Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the F5 BIG-IP LTM Specialist: Architect Set-Up & Deploy 301a Questions and answers with ValidTests

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

A virtual server is experiencing intermittent port exhaustion. What should be done to fix this issue?

Options:

A.

add more SNAT addresses

B.

add more pool members

C.

enable advanced routing

D.

enable SNAT automap

Expert Solution
Questions # 2:

AN LTM Specialist needs to determine the delay between an LTM device and the internal web server for a specific client.

Which two AVR reporting options should the LTM Specialist enable to measure the delay? (Choose two.)

Options:

A.

User agents

B.

Methods

C.

Response codes

D.

Server latency

E.

Client IP

Expert Solution
Questions # 3:

A virtual server is configured to handle https traffic. The clientssl profile is configured to use a2048-bit RSA key. Due to security requirements, is the LTM Specialist needs to use a 4096-bit RSA key in the future.

What two effects will this change have on the BIG-IP device? (Choose two)

Options:

A.

Increase of CPU usage on the BIG-IP device

B.

Decrease to 20% of licensed TPS

C.

Decrease to 90% of licensed TPS

D.

Increased of concurrent connection on client-side

E.

Increase of TLS Renegotiation

Expert Solution
Questions # 4:

In an iApp, which configuration protects against accidental changes to an application Services configuration?

Options:

A.

Components

B.

Strict Updates

C.

Name

D.

Template

Expert Solution
Questions # 5:

An LTM Specialist needs to use the tmsh command to create a pool named http_pool with member

10.10.101:80 on an LTM device.

Which expression should the LTM Specialist use?

Options:

A.

# tmsh create pool http_pool members {10.10.10.101:80}

B.

# tmsh create pool http_pool members add {10.10.10.101:80}

C.

# tmsh create it pool http_pool members {10.10.10.101:80}

D.

# tmsh create itm pool http_pool member {10.10.10.101:80}

Expert Solution
Questions # 6:

Exhibit.

Question # 6

The three VLANS shown provide connectivity to backend servers. The backend servers are being moved to unmanaged switches and require separate interfaces.

How should the F5 device interfaces be configured?

Options:

A.

Create a Trunk interface and combined interface 1.1.1.2 and 1.3.

B.

Create a Trunk interface and select VLAN„A, VLAN_B. and VLAN_C.

C.

Create VLAN named VLAN_A enter 100 under Tag and move interface 1.1 to tagged Create VLAN_B enter 200 and move interface 1.2 to tagged Create VLAN_C Center 300 and move interface 1.3 to tagged.

D.

Create VLAN_A move interface 1.1 to untagged. Create VLAN_B move interface 1.2 to untagged. Create VLAN_C move interface 1.3 to untagged.

Expert Solution
Questions # 7:

Refer to the exhibit.

Question # 7

The pool shown is configured with four pool members in a variety of states. The application is receiving a large number of request. The LTM Specialist needs to make changes to make sure that all members receive the same levels of traffic.

Which changes need to be made?

Options:

A.

Enable 10.80.1.40 disable priority group activation, enable ratio

B.

Enable 10.80.1.40 and 10.80.1.1.20 disable group activation, enable Round Robin

C.

Enable 10.80.1.20 disable priority group activation, enable Round Robin

D.

Enable 10.80.1.40 and 10.80.1.20 disable priority group activation, enable ratio.

Expert Solution
Questions # 8:

An LTM Specialist is configuring a virtual server with an IP address.

Which configuration is unsupported?

Options:

A.

Performance 14 virtual server with an HTTP profile

B.

Standard virtual server with an HTTP profile

C.

Performance 14 virtual server with a FastHTTP profile

D.

Standard virtual server with a TCP profile

Expert Solution
Questions # 9:

An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.

How should the LTM Specialist block these attempts?

Options:

A.

add the permitted source IP addresses to the httpd allow list via tmsh

B.

add the suspicious source IP addresses to the httpd deny list via tmsh

C.

add the suspicious source IP addresses to the httpd deny list via Configuration Utility

D.

add the permitted source IP addresses to the allow list via Configuration Utility

Expert Solution
Questions # 10:

An LTM is configure an application that is separated into several subdomains across multiple virtual servers. Many of these subdomains require encryption and could be accessed by anyone on the internet. The configuration must NOT result in SSL warnings to end users.

How should the LTM Specialist configure the SSL profiles for these virtual servers?

Options:

A.

Obtain an SSL certificate for each subdomain, make a ServerSSL profile for each subdomain, and apply to the related SSL Virtual Server.

B.

Obtain a wildcard certificate, create one ClientSSL profile and apply to all SSL Virtual Servers

C.

Create a self-singed SSL certificate for each subdomain make a ClientSSL profile for each subdomain, and apply to the related SSL Virtual server

D.

Create a self-singed SSL certificate for each subdomain make a Client profile for each SSL Virtual Server

Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions