Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?

A.

switch

B.

Router

C.

HUP

D.

Bridge

A VoIP application requires that data payloads will NOT be fragmented. Which protocol controls network behavior in this situation?

A.

RTSP

B.

UDP

C.

TCP

D.

IP

Web application http://www.example.com at 10.10.1.1.110, is unresponsive. A recent change migrated DNS to a new platform

A.

telnet www example com 80

B.

curl http //www example com

C.

dig www example com

D.

telnet 10.10.1. 110. 80

How does file caching affect the web application?

A.

It reduces the load on the web application

B.

It speeds up traffic to the web application

C.

It slows traffic to the web application

D.

It increases the load on the web application

A BIG IP administrator is testing a web server behind ADC. The connection to a Virtual Server is successful but the page is still not loading Where should the administrator test to determine if theserver is available?

A.

from server-side interface in ADC.

B.

from client side interface in ADC

C.

from Workstation client

D.

from switch connected to ADC and Server

What is the correct procedure to comply with the recommendation?

A.

Download the product version image from ihealth f5 com

B.

Download the product version image from support 6 com

C.

Download the product version image from dovcentral f5.com

D.

Download the product version image from downloads f5.com

In which FTP mode is the serve, responsible for initiating the data correction back to the client?

A.

Protected FTP

B.

Active FTP

C.

Secure FTP

D.

Passive FTP

Exhibit.

the Web application Server made a query to the Database to present dynamic content for a user who would be the client?

A.

The User

B.

The Big-IP

C.

The Database

D.

The Web application server

Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?

A.

context-based access control mode!

B.

role-based access control mode!

C.

negative security model

D.

positive security model

A new virtual server is being tested to replace http://myapp.mydomain.com. The original virtual server is still on use. And the new virtual server is on a different ip address. What should be done to test this new virtual server using the fully quailed domain name for this application?

A.

add a DNS record for the fully qualified domain name

B.

add the fully qualified domain name to the browser cache

C.

make an entry in the client host file

D.

make an entry in the web server services file