[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 191-200

Get Full Version of the Exam
http://www.EnsurePass.com/101.html

Question No.191

Which of the following is NOT a method that TMOS uses to improve the performance of applications?

  1. Caching HTTP data

  2. Optimizing the TCP connection between the client and the BIG-IP device

  3. Offloading SSL decryption from downstream servers

  4. Discarding unnecessary data from server responses before sending to the client

  5. Compressing HTTP data

Correct Answer: D

Question No.192

Which statement is true concerning iRule context?

  1. The iRule event declaration determines the context.

  2. The context must be explicitly declared.

  3. The rule command determines the context.

  4. The results of the iRule#39;s conditional statement determines the context.

Correct Answer: A

Question No.193

When using the setup utility to configure a redundant pair, you are asked to provide a quot;Failover Peer IPquot;. Which address is this?

  1. an address of the other system in its management network

  2. an address of the other system in a redundant pair configuration

  3. an address on the current system used to listen for failover messages from the partner BIG-IP

  4. an address on the current system used to initiate mirroring and network failover heartbeat messages

Correct Answer: B

Question No.194

The main drawback to using an APM Deployment Wizard is that it is not possible to edit the resulting objects, including the access policy.

  1. True

  2. False

Correct Answer: B

Question No.195

Which three can be a part of a pool#39;s definition? (Choose three.)

  1. Link

  2. Monitors

  3. Wide IPs

  4. Persistence

  5. Data Centers

  6. Virtual Servers

Correct Answer: BDF

Question No.196

The Device Inventory option in Enterprise Manager can replace an organization#39;s static Excel spreadsheet containing similar data.

  1. True

  2. False

Correct Answer: A

Question No.197

Network Security personnel are entirely responsible for web application security.

  1. True

  2. False

Correct Answer: B

Question No.198

Which is a potential result when a trunk is configured on a BIG-IP?

  1. No additional trunks can be configuration since each BIG-IP is limited to one trunk

  2. Packets flowing to the VLAN could arrive on any of the interfaces in the trunk

  3. Since any VLANs associated with the trunk are necessarily associated with multiple interfaces, the VLAN using the must use tagged packets.

  4. VLAN failsafe is not available for any VLAN associated with any trunks.

Correct Answer: B

Question No.199

Which three methods can be used for initial access to a BIG-IP system. (Choose three.)

  1. CLI access to the serial console port

  2. SSH access to the management port

  3. SSH access to any of the switch ports

  4. HTTP access to the management port

  5. HTTP access to any of the switch ports

  6. HTTPS access to the management port

  7. HTTPS access to any of the switch ports

Correct Answer: ABF

Question No.200

A network administrator tells you that they do NOT need WebAccelerator because their Web application is fine. What is your best response?

  1. Challenge them to run performance testing on their Web site.

  2. Access their Web site with them to display its response.

  3. Request a follow up meeting within the next three months.

  4. Ask for an opportunity to speak with the CIO or a member of their Web application team.

Correct Answer: D

Get Full Version of the Exam
101 Dumps
101 VCE and PDF

Leave a Reply