Computer Quiz Questions On Networking

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Formula5
F
Formula5
Community Contributor
Quizzes Created: 1 | Total Attempts: 144
| Attempts: 144 | Questions: 111
Please wait...
Question 1 / 111
0 %
0/100
Score 0/100
1. BIG-IP Local Traffic Manager works with Web applications only.

Explanation

BIG-IP LTM can manage network traffic for all types of IP-based applications.

Submit
Please wait...
About This Quiz
Computer Quiz Questions On Networking - Quiz

Here are some amazing and interesting quiz questions on computer networking. Let's start and learn more about it!

Personalize your quiz and earn a certificate with your name on it!
2. A Virtual Server typically contains:

Explanation

A virtual server typically contains an IP address and port. The IP address is used to identify the virtual server within a network, while the port number is used to specify the specific service or application running on the virtual server. This combination of IP address and port allows incoming network traffic to be directed to the correct virtual server and service.

Submit
3. The default IP address for the BIG-IP management port is 192.168.1.245. This IP address was chosen for a special reason. Why did F5 choose this?

Explanation

not-available-via-ai

Submit
4. If you are concerned about encryption between BIG-IP and the Pool members, you should not use SSL Termination.

Explanation

If you are concerned about encryption between BIG-IP and the Pool members, you should use SSL Termination. SSL Termination allows the BIG-IP to decrypt the incoming SSL traffic and then re-encrypt it before sending it to the Pool members. This ensures that the traffic between the BIG-IP and the Pool members is encrypted. Therefore, the correct answer is False.

Submit
5. IRules can contain only one event

Explanation

The statement "iRules can contain only one event" is false. iRules in F5 Networks' BIG-IP system can contain multiple events. An event in an iRule is a specific condition or trigger that causes the iRule to execute a set of instructions. These events can include HTTP requests, TCP connections, SSL handshakes, and more. iRules are flexible and allow for complex scripting and customization of traffic management on the BIG-IP system. Therefore, it is incorrect to say that iRules can only have one event.

Submit
6. What will be the state of the Virtual Server under the following scenario:

All Nodes are available, but no monitors are assigned to Members or Pools

Explanation

If all nodes are available but no monitors are assigned to members or pools, it means that the system does not have any information about the health or status of the virtual server. Without any monitors, the system cannot determine whether the virtual server is available or unavailable. Therefore, the state of the virtual server in this scenario would be "Unknown" represented by a blue square.

Submit
7. Typically, a redundant pairs of BIG-IPs should be configured with a Floating Self IP Address per VLAN. Also, if you're worried about ARP cache not getting refreshed on neighboring network devices, MAC Masquerading can help by floating a MAC Address between a redundant pair of BIG-IPs.

Explanation

A redundant pair of BIG-IPs should be configured with a Floating Self IP Address per VLAN to ensure that traffic can be seamlessly redirected to the standby BIG-IP in case of a failure. This allows for uninterrupted service availability. Additionally, using MAC Masquerading helps in refreshing the ARP cache on neighboring network devices by floating a MAC Address between the redundant pair of BIG-IPs. This ensures that the network devices can correctly identify and communicate with the active BIG-IP. Therefore, the statement is true.

Submit
8. If BIG-IP allows client traffic for new connections, persistent sessions and open existing TCP connections, then what is it's administrative state?

Explanation

The correct answer is "Enabled" because if BIG-IP allows client traffic for new connections, persistent sessions, and open existing TCP connections, it means that it is functioning and actively allowing network traffic. Therefore, its administrative state would be enabled.

Submit
9. Both SNAT and Virtual Server processing can occur on a packet as it passes through BIG-IP

Explanation

Both SNAT and Virtual Server processing can occur on a packet as it passes through BIG-IP. This means that when a packet is being processed by the BIG-IP device, it can undergo both SNAT (Source Network Address Translation) and Virtual Server processing. SNAT involves modifying the source IP address of the packet, while Virtual Server processing involves directing the packet to the appropriate virtual server based on its destination IP address. Therefore, it is true that both SNAT and Virtual Server processing can occur on a packet as it passes through BIG-IP.

Submit
10. SCCP is the BIG-IP operating system responsible for processing client traffic.

Explanation

The given statement is false. SCCP is not the BIG-IP operating system responsible for processing client traffic. SCCP stands for Signaling Connection Control Part, which is a protocol used in telecommunication networks for call setup, signaling, and controlling. The BIG-IP operating system responsible for processing client traffic is called TMOS (Traffic Management Operating System).

Submit
11. One advantage of Profiles is their settings cab be applied across multiple Virtual Servers.

Explanation

Profiles in this context refer to a set of predefined configurations or settings that can be applied to multiple virtual servers. By using profiles, administrators can easily manage and maintain consistent settings across multiple virtual servers, saving time and effort. This advantage allows for efficient management and ensures that the desired settings are uniformly applied, making the statement "One advantage of Profiles is their settings can be applied across multiple Virtual Servers" true.

Submit
12. Do you think it is important to write your iRules as efficiently as possible?

Explanation

The correct answer is "Yes. Because BIG-IP LTM processes an iRule each time its declared Event occurs, it is important to keep them as small and efficient as possible." This answer explains that it is important to write iRules efficiently because they are processed each time the declared event occurs in BIG-IP LTM. Writing small and efficient iRules helps to optimize the performance and reduce the processing time.

Submit
13. Specify which tool or utility to use for the following task:

License BIG-IP

Explanation

To license BIG-IP, the appropriate tool or utility to use is the BIG-IP Web Configuration Utility. This utility provides a graphical user interface that allows users to configure and manage the BIG-IP system. It offers a user-friendly interface for licensing the BIG-IP device, allowing users to easily enter and activate the license key. The SSH client and command line config script may have other uses in managing the BIG-IP system, but they are not specifically designed for licensing purposes.

Submit
14. Which menu option would you go to if you want to back up your BIG-IP configuration?

Explanation

To back up the BIG-IP configuration, you would go to the "System" menu option. This option typically provides access to various system-level settings and configurations, including the ability to create backups of the BIG-IP configuration. By selecting the "System" menu option, you can easily navigate to the backup functionality and initiate the process to ensure the configuration is securely saved for future use or restoration purposes.

Submit
15. The following description matches which Pool Member status:

Monitor checks assigned to the Pool Member. Positive responses received for those Monitor checks. New traffic will be sent to Pool Member.

Explanation

The description matches the Pool Member status "Available (green circle)" because it states that the Monitor checks assigned to the Pool Member are being checked and receiving positive responses. This indicates that the Pool Member is functioning properly and able to handle new traffic, hence it is available.

Submit
16. Network Failover is not configured by default

Explanation

By default, network failover is not configured. This means that in a network setup, if one network connection fails, there is no automatic backup or alternate connection to take over. In order to have network failover, it needs to be manually configured by the network administrator.

Submit
17. Which would best describe the Least Connections Load Balancing Method?

Explanation

The Least Connections Load Balancing Method is best described as the method that selects the server with the lowest open connection count to distribute incoming requests. This means that the load balancer will direct new requests to the server that currently has the fewest active connections, ensuring a balanced distribution of workload across the servers. This method helps in optimizing resource utilization and improving overall performance and responsiveness of the system.

Submit
18. What will be the state of the Virtual Server under the following scenario:

The first Pool Member is unavailable, the second Pool Member is available, and the third Pool Member is offline.

Explanation

In this scenario, the first Pool Member is unavailable, which means it cannot be accessed. However, the second Pool Member is available, indicating that it can be accessed. The third Pool Member is offline, meaning it is not currently connected or accessible. Since at least one Pool Member is available, the Virtual Server can still be accessed, and therefore its state is "Available" represented by a green circle.

Submit
19. Pool members typically contain:

Explanation

Pool members typically contain both an IP address and a port. The IP address is used to identify the specific device or server within a network, while the port number is used to identify the specific application or service running on that device. Together, the IP address and port allow for the proper routing and delivery of network traffic to the intended destination.

Submit
20. If your iRule contains multiple conditional statements, you can put these conditional statements in any order and always achieve the same result.

Explanation

The statement is false because the order of conditional statements in an iRule can affect the outcome. The iRule evaluates the conditional statements in the order they are written, and if a condition is met, it executes the corresponding action and exits the iRule. Therefore, changing the order of the conditional statements can change the behavior of the iRule and lead to different results.

Submit
21. What will be the state of the Virtual Server under the following scenario:

All Nodes are available, but all Members have reached their connection limit and are unavailable.

Explanation

The state of the Virtual Server will be Unavailable (yellow triangle) in the given scenario because although all Nodes are available, all Members have reached their connection limit and are unavailable. This means that the Virtual Server cannot establish connections with any of its Members, resulting in an unavailable state.

Submit
22. You should never use the default Server SSL Profile without adding customizations.

Explanation

Using the default Server SSL Profile without any customizations is not necessarily a bad practice. The default profile is designed to provide a secure SSL configuration out of the box. However, depending on the specific requirements and security needs of the application, additional customizations may be necessary. Therefore, it is not always true that you should never use the default Server SSL Profile without adding customizations.

Submit
23. Select the correct order for the upgrade process for a Redundant Pair

Explanation

The correct order for the upgrade process for a Redundant Pair is to first backup the Standby Unit, then upgrade the Standby Unit itself. After that, the Active system should be forced into Standby mode. Once that is done, the upgraded system should be verified to ensure it functions correctly. Finally, the other system should be upgraded. This order ensures that the Standby Unit is backed up and upgraded before any changes are made to the Active system, and that the upgraded system is tested before upgrading the other system.

Submit
24. Which would best describe the Round Robin Load Balancing Method?

Explanation

The Round Robin Load Balancing Method evenly distributes the workload across all available resources. This means that each resource will handle an equal amount of requests or connections, ensuring a balanced distribution of traffic. This method is commonly used in load balancing systems to optimize resource utilization and prevent any single resource from becoming overloaded.

Submit
25. If the status of a Node is offline, then all Pool Members at that IP Address will also be offline

Explanation

If the status of a Node is offline, it means that the Node is not functioning or not connected to the network. Since all Pool Members are associated with the same IP address as the Node, if the Node is offline, it implies that the IP address is also offline. Therefore, all Pool Members at that IP Address will also be offline.

Submit
26. The following description matches which Pool Member status:

Monitor checks might or might not be assigned to the Pool Member. Connection limit reached for Pool Member or Node. No new traffic will be sent to Pool Member.

Explanation

The correct answer is "Unavailable (yellow triangle)". This status indicates that the Pool Member is not available to receive new traffic because the connection limit has been reached or the node is offline. The yellow triangle symbolizes a warning or caution, indicating that there is an issue with the Pool Member's availability.

Submit
27. If you're going to configure Cookie Persistence, which other two Profiles must be configured for that Virtual Server?

Explanation

To configure Cookie Persistence, two other profiles must be configured for the virtual server: TCP Profile and HTTP Profile. The TCP Profile is necessary to handle the TCP connections and ensure proper communication between the client and the server. The HTTP Profile is required to process and manage HTTP requests and responses. These two profiles work together to enable the virtual server to maintain session persistence based on cookies.

Submit
28. Both NATs and SNATs can be configured for a specific port

Explanation

Both NATs (Network Address Translations) and SNATs (Source Network Address Translations) cannot be configured for a specific port. They are used to translate IP addresses and not port numbers. NATs and SNATs are used to allow multiple devices on a private network to share a single public IP address, but they do not have the capability to configure specific ports.

Submit
29. The Virtual Server process never translates the Port.

Explanation

The given statement is false. The Virtual Server process does translate the port. In a virtual server environment, the virtual server acts as an intermediary between the client and the actual server. It receives requests from the client and forwards them to the appropriate server. During this process, the virtual server may need to translate the port number to ensure that the request reaches the correct server. Therefore, the statement that the Virtual Server process never translates the port is incorrect.

Submit
30. Custom Profiles are stored in the /config/bigip.conf file?

Explanation

Custom Profiles are stored in the /config/bigip.conf file because this file is the main configuration file for the BIG-IP system. It contains all the configuration settings for the system, including custom profiles. Storing custom profiles in this file allows for easy management and access to these profiles.

Submit
31. Source Address Persistence can be effectively used with an HTTPS Virtual Server.

Explanation

Source Address Persistence can be effectively used with an HTTPS Virtual Server because HTTPS is a secure protocol that encrypts data between the client and the server. Source Address Persistence allows the server to maintain a consistent connection with the client by using the client's source IP address. This is important for HTTPS connections as it ensures that the encrypted session is maintained and the client's requests are consistently routed to the same server. Therefore, it is true that Source Address Persistence can be effectively used with an HTTPS Virtual Server.

Submit
32. Which would best describe the Ratio Load Balancing Method?

Explanation

The Ratio Load Balancing Method is best described as a percentage distribution across different resources. This means that the load is evenly distributed based on the specified ratios, ensuring that each resource receives a proportional amount of the workload. This method allows for efficient resource utilization and prevents any single resource from being overwhelmed with requests.

Submit
33. The following description matches which Pool Member status:

Monitor checks assigned to the Pool Member. No positive responses received for those Monitor checks during timeout period. No new traffic will be sent to Pool Members.

Explanation

The description states that the monitor checks assigned to the Pool Member have not received any positive responses during the timeout period. This indicates that the Pool Member is not responding or functioning properly. As a result, no new traffic will be sent to the Pool Members. The Offline status, represented by the red diamond, accurately reflects this situation as it indicates that the Pool Member is not available or not functioning.

Submit
34. Which of the following keystrokes launches the configuration menu for the secondary operating system?

Explanation

Pressing the Esc ( keystroke launches the configuration menu for the secondary operating system.

Submit
35. In a Redundant Pair setup, the IP Address of Failover Peer should be:

Explanation

In a Redundant Pair setup, the IP Address of Failover Peer should be unique to each system. This is because in a redundant pair setup, two systems are configured to work together as a backup for each other. Each system needs to have its own unique IP address to ensure proper communication and coordination between the two systems. If both systems had identical IP addresses, it would lead to conflicts and confusion in the network, making it difficult for the systems to function as a reliable failover pair.

Submit
36. For the initiation packet, a SNAT changes the source address while the Virtual Server changes the destination address.

Explanation

In an initiation packet, a SNAT (Source Network Address Translation) changes the source address, which means it modifies the IP address of the packet's sender. On the other hand, a Virtual Server changes the destination address, meaning it modifies the IP address of the packet's intended recipient. Therefore, the statement that a SNAT changes the source address while the Virtual Server changes the destination address is true.

Submit
37. You are travelling on a plane for business. You've finally figured out an iRule that will solve a problem you've been facing. You open your laptop, start coding in the iRule Editor, and are puzzled when you can't save your iRule. Why isn't the Editor working properly?

Explanation

The iRule Editor must be connected to a live BIG-IP before you can save your iRule. This means that in order to save the iRule, the editor needs to be connected to a functioning BIG-IP device. Without this connection, the iRule Editor will not be able to save the code.

Submit
38. Which of the following types of Persistence does not need to be mirrored?

Explanation

Cookie Persistence does not need to be mirrored because it relies on the use of cookies to maintain persistence. When a user visits a website, a unique cookie is generated and stored on their device. This cookie contains information that allows the load balancer to identify and route subsequent requests from the same user to the same server. Since the cookie is stored on the user's device, there is no need for the load balancer to mirror or replicate this information across multiple servers.

Submit
39. Select the reasons for BIG-IP LTM systems to be deployed as an Active-Standby Redundant Pair. (Select all that apply)

Explanation

Deploying BIG-IP LTM systems as an Active-Standby Redundant Pair increases reliability over a single BIG-IP by providing a backup system that can take over in case of failure. This ensures that the application(s) hosted on the BIG-IP are highly available, as there is a backup system ready to take over in case of any issues. Additionally, having an Active-Standby Redundant Pair allows the system to handle a higher volume of traffic as the workload is distributed between the two systems.

Submit
40. Which menu option would you go to if you want to configure network routing and switching for BIG-IP?

Explanation

The correct answer is "Network". In the context of configuring network routing and switching for BIG-IP, the "Network" menu option would be the most appropriate choice. This option is likely to contain settings and configurations related to network routing and switching, allowing the user to make the necessary adjustments and configurations for the BIG-IP device.

Submit
41. Which provisioning level would you use for the following:

Only one module is functional on a CPU or on the whole system

Explanation

The provisioning level that would be suitable for a scenario where only one module is functional on a CPU or on the whole system is "Dedicated". This means that the resources are exclusively allocated to that particular module, ensuring optimal performance and preventing any interference or sharing of resources with other modules or processes.

Submit
42. Which of the following are not dependent on Profiles?

Explanation

The DNS Pool is not dependent on Profiles because it is used to group multiple DNS servers together to provide load balancing and failover capabilities. It does not require any specific configuration or settings from a Profile.

Submit
43. When using the automatic licensing method, you must still manually place the license file in the correct directory on BIG-IP

Explanation

When using the automatic licensing method, the license file is automatically placed in the correct directory on BIG-IP. Therefore, there is no need to manually place the license file in the correct directory.

Submit
44. Which of the following methods can you use for accessing the BIG-IP command line interface? (You may choose multiple answers.)

Explanation

The correct answer is SSH and Serial Console. SSH (Secure Shell) is a network protocol that allows secure remote access to the command line interface of the BIG-IP device. It provides encrypted communication and authentication. The Serial Console is another method for accessing the command line interface, which requires a physical connection to the device using a serial cable. Telnet is not a valid method for accessing the BIG-IP command line interface as it is not secure and is considered a less secure alternative to SSH.

Submit
45. Select the dynamic Load Balancing Modes from the list below:

Explanation

The given answer includes the load balancing modes that are based on different algorithms. "Fastest" mode selects the server with the fastest response time, "Predictive" mode predicts the server with the least load based on historical data, "Least Connections" mode directs traffic to the server with the fewest active connections, and "Observed" mode monitors the servers and directs traffic to the one with the fewest failed responses. These modes help distribute the workload efficiently and improve performance in a dynamic load balancing setup.

Submit
46. A BIG-IP Virtual Server can terminate client SSL sessions, thus offloading this work from the Pool members.

Explanation

A BIG-IP Virtual Server has the capability to handle client SSL sessions, which means it can handle the encryption and decryption of SSL/TLS connections made by clients. By doing so, the Virtual Server can offload this resource-intensive task from the Pool members, which are the servers that actually process the client requests. This offloading helps to distribute the workload more efficiently and allows the Pool members to focus on other tasks, improving overall performance and scalability.

Submit
47. According to the RFCs, SNAT stands for Source Network Address Translation

Explanation

According to the RFCs, SNAT stands for Source Network Address Translation. This statement is false. SNAT actually stands for Source Network Address Translation, which is a technique used in computer networking to translate the source IP address of a packet to a different IP address.

Submit
48. Following are the steps that occur when using the manual method to license BIG-IP. Select the correct order.

Explanation

The correct order of steps when using the manual method to license BIG-IP is as follows: first, from the BIG-IP Web Configuration Utility, copy the dossier or download it as a file to your PC. Then, connect the PC containing the dossier to the Internet or copy the dossier to a different PC that is already connected to the Internet. Next, send the dossier to the F5 License Server. After that, get the license from the F5 License Server. Finally, copy the license to BIG-IP.

Submit
49. Ratio member Load Balancing is selected and the ratios for Servers A, B, C and D are 3, 2, 4 and 1 respectively.

Servers C and D are currently Unavailable.

How would the next 100 requests be distributed?

Explanation

The ratio member load balancing algorithm distributes requests based on the ratios assigned to each server. In this case, the ratios for Servers A, B, C, and D are 3, 2, 4, and 1 respectively. However, Servers C and D are currently unavailable. Therefore, the next 100 requests would be distributed only among Servers A and B, with a ratio of 3:2. This means that Server A would receive 60 requests and Server B would receive 40 requests. Since Servers C and D are unavailable, they would not receive any requests.

Submit
50. Select the correct order these steps occur during the Failover Process

Explanation

The correct order of steps during the Failover Process is as follows:
1. The Active box has some problem or condition set to trigger failover.
2. The Active box takes the action specified for the trigger issue, such as going offline or restarting all.
3. The Standby box detects that the Active box is not present.
4. The Standby box takes over the Active role and issues gratuitous ARPs for Floating Self IP and Virtual Server Addresses.

Submit
51. A node contains:

Explanation

A node contains an IP address only. This means that the node is identified and located on a network solely by its IP address, without any additional information such as a port number.

Submit
52. Network Failover uses the same TCP Port 443 used for Synchronizing the configuration.

Explanation

Network Failover does not use the same TCP Port 443 used for synchronizing the configuration. Network Failover typically uses a separate dedicated port for communication between the primary and secondary network devices. This allows for redundancy and seamless failover in case of a network failure. Using the same port for both functions would not provide the necessary level of redundancy and could lead to conflicts and disruptions in network operations.

Submit
53. All Administrative States              client connections, until the session terminates or times-out.

Explanation

The correct answer is "maintain". This means that all administrative states are responsible for keeping client connections active and functional until the session either ends or times out.

Submit
54. The following description matches which Pool Member status:

No monitor checks assigned to the Pool Member or it's Node. New traffic will be sent to Pool Member.

Explanation

The description states that there are no monitor checks assigned to the Pool Member or its Node, and new traffic will be sent to the Pool Member. This suggests that the status of the Pool Member is unknown, as there is no information available about its availability or offline status. The blue square symbolizes the unknown status, indicating that it is unclear whether the Pool Member is available or not.

Submit
55. Rule IP_Address
 when CLIENT_ACCEPTED {
  if {[[IP::remote_addr] starts_with " 10. "] } {
    pool ten_pool
  }
  else {
    pool customer_pool
  }
 }
}

Which of the following best describes what this iRule will cause to happen?

Explanation

This iRule is triggered when a client TCP 3-way handshake has been completed. Then, if the client's IP address starts with " 10. ", BIG-IP LTM sends the connection request to a member of the Pool ten_pool. If not, BIG-IP sends the request to a member of the Pool customer_pool.

Submit
56. When the floating IP Address is used to log into a Redundant Pair, which system will be accessed?

Explanation

When the floating IP Address is used to log into a Redundant Pair, the system that will be accessed is the one that is currently active. In a redundant pair setup, there are typically two systems, one primary and one standby. The primary system is the active one that handles the workload, while the standby system remains idle until it needs to take over in case of a failure or maintenance. The floating IP address is assigned to the active system, allowing it to be accessed and used for logging in.

Submit
57. The command to display the BIG-IP High Availability table is:

b ha table display

Explanation

The given command "b ha table display" is not the correct command to display the BIG-IP High Availability table. Therefore, the correct answer is False.

Submit
58. Mirroring data is passed using the same TCP Port 443 that is used to Synchronize the configuration.

Explanation

Mirroring data is not passed using the same TCP Port 443 that is used to synchronize the configuration. Mirroring data requires a separate port for transmission, typically a different port than the one used for configuration synchronization. Therefore, the correct answer is False.

Submit
59. Which provisioning level would you use for the following:

Allocate no reources to the module

Explanation

The provisioning level "None" would be used when allocating no resources to the module. This means that no resources or minimum resources are allocated to the module, indicating that it operates without any dedicated resources.

Submit
60. Which of the following options are valid resource levels you can assign to a BIG-IP module? (Choose all that apply.)

Explanation

The valid resource levels that can be assigned to a BIG-IP module are Minimum, None, Nominal, and Dedicated. These resource levels represent different allocation levels for the module's resources. "Minimum" indicates the lowest level of resources required for the module to function properly. "None" suggests that no additional resources are allocated to the module. "Nominal" represents a moderate level of resource allocation. "Dedicated" means that the module has exclusive access to a specific set of resources.

Submit
61. What is the default Administrative State?

Explanation

The default administrative state refers to the initial setting or status of a system or device. In this case, the correct answer is "Enabled." This means that the system or device is initially set to be operational or active. It is not forced offline, unavailable, or disabled by default.

Submit
62. In a Redundant Pair setup, the Floating IP Address should be:

Explanation

In a Redundant Pair setup, the Floating IP Address should be identical on each system. This means that both systems in the redundant pair will have the same Floating IP Address assigned to them. This ensures that if one system fails, the other system can seamlessly take over the Floating IP Address and continue serving the network traffic without any disruption. Having identical Floating IP Addresses on each system simplifies the failover process and ensures smooth operation in case of system failures.

Submit
63. The BIG-IP command line "config" script and the BIG-IP Web Configuration Utility serve the same purpose.

Explanation

The statement is false because the BIG-IP command line "config" script and the BIG-IP Web Configuration Utility do not serve the same purpose. The command line "config" script is used for making changes and configurations to the BIG-IP system through the command line interface, while the Web Configuration Utility is a graphical user interface that allows users to make changes and configurations to the BIG-IP system through a web browser.

Submit
64. F5 recommends a timeout value that is 2 times the interval plus 1 second (2n + 1).

Explanation

F5 does not recommend a timeout value that is 2 times the interval plus 1 second. The correct answer is False.

Submit
65. NATs can be used to map many IP Addresses to one NAT Address

Explanation

NATs (Network Address Translations) are used to map many private IP addresses to one public IP address. This allows multiple devices within a private network to share a single public IP address when communicating with devices outside of the network. Therefore, the given statement is incorrect.

Submit
66. The BIG-IP LTM system that is designated with Unit ID 1 is considered the primary system of a Redundant Pair

Explanation

The statement is false because in a redundant pair configuration, the BIG-IP LTM system with Unit ID 1 is designated as the secondary system, not the primary system. The primary system is typically designated with a different Unit ID, such as Unit ID 0.

Submit
67. Which of the following can trigger the failover process on BIG-IP? (Select all that apply)

Explanation

The failover process on BIG-IP can be triggered by multiple events. One of them is when the VLAN Failsafe mechanism detects a failure in the network. Another trigger is when the MCPD (Management Control Plane Daemon) process fails, which is responsible for managing the configuration and state of the system. Additionally, if the TMM (Traffic Management Microkernel) process fails, it can also initiate the failover process. However, the absence of a default route configured for BIG-IP or the failure of the Syslog-ng process does not directly trigger the failover process.

Submit
68. If BIG-IP allows client traffic for persistent sessions and open existing TCP connections, what it it's administrative state?

Explanation

If BIG-IP allows client traffic for persistent sessions and open existing TCP connections, its administrative state is most likely disabled. This means that the BIG-IP device is not actively processing any client traffic or managing any TCP connections.

Submit
69. Which of the following statements are true? (Choose all that apply)

Explanation

Monitors are used to determine the health or status of a Node or Pool Member. This means that monitors are used to check if a Node or Pool Member is functioning properly or if there are any issues with it.

Monitors generally test a specific Node or Member for an expected response. This means that monitors are designed to test a specific Node or Member and check if it responds as expected.

Monitors continue checking Nodes or Members even after marking them down. This means that even if a Node or Member is marked as down, monitors still continue to check it to see if it becomes available again.

These statements explain the purpose and behavior of monitors in a network or server environment.

Submit
70. A Persistence Profile can be associated to a:

Explanation

A Persistence Profile can be associated with a Virtual Server to maintain session persistence for client requests. By associating a Persistence Profile with a Virtual Server, the load balancer can ensure that subsequent requests from the same client are consistently directed to the same server in the pool, based on the defined persistence method. This helps in maintaining session state and providing a seamless user experience.

Submit
71. Which provisioning level would you use for the following:

Use minimum functional resources and distribute additional resources to other modules

Explanation

The provisioning level "Minimum" would be used in this scenario because it allows for the use of the minimum functional resources while distributing any additional resources to other modules. This means that only the essential resources needed for the specific module will be allocated, while any excess resources can be allocated to other modules that require them. This ensures efficient resource allocation and optimization across different modules.

Submit
72. What is wrong with the following iRule?

rule IP_Address {
 when CLIENT_ACCEPTED {
  if { [[IP::remote_addr starts_with " 10. " } {
    pool ten_pool }
  else {
    pool customer_pool }
 }
}

Explanation

The given iRule is missing a closing square bracket in the conditional statement. This syntax error prevents the iRule from executing correctly.

Submit
73. The following Monitor type matches which example or attribute:

Content Check

Explanation

The correct answer is "HTTP GET/ with receive rule match" because the attribute "Content Check" refers to checking the content of network traffic for specific patterns or rules. In this case, the example "HTTP GET/ with receive rule match" indicates that the monitor is checking for the specific content of an HTTP GET request that matches a particular receive rule. This suggests that the monitor is looking for a specific pattern or content in the HTTP traffic to determine if it matches the desired criteria.

Submit
74. The hardware failover cable and Network Failover must not be used together.

Explanation

The hardware failover cable and Network Failover should be used together. This is because the hardware failover cable is used to connect two network devices directly and create a redundant link for failover purposes. On the other hand, Network Failover is a feature that allows for automatic failover between multiple network interfaces on a device. By using both together, it ensures a more robust and reliable network infrastructure.

Submit
75. Specify the order in which the primary setup tasks must be completed.

Explanation

The correct order for the primary setup tasks is as follows: first, set the IP address of the BIG-IP management port. This step is necessary to ensure proper connectivity and access to the device. Next, obtain a license from the F5 License Server. This step is important as it allows the device to have the necessary licenses to operate and enable specific features. Finally, configure administrator access and other network settings. This step involves setting up user accounts, access controls, and other network-related configurations to ensure secure and efficient management of the device.

Submit
76. What is syntactically wrong with the following iRule:

rule IP_Address {
  if { [[IP::remote_addr] starts_with " 10. " ] }
    {pool ten_pool}
}

Explanation

The given iRule is missing the event declaration. In order for an iRule to be functional, it needs to specify the event it is associated with. Without the event declaration, the iRule will not be triggered and will not perform any actions.

Submit
77. Which Cookie Persistence Mode is typically preferred when the web server application does not already use cookies?

Explanation

Insert Mode is typically preferred when the web server application does not already use cookies. In Insert Mode, the load balancer inserts a cookie into the HTTP response sent to the client. This cookie contains information about the server to which the client should be directed for subsequent requests. This allows the load balancer to maintain session persistence by directing the client to the same server for each subsequent request. This mode is useful when the web server application does not have built-in support for cookies and requires the load balancer to handle the persistence mechanism.

Submit
78. Place the following objects in the order in which they should be configured

Explanation

The correct order of configuration is to first set up the Web Admin Password, as it is necessary for accessing and managing the virtual server and pool. Then, the pool and its members should be configured, as they are the resources that will be utilized by the virtual server. Finally, the virtual server should be configured, as it will be the endpoint for incoming requests and will rely on the pool and its members for handling those requests.

Submit
79. The configuration synchronization can only be initiated from the Active system

Explanation

The configuration synchronization can be initiated from both the Active system and the Passive system. In a high availability setup, the Active system is responsible for making changes to the configuration, while the Passive system synchronizes these changes automatically. However, if needed, the Passive system can also initiate the synchronization process to ensure that both systems have the same configuration. Therefore, the given statement is false.

Submit
80. Which would best describe the Observed Load Balancing Method?

Explanation

The observed load balancing method is based on dynamic ratios that are set according to the number of open dynamic counts. This means that the load balancing algorithm dynamically adjusts the distribution of requests based on the current number of open connections. As the number of open connections changes, the load balancing ratios are updated to ensure that the workload is evenly distributed across all available servers. This method allows for efficient utilization of resources and helps to prevent overloading of any particular server.

Submit
81. If BIG-IP only allows client traffic for open existing TCP connections, what it it's administrative state?

Explanation

The administrative state of BIG-IP is "Forced Offline" because it only allows client traffic for open existing TCP connections. This means that it will not accept any new TCP connections and will only handle traffic for connections that are already established. This state is typically used when there is a need to take the system offline for maintenance or troubleshooting purposes.

Submit
82. Which is the correct order for the synchronization process?

Explanation

The correct order for the synchronization process is as follows: first, a UCS file of the desired configuration is created. Then, the UCS file is sent to the peer system. Next, the peer system creates a backup of its configuration prior to synchronization. Finally, the peer hostname is compared against the hostname in the UCS, and if they are different, only the shared configuration is restored, not the full configuration.

Submit
83. If an iRule does not cover all conditions, some conditions could be dropped. The recommended approach for preventing this from happening is to configure BIG-IP to have a default Pool. This is preferable to coding all conditions within the iRule itself.

Explanation

The statement suggests that if an iRule does not cover all conditions, some conditions could be dropped. However, the correct answer is false because the recommended approach for preventing this from happening is not to configure BIG-IP to have a default Pool, but rather to code all conditions within the iRule itself.

Submit
84. Where can you place white space in an iRule?

Explanation

In an iRule, white spaces can be placed within a line of code between items to improve readability and make the code easier to understand. White spaces can also be placed at the beginning of a line of code to add indentation and improve the structure of the code.

Submit
85. A Redundant Pair is typically configured during the initial setup of                       

Explanation

A Redundant Pair is typically configured in each BIG-IP LTM system. This means that in a BIG-IP LTM system, both the Active and Standby systems are configured as a redundant pair. This configuration ensures high availability and failover capabilities, where if one system fails, the other system takes over seamlessly to minimize downtime and ensure continuous operation of the BIG-IP LTM system.

Submit
86. Which of the following do you have to create before creating your iRule?

Explanation

Before creating an iRule, you need to create any pool that will be referenced in the iRule you are creating. This is because the iRule may contain commands or actions that require the use of a pool. By creating the pool first, you ensure that it is available and can be referenced in the iRule when it is created. The order in which you create the pools, Virtual Servers, and iRules does not matter, but the referenced pool(s) must be created before creating the iRule.

Submit
87. Both Persistence and Connection Mirroring are configured in the Virtual Server settings

Explanation

Persistence and Connection Mirroring are two separate features in a virtual server configuration. Persistence refers to the ability of a server to remember client requests and direct subsequent requests from the same client to the same server. Connection Mirroring, on the other hand, is a feature that allows for the duplication of connections to multiple servers, providing redundancy and failover capabilities. Since the statement suggests that both Persistence and Connection Mirroring are configured in the Virtual Server settings, it is incorrect.

Submit
88. Which of the following can be configured on a Source Address Persistence Profile?

Explanation

A Source Address Persistence Profile is used to maintain persistence for a client's requests based on the source IP address. The "Mask" option allows for configuring a subnet mask to determine the range of IP addresses that should be considered for persistence. The "Timeout" option allows for setting a time limit for how long the persistence should be maintained. Therefore, both "Mask" and "Timeout" can be configured on a Source Address Persistence Profile. The other options, such as "Statistics", "IP Address of the Pool Member", and "IP Address of the client" are not applicable for configuring a Source Address Persistence Profile.

Submit
89. If the interval is set at 5 seconds and the timeout is 16 seconds then if there are no positive responses, 4 monitor checks will have been issued before the timeout value is reached.

Explanation

If the interval is set at 5 seconds and the timeout is 16 seconds, it means that the system will check for a positive response every 5 seconds. Since the timeout is set at 16 seconds, it means that if there are no positive responses within this time frame, the timeout value will be reached. Therefore, if there are no positive responses, it would take 4 monitor checks (4 x 5 seconds = 20 seconds) before the timeout value of 16 seconds is reached. Hence, the statement is true.

Submit
90. Specify which tool or utility to use for the following task:

Configure IP Address of BIG-IP MGMT port (assuming new out of box)

Explanation

The correct answer is "command line config script" because configuring the IP address of the BIG-IP MGMT port requires accessing the command line interface of the device. Using a command line config script allows for more advanced configuration options and provides greater flexibility compared to other tools or utilities listed. It enables the user to directly input commands and configure the IP address of the BIG-IP MGMT port according to their specific requirements.

Submit
91. Which of the following are the primary four components of an iRule?

Explanation

The primary four components of an iRule are the iRule name, action declaration, event declaration, and conditional declaration. The iRule name is used to identify the iRule. The action declaration specifies the actions to be performed when the iRule is triggered. The event declaration defines the events that will trigger the iRule. The conditional declaration determines when the actions specified in the iRule will be executed based on certain conditions.

Submit
92. The following Monitor type matches which example or attribute:

Service Check

Explanation

The correct answer is TCP Half Open. This is because TCP Half Open is a specific type of service check that matches the given example or attribute. The other options, such as IP Address only, HTTP GET/ with receive rule match, and FTP with username, password, and filename, do not match the given example or attribute.

Submit
93. A Profile is used for? (Check all that apply.)

Explanation

A profile is used to define the traffic behavior of a virtual server and to terminate a client SSL session on the BIG-IP rather than the pool members. Profiles allow for customization and configuration of specific features and functionalities for a virtual server, such as load balancing algorithms, SSL termination, and traffic management policies. By defining the traffic behavior and SSL termination on the BIG-IP, the load can be balanced efficiently and securely without burdening the pool members with these tasks.

Submit
94. Which of the following are recommended ways to create an iRule?

Explanation

The recommended ways to create an iRule are using the BIG-IP Configuration Utility, Notepad, and the iRule Editor. The BIG-IP Configuration Utility is a web-based interface provided by BIG-IP devices for managing their configuration. Notepad is a simple text editor that can be used to create and edit iRules. The iRule Editor is a specialized tool specifically designed for creating and managing iRules. Using any of these editors will work fine for creating an iRule. MS Word is not recommended as it is not a suitable editor for creating iRules.

Submit
95. Which items below can a Monitor be assigned to? (Check all that apply.)

Explanation

A monitor can be assigned to a pool, node, and pool member. A monitor is used to check the health and availability of a resource. By assigning a monitor to a pool, it ensures that the pool only includes healthy members. Similarly, by assigning a monitor to a node, it ensures that the node is healthy and available to handle traffic. Lastly, a monitor can also be assigned to a pool member to specifically check the health of that member.

Submit
96. Which provisioning level would you use for the following:

Use minimum functional resources and distribute the additional resources (if available) to the module

Explanation

The provisioning level that would be suitable for the given scenario is "Nominal." This level allows for the use of minimum functional resources while also distributing any additional resources to the module if they are available. It strikes a balance between using the minimum necessary resources and utilizing any extra resources effectively.

Submit
97. Select the correct order for Profile configuration.

Explanation

The correct order for Profile configuration is to first click Create for the appropriate Profile type. Then, customize the appropriate settings for the Profile. After that, assign any dependent Profiles to the Virtual Server. Finally, assign the new Profile to the Virtual Server. This order ensures that the Profile is created and configured correctly before being assigned to the Virtual Server, and any dependencies are properly accounted for.

Submit
98. What will be the state of the Virtual Server under the following scenario:

The first Pool Member is offline, the second Pool Members Node is offline, and the third Pool Member has reached its connection limit.

Explanation

The state of the Virtual Server will be Offline (red diamond) because the first Pool Member is offline, the second Pool Member's node is offline, and the third Pool Member has reached its connection limit. This means that none of the Pool Members are available to handle traffic, resulting in the Virtual Server being offline.

Submit
99. In the Setup Utility Basic Network Configuration, you can configure which of the following items? (Check all that apply.)

Explanation

In the Setup Utility Basic Network Configuration, you can configure the External VLAN and Internal VLAN. These settings allow you to define the virtual local area networks that the BIG-IP system will be connected to. By configuring the External VLAN, you can specify the network that will be used for external traffic, while the Internal VLAN allows you to define the network for internal traffic. This configuration is important for properly routing and managing network traffic within the BIG-IP system.

Submit
100. An administrator can administratively change the state of: (Choose 3)

Explanation

An administrator has the ability to change the state of Virtual Servers, Pool Members, and Nodes. This means they can modify the operational status or configuration settings of these components. By having administrative control over these entities, the administrator can effectively manage and control the behavior and functionality of the network infrastructure. However, they do not have the same level of control over Pools and Profiles, as these are typically managed at a higher level or by specialized roles within the network administration team.

Submit
101. During the licensing process, BIG-IP generates a dossier that contains: (Choose all that apply.)

Explanation

During the licensing process, BIG-IP generates a dossier that contains hardware information and a registration key. The hardware information is necessary for the licensing process as it helps identify the specific device and its capabilities. The registration key is a unique code provided by the licensing authority to activate and validate the license for the BIG-IP device. The other options, such as a license file, an IP address for BIG-IP, and login credentials, may be required for the overall setup and configuration of the device but are not specifically generated during the licensing process.

Submit
102. Why might a network packet not traverse BIG-IP and the return path correctly?

Explanation

The network packet might not traverse BIG-IP and the return path correctly if the pool members are not configured correctly, meaning that the packet is not being directed to the appropriate resources. Additionally, if the response packet is not directed back through BIG-IP, it will not follow the correct path. Furthermore, if no pool is configured for the virtual server or if there is no virtual server (listener) configured at all, the packet will not be able to traverse BIG-IP properly.

Submit
103. Assuming it was needed, which of the following protocols are more appropriate for Connection Mirroring? (Select all that apply)

Explanation

Connection mirroring involves creating a duplicate copy of a network connection to ensure redundancy and fault tolerance. The protocols that are more appropriate for connection mirroring are those that support reliable and secure data transfer. FTP (File Transfer Protocol), telnet, and SSH (Secure Shell) are all protocols that provide secure and reliable data transfer, making them suitable for connection mirroring. On the other hand, DNS (Domain Name System) and HTTP (Hypertext Transfer Protocol) are not designed for connection mirroring purposes as they primarily focus on domain name resolution and web browsing respectively.

Submit
104. Which of the following statements are true about MAC Masquerading? (Select all that apply)

Explanation

The same MAC Address should be configured on both systems: This statement is true because in MAC masquerading, both systems should have the same MAC address configured in order to hide the original MAC address.

MAC Masquerading needs to be configured on each system: This statement is true because MAC masquerading should be configured on each system involved in the network communication to ensure the masquerading process is implemented correctly.

MAC Masquerading is useful when you are worried about ARP cache refresh: This statement is true because MAC masquerading helps in preventing ARP cache refresh issues by hiding the original MAC address and using a masquerade address instead.

Submit
105. Which statements are true concerning Persistence? (Choose all that apply)

Explanation

Persistence is a feature that is configured on the Pool, not the Virtual Server. It allows for maintaining session information for a client across multiple requests, which is particularly useful for applications that require stateful connections. By configuring Persistence, applications can ensure that client requests are consistently directed to the same server, which can improve performance and maintain session integrity. Therefore, the statement "Applications are the reason for configuring Persistence" is true. Additionally, Persistence does change the load balancing behavior of a Virtual Server by directing client traffic to the same server based on the configured Persistence method. Thus, the statement "Persistence changes the load balancing behavior of a Virtual Server" is also true.

Submit
106. Select the additional settings that are required when configuring a Redundant Pair. (Select all that apply)

Explanation

When configuring a Redundant Pair, there are several additional settings that are required. The Failover Peer setting is necessary to establish communication between the two redundant units, allowing them to monitor each other's status and initiate failover if needed. The Unit ID setting is used to uniquely identify each unit in the pair. The Floating IP Address is required to provide a single virtual IP address that can be used to access the redundant pair, regardless of which unit is currently active. These settings ensure that the redundant pair functions properly and can seamlessly switch between units in case of failure.

Submit
107. Which of the following statements are true about NATs?

Explanation

NATs support bi-directional traffic, meaning that they can handle traffic going to the NAT Address or coming from the Origin Address. They are created in the Web Configuration Utility by first selecting the SNATs tab, then NATs within the Local Traffic section. Additionally, there is no Port configuration option for NATs, indicating that port configuration is not available for NATs.

Submit
108. Which of the following statements about VLAN Failsafe are true? (Select all that apply)

Explanation

VLAN Failsafe Actions include Failover: This statement is true because VLAN Failsafe allows for automatic failover in the event of a network failure.

You can set a Timeout value for VLAN Failsafe: This statement is true because administrators have the ability to set a specific timeout value for VLAN Failsafe, which determines how long the system waits before activating the failover action.

VLAN Failsafe can be enabled on any VLAN: This statement is true because VLAN Failsafe can be configured and enabled on any virtual LAN, providing network redundancy and failover capabilities regardless of the specific VLAN.

Submit
109. Which of the following statements are true? (Check all that apply)

Explanation

The first statement is true because when using a redundant pair, the SSL certificates and keys can be installed on the second system by synchronizing them from the first system. The second statement is false because a Server SSL Profile does not require an SSL certificate for creation. The third statement is true because self-signed certificates are generally recommended for internal use only. The fourth statement is true because a Client SSL Profile does require an SSL certificate for creation.

Submit
110. Your company has a requirement for application traffic to be encrypted from the client to BIG-IP, but BIG-IP must be able to examine the data unencrypted. Which of the following Profiles are required to ensure this functionality? (Select all the apply)

Explanation

To ensure that application traffic is encrypted from the client to BIG-IP while still allowing BIG-IP to examine the data unencrypted, two profiles are required. The TCP Profile is necessary to handle the TCP traffic and ensure proper communication between the client and BIG-IP. The Client SSL Profile is needed to encrypt the traffic from the client to BIG-IP, allowing for secure communication.

Submit
111. Which of the following are advantages to using client-side SSL Termination on BIG-IP? Select all that apply.

Explanation

Client-side SSL termination on BIG-IP offers several advantages. Firstly, it enables BIG-IP to perform HTTP cookie persistence and apply iRules, allowing for advanced traffic management and customization. Secondly, it simplifies certificate management by centralizing SSL certificates on BIG-IP rather than on individual servers. Thirdly, server performance is enhanced as the SSL decryption and encryption processes are offloaded to BIG-IP, reducing the workload on the servers. Lastly, pool members do not require SSL Accelerator cards, saving costs and simplifying the infrastructure. Overall, these advantages make client-side SSL termination a beneficial choice for organizations using BIG-IP.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 13, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 13, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 01, 2010
    Quiz Created by
    Formula5
Cancel
  • All
    All (111)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
BIG-IP Local Traffic Manager works with Web applications only.
A Virtual Server typically contains:
The default IP address for the BIG-IP management port is...
If you are concerned about encryption between BIG-IP and the Pool...
IRules can contain only one event
What will be the state of the Virtual Server under the following...
Typically, a redundant pairs of BIG-IPs should be configured with a...
If BIG-IP allows client traffic for new connections, persistent...
Both SNAT and Virtual Server processing can occur on a packet as it...
SCCP is the BIG-IP operating system responsible for processing client...
One advantage of Profiles is their settings cab be applied across...
Do you think it is important to write your iRules as efficiently as...
Specify which tool or utility to use for the following task:License...
Which menu option would you go to if you want to back up your BIG-IP...
The following description matches which Pool Member status:Monitor...
Network Failover is not configured by default
Which would best describe the Least Connections Load...
What will be the state of the Virtual Server under the following...
Pool members typically contain:
If your iRule contains multiple conditional statements, you can put...
What will be the state of the Virtual Server under the following...
You should never use the default Server SSL Profile without adding...
Select the correct order for the upgrade process for a Redundant Pair
Which would best describe the Round Robin Load Balancing Method?
If the status of a Node is offline, then all Pool Members at that IP...
The following description matches which Pool Member status:Monitor...
If you're going to configure Cookie Persistence, which other two...
Both NATs and SNATs can be configured for a specific port
The Virtual Server process never translates the Port.
Custom Profiles are stored in the /config/bigip.conf file?
Source Address Persistence can be effectively used with an HTTPS...
Which would best describe the Ratio Load Balancing Method?
The following description matches which Pool Member status:Monitor...
Which of the following keystrokes launches the configuration menu for...
In a Redundant Pair setup, the IP Address of Failover Peer should be:
For the initiation packet, a SNAT changes the source address while the...
You are travelling on a plane for business. You've finally figured out...
Which of the following types of Persistence does not need to be...
Select the reasons for BIG-IP LTM systems to be deployed as an...
Which menu option would you go to if you want to configure network...
Which provisioning level would you use for the following:Only one...
Which of the following are not dependent on Profiles?
When using the automatic licensing method, you must still...
Which of the following methods can you use for accessing the BIG-IP...
Select the dynamic Load Balancing Modes from the list below:
A BIG-IP Virtual Server can terminate client SSL sessions, thus...
According to the RFCs, SNAT stands for Source Network Address...
Following are the steps that occur when using the manual method to...
Ratio member Load Balancing is selected and the ratios for Servers A,...
Select the correct order these steps occur during the...
A node contains:
Network Failover uses the same TCP Port 443 used for Synchronizing the...
All Administrative...
The following description matches which Pool Member status:No monitor...
Rule IP_Address when CLIENT_ACCEPTED {  if...
When the floating IP Address is used to log into a Redundant Pair,...
The command to display the BIG-IP High Availability table is:b ha...
Mirroring data is passed using the same TCP Port 443 that is used to...
Which provisioning level would you use for the following:Allocate no...
Which of the following options are valid resource levels you can...
What is the default Administrative State?
In a Redundant Pair setup, the Floating IP Address should be:
The BIG-IP command line "config" script and the BIG-IP Web...
F5 recommends a timeout value that is 2 times the interval plus 1...
NATs can be used to map many IP Addresses to one NAT Address
The BIG-IP LTM system that is designated with Unit ID 1 is considered...
Which of the following can trigger the failover process on BIG-IP?...
If BIG-IP allows client traffic for persistent sessions and open...
Which of the following statements are true? (Choose all that apply)
A Persistence Profile can be associated to a:
Which provisioning level would you use for the following:Use minimum...
What is wrong with the following iRule?rule IP_Address { when...
The following Monitor type matches which example or attribute:Content...
The hardware failover cable and Network Failover must not be used...
Specify the order in which the primary setup tasks must be completed.
What is syntactically wrong with the following iRule:rule IP_Address...
Which Cookie Persistence Mode is typically preferred when the web...
Place the following objects in the order in which they should be...
The configuration synchronization can only be initiated from the...
Which would best describe the Observed Load Balancing Method?
If BIG-IP only allows client traffic for open existing TCP...
Which is the correct order for the synchronization process?
If an iRule does not cover all conditions, some conditions could be...
Where can you place white space in an iRule?
A Redundant Pair is typically configured during the initial setup...
Which of the following do you have to create before creating your...
Both Persistence and Connection Mirroring are configured in the...
Which of the following can be configured on a Source Address...
If the interval is set at 5 seconds and the timeout is 16 seconds then...
Specify which tool or utility to use for the following task:Configure...
Which of the following are the primary four components of an iRule?
The following Monitor type matches which example or attribute:Service...
A Profile is used for? (Check all that apply.)
Which of the following are recommended ways to create an iRule?
Which items below can a Monitor be assigned to? (Check all that...
Which provisioning level would you use for the following:Use minimum...
Select the correct order for Profile configuration.
What will be the state of the Virtual Server under the following...
In the Setup Utility Basic Network Configuration, you can configure...
An administrator can administratively change the state of: (Choose 3)
During the licensing process, BIG-IP generates a dossier that...
Why might a network packet not traverse BIG-IP and the return path...
Assuming it was needed, which of the following protocols are more...
Which of the following statements are true about MAC Masquerading?...
Which statements are true concerning Persistence? (Choose all that...
Select the additional settings that are required when configuring a...
Which of the following statements are true about NATs?
Which of the following statements about VLAN Failsafe are true?...
Which of the following statements are true? (Check all that apply)
Your company has a requirement for application traffic to be encrypted...
Which of the following are advantages to using client-side SSL...
Alert!

Advertisement