Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

A.

Positive

B.

Context-based

C.

Negative

D.

Role-based

A server is capable of handling more connections than other servers in the same pool. Which load distribution method should the administrator choose?

A.

Least Connections

B.

Fastest

C.

Ratio

D.

Round Robin

An administrator encounter an error while working on eBiG.IP device and contacts F5 Support to open a case. While opening the case Support of the administrator that a BIO-IP version update is required.

Which F5 Support policy requires the administrator to upgrade the BIG-IP version.

A.

End of Software Support

B.

End of Support Contact Renewal

C.

End of Technical Support

D.

End of Return to Manufacturing

A company needs to use a custom value when making persistence decisions.Which F5 product provides this functionality?

A.

iControI

B.

(Rules

C.

lApps

D.

(Health

A BIG IP administrator recently reset statistics for interfaces 1.1 and 1.2.The administrator notices that traffic appears on a data plane interface without receiving any client requestsAll nodes and pools have monitoring enabled, and all routes are locally defined on the device All management traffic is sent over the mgmt interface. What is the nature of this traffic?

A.

SNMP polling and traps

B.

Hearth checks for nodes and pool members

C.

Dynamic routing protocols

D.

TCP Keepalives for nodes and pool me

An administrator lakes a capture of five Traffic using tcpdump. The administrator notices that different ephemeral port numbers are architecture does this indicate?

A.

packet-based architecture

B.

full proxy architecture

C.

hub and spoke architecture

D.

ring network architecture

Which device group type allows a BIG IP system to automatically become active in the event that the current active system fails?

A.

Sync-active

B.

sync-failover

C.

sync-standby

D.

sync-only

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

A.

ASM

B.

APM

C.

AFM

D.

GTM

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Which Datalink sublayer has the primary funcl.cn of proving node lo node flow and error control?

A.

LLC

B.

ARP

C.

MAC

D.

UDP