Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An LTM Specialist needs to apply SNAT using currently used SNAT pool to a new virtual server.

What needs to be completed before applying that configuration change?

A.

Review connection for the selected SNAT pool and enlarge it if appropriate

B.

Make sure that the BIG-IP device is NOT operating under heavy load during peak times

C.

Verify that the IP address of the SNAT pool are in the same subnet as the pool members

D.

Verify that the IP address of the SNAT pool are in the same VLAN as the pool members.

Full Access
Question # 5

An application is being load balanced through the LTM device using the configuration displayed below.

The network has been re-engineered to NAT all client connection. As a result, all client connections are hitting the same pool member.

Which changes should the LTM Specialist make in order to restore load balancing functionality wile maintaining session persistence?

A.

Change the virtual server type to Standard, add an http profile, and change the persistence profile to Destination Address

B.

Leave the virtual server type set Performance (Layer 4) and change the persistence type to hash

C.

Change the virtual serer type to Forwarding (Layer 4) and leave the persistence type to hash source Address

D.

Change the virtual server to Standard add an http profile, and change the persistence profile to Cookie persistence

Full Access
Question # 6

An LTM Specialist discovers an issue with the custom http monitor that returns in a false positive status.

The end users cannot get the right website, but the http monitor marks the pool member UP.

What is causing the false positive result?

A.

The end user should use another type of browser.

B.

The response is chunked.

C.

The response is compressed.

D.

The Content-Type has value "iso-8859-200".

Full Access
Question # 7

An unwanted IP address tries to connect to the configuration utility via Self IP An LTM Specialist needs to block the attempts based on the IP address.

How should the ITM Specialist block the attempts without affecting other users?

A.

SSH IP allow list

B.

Port lockdown

C.

Device trust

D.

Packet filter

Full Access
Question # 8

An LTM Specialist needs to create two virtual servers.

The application has links for both HTTP and HTTPS version of application. The client must be persistence to a pool member, no matter which virtual server is accessed.

What must be selected in the Source Address Affinity persistence profile?

A.

Match across Virtual Servers

B.

Match across Pool Members

C.

Match across Services

D.

Match across Polls

Full Access
Question # 9

An LTM Specialist is experiencing issues in a failover event. Certain long-lasting FTP event. Certain long-lasting FTP connections using a single node pool are forced to reconnect. The bigip.conf extract is shown:

What does the LTM Specialist need to change in the configuration to avoid this issue?

A.

snatpool

B.

persistence mirroring

C.

connection mirroring

D.

ftp profile

Full Access
Question # 10

When importing a PEM formatted SSL certificate, which text needs to appear first in the file?

A.

--START CERTIFICATE....

B.

...BEGIN CERTIFICATE....

C.

...SECURITY CERTIFICATE....

D.

...SSL CERTIFICATE....

Full Access
Question # 11

An LTM Specialist reports that an application si no longer reachable after it has been upgraded.

Nothing has been changed in the configuration on the LTM device.

The logs indicates that health monitors to all servers have failed as shown:

What should the LTM Specialist verify next?

A.

That the TCP hand shake with the servers is stall completed using tcpdump

B.

That the custom receive string for the HTTP monitor has changed with the upgrade

C.

That the can still ping the servers from te BIG_ IP device.

D.

That the firewall between the BIG-ip device and servers is still allowing HTTP

Full Access
Question # 12

An LTM Specialist must reconfigure a BIG-IP system that load balances traffic to a web application. The security department has informed the LTM Specialist that the following cipher string must be used for TLS connections from BIG-IP to the web application.

NATIVE:IMDS:EXPORT:IDHE:EDH@SPEED

In which virtual server profile should the cipher string be configured?

A.

Server SSL

CB. Client SSL

B.

SPDY profile

C.

Rewrite profile

Full Access
Question # 13

An LTM Specialist needs to gather website statistics such as latency and throughput on the existing virtual server. This virtual server load Balances the backend web servers.

Which F5 feature will provide this?

A.

the Performance panel

B.

the AVR module

C.

the Dashboard

D.

the Statistics panel

Full Access
Question # 14

An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.

How should the LTM Specialist block these attempts?

A.

add the permitted source IP addresses to the httpd allow list via tmsh

B.

add the suspicious source IP addresses to the httpd deny list via tmsh

C.

add the suspicious source IP addresses to the httpd deny list via Configuration Utility

D.

add the permitted source IP addresses to the allow list via Configuration Utility

Full Access
Question # 15

A new iRule needs to be tested. The LTM Specialist needs to measure page load times and monitor potential changes in memory usage A load test is scheduled.

Which two features should the LTM Specialist use to monitor these requirements? (Choose two.)

A.

Tmsh show memory

B.

Analytics

C.

Tmsh show sys proc-info

D.

Tmsh show sys provision

Full Access
Question # 16

An organization’s development team creates an application to put behind the F5 LTM device. The application can be quite load intensive at first, and then evens out over time. The team’s load balancing method needs to select a pool after taking into account the pool member’s response over the time to avoid landing on a busy pool member.

Which of the following load balancing methods meets this requirement?

A.

Fastest (application)

B.

Predictive (member)

C.

Dynamic (node)

D.

Observed (member)

Full Access
Question # 17

A company plans to launch a huge marketing campaign and expects increase demand of their secure website. With the current virtual server setup, the LTM Specialist expects that the LTM device will reach its capacity limits. For the wen application to function properly. Cookies persistence is required. The LTM Specialist needs to reduce LTM device load without breaking the application.

Which two settings should the LTM Specialist modify to meet the requirement? (Choose two.)

A.

Remove HTTP compression profile

B.

Remove HTTP profile

C.

Remove web acceleration profile.

D.

Modify virtual Server type to performance (Layer 4)

E.

Remove ClientSSL profile

Full Access
Question # 18

An LTM Specialist needs to configures virtual server that uses PVA or OPVA Which virtual server type should be used?

A.

Stateless

B.

Performance (HTTP)

C.

Standard

D.

Performance (Layer 4)

Full Access
Question # 19

A design requires the LTM device to become HA standby when the one of the two physical interface on the External trunk is down the External trunk is an interface on the External VLAN

Which TMOS command enables this behavior?

A.

tmsh modify net van External failsafe enabled

B.

tmsh create sys ha-group External trunks add Externally

C.

tmsh create sys ha-group External trunks add External threshold 2 weight 101)

D.

tmsh create sys ha-group External trunks add ( External( attribute percent up-members 100))

Full Access
Question # 20

An LTM Specialist needs to use a set of addresses to access an Internet website in an outbound configuration.

Which feature should the LTM Specialist configure?

A.

NAT pool

B.

NAT address

C.

SNAT pool

D.

SNAT address

Full Access
Question # 21

An LTM Specialist needs to create a virtual server to pass TCP traffic to three pool members.

Which two virtual server types should be used to meet the requirements? (Choose two)

A.

Performance (Layer A)

B.

Standard

C.

Forwarding (IP)

D.

Stateless

E.

Forwarding (Layer 2)

Full Access
Question # 22

Refer to the exhibit.

The LTM devices LTM3 and LTM2 have four Traffic Groups defined with approximately the sar of failover objects defined in each group.

- Traffic Groups A and C have Default Device set to LTM1

- Traffic Groups Band D have Default Device set to LTM2.

- Traffic Groups B and C do NOT have Auto Failback enabled. Traffic Groups A and D have Auto Failback enabled with a timeout value of 60 seconds.

- Traffic Groups A and D have Auto Fallback enabled with a timeout value of 60 seconds.

Both LTM devices are healthy and able to pass traffic for any Traffic Group.

LTM1 loses connectivity on interface 1.4. The LTM Specialists notified 60 seconds after the interface goes down.

What is the state of the Traffic Groups on each LTM device?

A.

LTM1: Traffic Group C

LTM2: Traffic Groups A, B, and 0

B.

LTM1: No Traffic Groups

LTM2: Traffic Groups A, B. C, and D

C.

LTM1: Traffic Groups A, B, C, and D

LTM2: No Traffic Groups

D.

LTM1: Traffic Groups B and C

LTM2: Traffic Groups A and 0

Full Access