of commands that vary between client and server.
Rate this question:
There are no detectable differences.
Profile B has a greater potential number of persistence records.
Profile B will have fewer persistence records for the same client base.
Profile A will have more clients matching existing persistence records.
Rate this question:
The current configuration files are backed up.
The current configuration files are loaded into memory.
The current configuration files are saved into an archive format.
The current configuration files are verified for syntax, then the running configuration is installed in memory.
Rate this question:
Traffic flow through transparent virtual servers is not load balanced.
Traffic flow through transparent virtual servers does not have IP address translation performed.
Traffic flow through transparent virtual servers must be forwarded through a single routing device.
Traffic flow through transparent virtual servers is bridged (leave IP and MAC addresses intact) rather than routed (leave IP address intact but change the MAC addresses).
Rate this question:
All users can be given advanced shell access.
Users with advanced shell access can always change, add, or delete LTM objects in all partitions.
Users with advanced shell access are limited to changing, adding, or deleting LTM objects in any single partition.
Users with advanced shell access have the same rights as those with bigpipe shell access, but the rights extend to all partitions rather than to a single partition.
Rate this question:
The new configuration is verified.
The new configuration is verified and loaded.
The new configuration is loaded but not verified.
The new configuration is verified but not loaded.
The new configuration is neither verified nor loaded.
The new configuration is verified and loaded if is it syntactially correct.
Rate this question:
No. iRules cannot affect persistence
No. Cookie persistence is only based on a cookie persistence profile.
Yes. An iRule could be designed to persist based on the contents of a cookie.
Yes. An iRule could be designed to persist based on the contents of a cookie as long as the cookie is set by the server.
Rate this question:
An IP address
Any text string within a cookie
The value in the tcp acknowledgement field
Any bytes within the initial client request packet
Rate this question:
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.