Ltm

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By F5LTM
F
F5LTM
Community Contributor
Quizzes Created: 1 | Total Attempts: 870
| Attempts: 870
SettingsSettings
Please wait...
  • 1/93 Questions

    Which must be sent to the license server to generate a new license?

    • The system's dossier
    • The system's host name
    • The system's base license
    • The system's purchase order number
Please wait...
About This Quiz

This LTM quiz assesses knowledge on load balancing within BIG-IP systems, covering SSL profiles, virtual server configurations, and NAT processing. It is designed for individuals looking to enhance their understanding of network traffic management and system upgrades in professional environments.

Ltm - Quiz

Quiz Preview

  • 2. 

    How is persistence configured?

    • Persistence is an option within each pool's definition.

    • Persistence is a profile type; an appropriate profile is created and associated with virtual server.

    • Persistence is a global setting; once enabled, load-balancing choices are superceded by the persistence method that is specified.

    • Persistence is an option for each pool member. When a pool is defined, each member's definition includes the option for persistence.

    Correct Answer
    A. Persistence is a profile type; an appropriate profile is created and associated with virtual server.
  • 3. 

    The current status of a given pool member is unknown. Which condition could explain that state?

    • The member has no monitor assigned to it.

    • The member has a monitor assigned to it and the most recent monitor was successful.

    • The member has a monitor assigned to it and the monitor did not succeed during the most recent timeout period.

    • The member's node has a monitor assigned to it and the monitor did not succeed during the most recent timeout period.

    Correct Answer
    A. The member has no monitor assigned to it.
    Explanation
    The correct answer is that the member has no monitor assigned to it. This means that there is no mechanism in place to check the status or availability of the member. Without a monitor, the system is unable to determine if the member is functioning properly or not.

    Rate this question:

  • 4. 

    Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server?

    • Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.

    • Terminating SSL at the BIG-IP eliminates all un-encrypted traffic from the internal network.

    • Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.

    • Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.

    Correct Answer
    A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
    Explanation
    Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers, which can offload the processing burden from the web servers and improve their performance. This can also free up server resources for other tasks and reduce the overall load on the servers. Additionally, terminating SSL at the BIG-IP allows for centralized management and configuration of SSL certificates, making it easier to maintain and update them.

    Rate this question:

  • 5. 

    How is persistence configured?

    • Persistence is an option within each pool's definition.

    • Persistence is a profile type; an appropriate profile is created and associated with virtual server.

    • Persistence is a global setting; once enabled, load-balancing choices are superceded by the persistence method that is specified.

    • Persistence is an option for each pool member. When a pool is defined, each member's definition includes the option for persistence.

    Correct Answer
    A. Persistence is a profile type; an appropriate profile is created and associated with virtual server.
  • 6. 

    You have a pool of servers that need to be tested. All of the servers but one should be tested every 10 seconds, but one is slower and should only be tested every 20 seconds. How do you proceed?

    • It cannot be done. All monitors test every five seconds.

    • It can be done, but will require assigning monitors to each pool member.

    • It cannot be done. All of the members of a pool must be tested at the same frequency.

    • It can be done by assigning one monitor to the pool and a different monitor to the slower pool member.

    Correct Answer
    A. It can be done by assigning one monitor to the pool and a different monitor to the slower pool member.
    Explanation
    To test the pool of servers with different frequencies, one monitor can be assigned to the pool to test all servers every 10 seconds, and a separate monitor can be assigned specifically to the slower server to test it every 20 seconds. This way, the majority of servers will be tested every 10 seconds, while the slower server will be tested every 20 seconds.

    Rate this question:

  • 7. 

    In the F5 Local Traffic Manager (LTM), which of the following features allows for the translation of client IP addresses to ensure proper routing and access control?

    • Load Balancing

    • SSL Offloading

    • SNAT (Secure Network Address Translation)

    • IRules

    Correct Answer
    A. SNAT (Secure Network Address Translation)
    Explanation
    SNAT (Secure Network Address Translation) in the F5 Local Traffic Manager (LTM) allows for the translation of client IP addresses to a different IP address, ensuring proper routing and access control. This feature is essential for managing connections and maintaining network security, especially in environments where direct routing of client IP addresses may not be feasible or secure.

    Rate this question:

  • 8. 

    Under what condition must an appliance license be reactivated?

    • Licenses only have to be reactivated for RMAs - no other situations.

    • Licenses generally have to be reactivated during system software upgrades.

    • Licenses only have to be reactivated when new features are added (IPv6, Routing Modules, etc) - no other situations.

    • Never. Licenses are permanent for the platform regardless the version of software installed.

    Correct Answer
    A. Licenses generally have to be reactivated during system software upgrades.
  • 9. 

    When upgrading a BIG-IP redundant pair, what happens when one system has been updated but the other has not?

    • Synching should not be performed

    • The first system to be updated will assume the Active role

    • This is not possible since both systems are updated simultaneously

    • The older system will issue SNMP traps indicating a communication error with the partner

    Correct Answer
    A. Synching should not be performed
    Explanation
    When upgrading a BIG-IP redundant pair, if one system has been updated but the other has not, synching should not be performed. This is because the systems are not in the same state and attempting to sync them could result in errors or inconsistencies. It is important to ensure that both systems are updated before performing any synchronization to maintain a stable and reliable configuration.

    Rate this question:

  • 10. 

    If a client's browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence?

    • The connection request is not processed

    • The connection request is sent to an apology server

    • The connection request is load-balanced to an available pool member

    • The connection request is refused and the client is sent a "server not available" message

    Correct Answer
    A. The connection request is load-balanced to an available pool member
    Explanation
    When a client's browser does not accept cookies, the virtual server will still be able to load-balance the connection request to an available pool member. This means that the client's request will be directed to one of the servers in the pool that is currently able to handle the request. This allows the client to establish a connection and receive a response from the server, even without the use of cookies.

    Rate this question:

  • 11. 

    When can a single virtual server be associated with multiple profiles?

    • Never. Each virtual server has a maximum of one profile.

    • Often. Profiles work on different layers and combining profiles is common.

    • Rarely. One combination, using both the TCP and HTTP profile does occur, but it is the exception.

    • Unlimited. Profiles can work together in any combination to ensure that all traffic types are supported in a given virtual server.

    Correct Answer
    A. Often. Profiles work on different layers and combining profiles is common.
    Explanation
    A single virtual server can be associated with multiple profiles because profiles work on different layers and combining profiles is a common practice. This allows for more flexibility and customization in managing and optimizing traffic on the virtual server.

    Rate this question:

  • 12. 

    Which tool captures a BIG-IP's configuration and logs?

    • Askf5

    • Qkview

    • Bigtop

    • Tcpdump

    Correct Answer
    A. Qkview
    Explanation
    The tool that captures a BIG-IP's configuration and logs is qkview.

    Rate this question:

  • 13. 

    Monitors can be assigned to which three resources? (Choose three.)

    • NATs

    • Pools

    • IRules

    • Nodes

    • SNATs

    • Pool members

    • Virtual servers

    Correct Answer(s)
    A. Pools
    A. Nodes
    A. Pool members
    Explanation
    Monitors can be assigned to pools, nodes, and pool members. Monitors are used to check the health and availability of resources in a network. By assigning monitors to pools, nodes, and pool members, network administrators can ensure that these resources are functioning properly and able to handle incoming requests. This allows for better management and optimization of network resources.

    Rate this question:

  • 14. 

    You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2?

    • All changes to TEST1 are propagated to TEST2

    • Some of the changes to TEST1 may propagate to TEST2

    • Changes to TEST1 cannot affect TEST2 once TEST2 is saved

    • When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes to TEST2

    Correct Answer
    A. Some of the changes to TEST1 may propagate to TEST2
    Explanation
    When additional changes are made to the parent profile TEST1, some of those changes may also be applied to the custom profile TEST2. However, not all changes made to TEST1 will necessarily affect TEST2.

    Rate this question:

  • 15. 

    When BIG-IP administrators are authenticating remotely, which two parameters are configured on the remote authentication system? (Choose two.)

    • UserID

    • Password

    • Administrator Role

    • Valid Access Times

    Correct Answer(s)
    A. UserID
    A. Password
    Explanation
    When BIG-IP administrators are authenticating remotely, the remote authentication system needs to be configured with the UserID and Password parameters. These parameters are necessary to verify the identity of the administrators and ensure that only authorized individuals are granted access to the system. The UserID is used to identify the specific user, while the Password is used to authenticate and verify their credentials. By configuring these parameters on the remote authentication system, administrators can securely access the BIG-IP system remotely.

    Rate this question:

  • 16. 

    Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in a redundant pair configuration?

    • Bandwidth utilization

    • Duplicate IP address

    • CPU utilization percentage

    • VLAN communication ability

    Correct Answer
    A. VLAN communication ability
    Explanation
    The correct answer is VLAN communication ability. In a redundant pair configuration, the BIG-IP system can monitor the VLAN communication ability as a fail-over trigger. If the VLAN communication fails, it indicates a problem with the network connectivity, and the BIG-IP system can initiate fail-over to the redundant pair to ensure continuous availability of the system.

    Rate this question:

  • 17. 

    The current status of a given pool is offline (red). Which condition could explain that state? Assume the descriptions below include all monitors assigned for each scenario.

    • No monitors are currently assigned to any pool, member or node.

    • The pool has a monitor assigned to it, and none of the pools members passed the test.

    • The pool has a monitor assigned to it, and only some of the pool's members passed the test.

    • A monitor is assigned to all nodes and all nodes have passed the test. The pool's members have no specific monitor assigned to them.

    Correct Answer
    A. The pool has a monitor assigned to it, and none of the pools members passed the test.
    Explanation
    The current status of the pool being offline (red) suggests that the pool has a monitor assigned to it, but none of the pool's members have passed the test. This means that the monitor is actively checking the health of the pool's members, but none of them meet the required criteria to be considered as online. Therefore, the pool remains in an offline state.

    Rate this question:

  • 18. 

    Assume a virtual server is configured with a ClientSSL profile. What would the result be if the virtual server's destination port were not 443?

    • SSL termination could not be performed if the virtual server's port was not port 443.

    • Virtual servers with a ClientSSL profile are always configured with a destination port of 443.

    • As long as client traffic was directed to the alternate port, the virtual server would work as intended.

    • Since the virtual server is associated with a ClientSSL profile, it will always process traffic sent to port 443.

    Correct Answer
    A. As long as client traffic was directed to the alternate port, the virtual server would work as intended.
    Explanation
    The correct answer states that if the virtual server's destination port is not 443, as long as the client traffic is directed to the alternate port, the virtual server would still work as intended. This implies that SSL termination can still be performed on a different port other than 443 if the necessary configurations are in place.

    Rate this question:

  • 19. 

    When initially configuring the BIG-IP system using the config utility, which two parameters can be set? (Choose two.)

    • The netmask of the SCCP

    • The IP address of the SCCP

    • The port lockdown settings for the SCCP

    • The netmask of the host via the management port

    • The IP address of the host via the management port

    • The port lockdown settings for the host via the management port

    Correct Answer(s)
    A. The netmask of the host via the management port
    A. The IP address of the host via the management port
    Explanation
    The correct answer is the netmask of the host via the management port and the IP address of the host via the management port. When initially configuring the BIG-IP system using the config utility, these two parameters can be set to define the network configuration for the management port. The netmask determines the size of the network and the IP address is used to identify the host within that network.

    Rate this question:

  • 20. 

    Which cookie persistence method requires the fewest configuration changes on the web servers to be implemented correctly?

    • Insert

    • Rewrite

    • Passive

    • Session

    Correct Answer
    A. Insert
    Explanation
    The cookie persistence method that requires the fewest configuration changes on the web servers to be implemented correctly is "Insert". This method involves inserting a cookie into the response from the server to the client, which is then sent back to the server with subsequent requests. This method does not require any additional rewriting or manipulation of the cookie, making it the simplest option to implement.

    Rate this question:

  • 21. 

    A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it: when HTTP_REQUEST {if {[HTTP::uri] ends_with "txt" } {pool pool1}elseif {[HTTP::uri] ends_with "php" } {pool pool2}}If a user connects to http://10.10.1.100/foo.html, which pool will receive the request?

    • Pool1

    • Pool2

    • None. The request will be dropped.

    • Unknown. The pool cannot be determined from the information provided.

    Correct Answer
    A. Unknown. The pool cannot be determined from the information provided.
    Explanation
    The iRule associated with the virtual server checks if the URI of the HTTP request ends with "txt" or "php". However, in the given scenario, the URI is "/foo.html" which does not end with either "txt" or "php". Therefore, the iRule conditions will not be met, and neither pool1 nor pool2 will be selected. Hence, it is not possible to determine which pool will receive the request based on the information provided.

    Rate this question:

  • 22. 

    Where is connection mirroring configured?

    • It an option within a TCP profile.

    • It is an optional feature of each pool.

    • It is not configured; it is default behavior.

    • It is an optional feature of each virtual server.

    Correct Answer
    A. It is an optional feature of each virtual server.
    Explanation
    Connection mirroring is an optional feature that can be configured on each virtual server. This means that administrators have the choice to enable or disable connection mirroring for each virtual server based on their specific requirements.

    Rate this question:

  • 23. 

    A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it: when HTTP_REQUEST { if { [HTTP::header User-Agent] contains "MSIE" } { pool MSIE_pool } else { pool Mozilla_pool } } If a user connects to http://10.10.1.100/foo.html and their browser does not specify a User-Agent, which pool will receive the request?

    • MSIE_pool

    • Mozilla_pool

    • None. The request will be dropped.

    • Unknown. The pool cannot be determined from the information provided.

    Correct Answer
    A. Mozilla_pool
    Explanation
    If a user connects to http://10.10.1.100/foo.html and their browser does not specify a User-Agent, the request will be directed to the Mozilla_pool. This is because the iRule checks if the User-Agent header contains "MSIE". If it does not contain "MSIE" (which is the case when the User-Agent is not specified), the request will be directed to the Mozilla_pool.

    Rate this question:

  • 24. 

    Where is the load-balancing mode specified?

    • Within the pool definition

    • Within the node definition

    • Within the virtual server definition

    • Within the pool member definition

    Correct Answer
    A. Within the pool definition
    Explanation
    The load-balancing mode is specified within the pool definition. This means that when configuring a pool, the load-balancing mode can be set to determine how traffic will be distributed among the pool members. The load-balancing mode determines the algorithm or method used to distribute the traffic, such as round-robin, least connections, or IP hash. By specifying the load-balancing mode within the pool definition, it allows for centralized control and configuration of how traffic is balanced across the pool members.

    Rate this question:

  • 25. 

    Which statement is true concerning the default communication between a redundant pair of BIGIP devices?

    • Communication between the systems cannot be effected by port lockdown settings.

    • Data for both connection and persistence mirroring are shared through the same TCP connection.

    • Regardless of the configuration, some data is communicated between the systems at regular intervals.

    • Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled.

    Correct Answer
    A. Data for both connection and persistence mirroring are shared through the same TCP connection.
    Explanation
    The statement that is true concerning the default communication between a redundant pair of BIGIP devices is that data for both connection and persistence mirroring are shared through the same TCP connection. This means that both connection and persistence mirroring data are transmitted over the same TCP connection, allowing for efficient and synchronized communication between the redundant devices.

    Rate this question:

  • 26. 

    A site is load balancing to a pool of web servers. Which statement is true concerning BIG-IP's ability to verify whether the web servers are functioning properly or not?

    • Web server monitors can test the content of any page on the server.

    • Web server monitors always verify the contents of the index.html page.

    • Web server monitors can test whether the server's address is reachable, but cannot test a page's content.

    • Web server monitors can test the content of static web pages, but cannot test pages that would require the web server to dynamically build content.

    Correct Answer
    A. Web server monitors can test the content of any page on the server.
    Explanation
    The correct answer is that web server monitors can test the content of any page on the server. This means that the BIG-IP system is capable of checking the content of any page on the web servers to ensure that they are functioning properly. This allows for comprehensive monitoring and verification of the server's performance and functionality.

    Rate this question:

  • 27. 

    Which event is always triggered when the client sends data to a virtual server using TCP?

    • HTTP_DATA

    • CLIENT_DATA

    • HTTP_REQUEST

    • VS_CONNECTED

    Correct Answer
    A. CLIENT_DATA
    Explanation
    The correct answer is CLIENT_DATA because this event is always triggered when the client sends data to a virtual server using TCP. This event is specifically designed to handle incoming data from the client and allows the server to process and respond to the data accordingly.

    Rate this question:

  • 28. 

    Which action will take place when a failover trigger is detected by the active system?

    • The active device will take the action specified for the failure.

    • The standby device also detects the failure and assumes the active role.

    • The active device will wait for all connections to terminate and then fail-over.

    • The standby device will begin processing virtual servers that have failed, but the active device will continue servicing the functional virtual servers.

    Correct Answer
    A. The active device will take the action specified for the failure.
    Explanation
    When a failover trigger is detected by the active system, it will take the action specified for the failure. This means that the active device will initiate the necessary steps to address the failure and mitigate its impact. It may involve switching to a backup system, redirecting traffic, or implementing other measures to ensure service continuity. The standby device will also detect the failure and assume the active role, but the active device will be responsible for initiating the appropriate actions.

    Rate this question:

  • 29. 

    Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)

    • Synchronization occurs via a TCP connection using ports 683 and 684.

    • Connection mirroring data is shared via a TCP connection using port 1028.

    • Persistence mirroring data is shared via a TCP connection using port 1028.

    • Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled.

    Correct Answer(s)
    A. Connection mirroring data is shared via a TCP connection using port 1028.
    A. Persistence mirroring data is shared via a TCP connection using port 1028.
    Explanation
    The first statement is true because synchronization between redundant BIG-IP systems does occur via a TCP connection using ports 683 and 684. The second statement is also true because connection mirroring data is indeed shared between the systems via a TCP connection using port 1028. Persistence mirroring data, however, is not shared through this connection, so the third statement is false. The fourth statement is also false because connection mirroring data is not shared through the serial fail-over cable unless network fail-over is enabled.

    Rate this question:

  • 30. 

    What is the purpose of floating self-IP addresses?

    • To define an address that grants administrative access to either system at any time

    • To define an address that allows either system to initiate communication at any time

    • To define an address that allows network devices to route traffic via a single IP address

    • To define an address that gives network devices greater flexibility in choosing a path to forward traffic

    Correct Answer
    A. To define an address that allows network devices to route traffic via a single IP address
    Explanation
    Floating self-IP addresses are used to define an address that allows network devices to route traffic via a single IP address. This means that even if the primary IP address fails or becomes unavailable, the floating self-IP address can be used as a backup to ensure uninterrupted routing of traffic. By using a single IP address, network devices have greater flexibility in choosing the best path to forward traffic, improving efficiency and reliability in the network.

    Rate this question:

  • 31. 

    Which two methods can be used to determine which BIG-IP is currently active? (Choose two.)

    • The bigtop command displays the status.

    • Only the active system's configuration screens are active.

    • The status (Active/Standby) is embedded in the command prompt.

    • The ifconfig -a command displays the floating addresses on the active system.

    Correct Answer(s)
    A. The bigtop command displays the status.
    A. The status (Active/Standby) is embedded in the command prompt.
    Explanation
    The bigtop command can be used to display the status of the BIG-IP system, indicating which one is currently active. Additionally, the status (Active/Standby) is embedded in the command prompt, providing another method to determine the active BIG-IP system.

    Rate this question:

  • 32. 

    Which statement is true concerning SNATs using automap?

    • Only specified self-IP addresses are used as automap addresses.

    • SNATs using automap will translate all client addresses to an automap address.

    • A SNAT using automap will preferentially use a floating self-IP over a non-floating self-IP.

    • A SNAT using automap can be used to translate the source address of all outgoing traffic to the same address regardless of which VLAN the traffic is sent through.

    Correct Answer
    A. A SNAT using automap will preferentially use a floating self-IP over a non-floating self-IP.
    Explanation
    A SNAT using automap will preferentially use a floating self-IP over a non-floating self-IP. This means that if both a floating self-IP and a non-floating self-IP are available for translation, the SNAT will prioritize using the floating self-IP. This is because floating self-IPs are typically associated with high availability configurations and are preferred for translation to ensure uninterrupted service in case of a failover.

    Rate this question:

  • 33. 

    A site needs a virtual server that will use an iRule to parse HTTPS traffic based on HTTP header values. Which two profile types must be associated with such a virtual server? (Choose two.)

    • TCP

    • HTTP

    • HTTPS

    • ServerSSL

    Correct Answer(s)
    A. TCP
    A. HTTP
    Explanation
    To parse HTTPS traffic based on HTTP header values, the virtual server needs to have two profile types associated with it: TCP and HTTP. The TCP profile is necessary to handle the underlying TCP connection for the HTTPS traffic. The HTTP profile is needed to parse the HTTP headers and extract the required values for further processing. Together, these two profile types enable the virtual server to effectively handle and manipulate the HTTPS traffic based on the HTTP header values.

    Rate this question:

  • 34. 

    Which four methods are available for remote authentication of those who are allowed to administer a BIG-IP system through the Configuration Utility? (Choose four.)

    • LDAP

    • OCSP

    • RADIUS

    • TACACS+

    • Active Directory

    Correct Answer(s)
    A. LDAP
    A. RADIUS
    A. TACACS+
    A. Active Directory
    Explanation
    The four methods available for remote authentication of those who are allowed to administer a BIG-IP system through the Configuration Utility are LDAP, RADIUS, TACACS+, and Active Directory. LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and maintaining distributed directory information services. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that provides centralized authentication, authorization, and accounting services. Active Directory is a directory service developed by Microsoft for Windows domain networks.

    Rate this question:

  • 35. 

    Which statement is true concerning iRule events?

    • All iRule events relate to HTTP processes.

    • All client traffic has data that could be used to trigger iRule events.

    • All iRule events are appropriate at any point in the client-server communication.

    • If an iRule references an event that doesn't occur during the client's communication, the client's connection will be terminated prematurely.

    Correct Answer
    A. All client traffic has data that could be used to trigger iRule events.
    Explanation
    All client traffic has data that could be used to trigger iRule events. This means that iRule events can be triggered based on any data present in the client's traffic, regardless of the specific HTTP process being performed. It suggests that iRule events are not limited to a specific stage or phase of the client-server communication, and can be applied at any point. However, it does not imply that if an iRule references an event that doesn't occur during the client's communication, the client's connection will be terminated prematurely.

    Rate this question:

  • 36. 

    When configuring a Virtual Server to use an iRule with an HTTP_REQUEST event, which lists required steps in a proper order to create all necessary objects?

    • Create profiles, create the iRule, create required pools, create the Virtual Server

    • Create the Virtual Server, create required pools, create the iRule, edit the Virtual Server

    • Create a custom HTTP profile, create required pools, create the Virtual Server, create the iRule

    • Create required pools, create a custom HTTP profile, create the iRule, create the Virtual Server

    Correct Answer
    A. Create the Virtual Server, create required pools, create the iRule, edit the Virtual Server
  • 37. 

    A site has six members in a pool. All of the servers have been designed, built, and configured with the same applications. It is known that each client's interactions vary significantly and can affect the performance of the servers. If traffic should be sent to all members on a regular basis, which load-balancing mode is most effective if the goal is to maintain a relatively even load across all servers?

    • Ratio

    • Priority

    • Observed

    • Round Robin

    Correct Answer
    A. Observed
    Explanation
    The observed load-balancing mode is most effective in this scenario because it takes into account the varying client interactions and their impact on server performance. By observing the actual load on each server, this mode can distribute traffic in a way that maintains a relatively even load across all servers. This helps prevent any single server from being overloaded while others remain underutilized.

    Rate this question:

  • 38. 

    Which three statements describe a characteristic of profiles? (Choose three.)

    • Default profiles cannot be created or deleted.

    • Custom profiles are always based on a parent profile.

    • A profile can be a child of one profile and a parent of another.

    • All changes to parent profiles are propagated to their child profiles.

    • While most virtual servers have at least one profile associated with them, it is not required.

    Correct Answer(s)
    A. Default profiles cannot be created or deleted.
    A. Custom profiles are always based on a parent profile.
    A. A profile can be a child of one profile and a parent of another.
    Explanation
    Default profiles cannot be created or deleted: This statement is true because default profiles are pre-defined profiles that come with the system and cannot be modified or removed.

    Custom profiles are always based on a parent profile: This statement is true because custom profiles are created by copying an existing profile, which becomes the parent profile for the new custom profile.

    A profile can be a child of one profile and a parent of another: This statement is true because profiles can be organized in a hierarchical structure, where a profile can inherit settings from a parent profile and also have child profiles that inherit from it.

    All changes to parent profiles are propagated to their child profiles: This statement is false. Changes made to a parent profile do not automatically propagate to its child profiles. Each profile can have its own independent settings.

    While most virtual servers have at least one profile associated with them, it is not required: This statement is false. It is required for virtual servers to have at least one profile associated with them. Profiles define the settings and behavior of the virtual server.

    Rate this question:

  • 39. 

    When using the setup utility to configure a redundant pair, you are asked to provide a "Failover Peer IP". Which address is this?

    • An address of the other system in its management network

    • An address of the other system in a redundant pair configuration

    • An address on the current system used to listen for fail-over messages from the partner BIG-IP

    • An address on the current system used to initiate mirroring and network fail-over heartbeat messages

    Correct Answer
    A. An address of the other system in a redundant pair configuration
    Explanation
    The "Failover Peer IP" refers to the address of the other system in a redundant pair configuration. This address is used to establish communication and synchronization between the two systems in order to ensure failover and high availability.

    Rate this question:

  • 40. 

    Which statement is true concerning cookie persistence?

    • Cookie persistence allows persistence independent of IP addresses.

    • Cookie persistence allows persistence even if the data are encrypted from client to pool member.

    • Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.

    • If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system.

    Correct Answer
    A. Cookie persistence allows persistence independent of IP addresses.
    Explanation
    Cookie persistence allows persistence independent of IP addresses. This means that even if the IP address of the client changes, the cookie will still be able to identify and maintain the session with the server. This is achieved by storing the necessary information such as the virtual server, pool name, and member IP address in the cookie. Therefore, regardless of the client's IP address, the server can still recognize and maintain the session using the cookie.

    Rate this question:

  • 41. 

    Assuming other fail-over settings are at their default state, what would occur if the fail-over cable where to be disconnected for five seconds and then reconnected?

    • As long as network communication is not lost, no change will occur

    • Nothing. Fail-over due to loss of voltage will not occur if the voltage is lost for less than ten seconds

    • When the cable is disconnected, both systems will become active. When the voltage is restored, unit two will revert to standby mode

    • When the cable is disconnected, both systems will become active. When the voltage is restored, both systems will maintain active mode

    Correct Answer
    A. When the cable is disconnected, both systems will become active. When the voltage is restored, unit two will revert to standby mode
    Explanation
    When the fail-over cable is disconnected, both systems will become active because they are no longer able to communicate with each other. However, when the voltage is restored, unit two will revert to standby mode because it is designed to be the standby system in case of a fail-over event. This ensures that there is always a backup system ready to take over in case of a failure.

    Rate this question:

  • 42. 

    Which three methods can be used for initial access to a BIG-IP system? (Choose three.)

    • CLI access to the serial console port

    • SSH access to the management port

    • SSH access to any of the switch ports

    • HTTP access to the management port

    • HTTP access to any of the switch ports

    • HTTPS access to the management port

    • HTTPS access to any of the switch ports

    Correct Answer(s)
    A. CLI access to the serial console port
    A. SSH access to the management port
    A. HTTPS access to the management port
    Explanation
    The three methods that can be used for initial access to a BIG-IP system are CLI access to the serial console port, SSH access to the management port, and HTTPS access to the management port. These methods allow administrators to connect to the system and perform initial configuration and setup. SSH and HTTPS access provide secure remote access to the management port, while CLI access to the serial console port allows direct access to the system for initial configuration. Access through any of the switch ports or HTTP access is not mentioned as a valid method for initial access.

    Rate this question:

  • 43. 

    Which statement is true concerning a functional iRule?

    • IRules use a proprietary syntax language.

    • IRules must contain at least one event declaration.

    • IRules must contain at least one conditional statement.

    • IRules must contain at least one pool assignment statement.

    Correct Answer
    A. IRules must contain at least one event declaration.
    Explanation
    A functional iRule is a rule used in F5 Networks' BIG-IP devices to customize and control the traffic flow. An event declaration specifies the traffic event or condition that triggers the iRule. It is necessary for an iRule to contain at least one event declaration to determine when the rule should be applied. Without an event declaration, the iRule would not have any trigger and would not be functional. Therefore, the statement "iRules must contain at least one event declaration" is true.

    Rate this question:

  • 44. 

    Assume a BIG-IP has no NATs or SNATs configured. Which two scenarios are possible when client traffic arrives on a BIG-IP that is NOT destined to a self-IP? (Choose two)

    • If the destination of the traffic does not match a virtual server, the traffic will be discarded

    • If the destination of the traffic does not match a virtual server, the traffic will be forwarded based on routing tables

    • If the destination of the traffic matches a virtual server, the traffic will be processed per the virtual servers definition

    • If the destination of the traffic matches a virtual server, the traffic will be forwarded, but it cannot be load-balanced since no SNAT has been configured

    Correct Answer(s)
    A. If the destination of the traffic does not match a virtual server, the traffic will be discarded
    A. If the destination of the traffic matches a virtual server, the traffic will be processed per the virtual servers definition
    Explanation
    If a BIG-IP has no NATs or SNATs configured, there are two possible scenarios when client traffic arrives that is not destined to a self-IP. Firstly, if the destination of the traffic does not match a virtual server, the traffic will be discarded. This means that if there is no specific virtual server configured to handle the incoming traffic, it will be dropped. Secondly, if the destination of the traffic matches a virtual server, the traffic will be processed per the virtual server's definition. This means that if there is a virtual server configured that matches the destination of the traffic, the traffic will be handled according to the settings and rules defined for that virtual server.

    Rate this question:

  • 45. 

    You need to terminate client SSL traffic at the BIG-IP and also to persist client traffic to the same pool member based on a BIG-IP supplied cookie. Which four are profiles that would normally be included in the virtual server's definition? (Choose four.)

    • TCP

    • HTTP

    • HTTPS

    • ClientSSL

    • ServerSSL

    • Cookie-Based Persistence

    Correct Answer(s)
    A. TCP
    A. HTTP
    A. ClientSSL
    A. Cookie-Based Persistence
    Explanation
    The virtual server needs to terminate client SSL traffic, so the ClientSSL profile is required. The virtual server also needs to handle HTTP traffic, so the HTTP profile is needed. Since the virtual server needs to persist client traffic based on a BIG-IP supplied cookie, the Cookie-Based Persistence profile is required. Finally, the TCP profile is needed to handle TCP traffic. The profiles that would normally be included in the virtual server's definition are TCP, HTTP, ClientSSL, and Cookie-Based Persistence.

    Rate this question:

  • 46. 

    Where is connection mirroring configured?

    • It is an option within a TCP profile.

    • It is an optional feature of each pool.

    • It is not configured; it is default behavior.

    • It is an optional feature of each virtual server.

    Correct Answer
    A. It is an optional feature of each virtual server.
    Explanation
    The correct answer is that connection mirroring is an optional feature of each virtual server. This means that administrators have the choice to enable or disable connection mirroring for each virtual server. Connection mirroring allows for the replication of connections across multiple devices, providing redundancy and improved performance. By enabling this feature, administrators can ensure that if one device fails, the connections are automatically redirected to another device, minimizing downtime and maintaining a seamless user experience.

    Rate this question:

  • 47. 

    What is the purpose of MAC masquerading?

    • To prevent ARP cache errors

    • To minimize ARP entries on routers

    • To minimize connection loss due to ARP cache refresh delays

    • To allow both BIG-IP devices to simultaneously use the same MAC address

    Correct Answer
    A. To minimize connection loss due to ARP cache refresh delays
    Explanation
    MAC masquerading is used to minimize connection loss due to ARP cache refresh delays. ARP (Address Resolution Protocol) is responsible for mapping IP addresses to MAC addresses on a local network. However, the ARP cache needs to be periodically refreshed to ensure accurate mapping. During this refresh process, there can be a delay in establishing connections, resulting in connection loss. MAC masquerading helps to minimize this connection loss by efficiently managing the ARP cache refresh process, ensuring smooth and uninterrupted communication between devices on the network.

    Rate this question:

  • 48. 

    Given that VLAN fail-safe is enabled on the external VLAN and the network that the active BIGIP's external VLAN is connected to has failed, which statement is always true about the results?

    • The active system will note the failure in the HA table.

    • The active system will reboot and the standby system will go into active mode.

    • The active system will fail-over and the standby system will go into active mode.

    • The active system will restart the traffic management module to eliminate the possibility that BIG-IP is the cause for the network failure.

    Correct Answer
    A. The active system will note the failure in the HA table.
    Explanation
    If VLAN fail-safe is enabled on the external VLAN and the network that the active BIGIP's external VLAN is connected to fails, the active system will note the failure in the HA table. This means that the active system will be aware of the network failure and can take appropriate actions based on this information.

    Rate this question:

  • 49. 

    Which two can be a part of a virtual server's definition? (Choose two.)

    • Rule(s)

    • Pool(s)

    • Monitor(s)

    • Node address(es)

    • Load-balancing method(s)

    Correct Answer(s)
    A. Rule(s)
    A. Pool(s)
    Explanation
    A virtual server's definition can include rules, which determine how traffic is routed to the virtual server, and pools, which contain the actual servers that handle the traffic. Rules help in deciding which pool should handle the incoming requests based on specific conditions. Pools, on the other hand, consist of one or more servers that share the same functionality and can handle the incoming traffic.

    Rate this question:

Quiz Review Timeline (Updated): Jun 23, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 26, 2010
    Quiz Created by
    F5LTM
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.