Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When using LDAP for authentication, what is the purpose of the base ON?

A.

the search context starting point

B.

the directory's simple name

C.

the base attribute in an LDAP directory

D.

the fundamental naming convention

What is a primary reason to choose hardware over virtual devices?

A.

failure isolation

B.

HA capabilities

C.

management capabilities

D.

SSL performance

Why is it important that devices in a high availability pair share the same configuration?

A.

so that a spanning tree loop can be avoided

B.

so that application traffic can do gracefully resumed after a failover

C.

so that configuration Updates can occur instantly between two devices

D.

so that the load can be shared equally between the devices

What are two examples of network layer protocols? (Choose two)

A.

ARP

B.

TCP

C.

IPv4

D.

BGP

E.

ICMP

A company would like to create a web service for multiple data centers (US EU, ASia) where each data center uses the same IP address Requests will be routed to the closest data center. Which address type is the appropriate solution?

A.

Broadcast

B.

Unicast

C.

Anycast

D.

Micest

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.

What is the F5-recommended persistence method in this situation?

A.

SSL session ID persistence

B.

source address persistence

C.

SIP persistence

D.

destination address persistence

in which scenario is a full proxy required?

A.

When a separation between client and server connection .s needed

B.

When administration directly access the servers for administration

C.

when the server sends the response through Iho load balancer

D.

when all TCP client parameters must be seen by the server

Which protocol is used for control and session establishment for streaming media?

A.

RTP

B.

DTLS

C.

SMB

D.

RTSP

A BIG-IP Administrator needs to configure a MAC masquerade address for traffic-group 1.

Where on the GUI should this configuration be performed?

A.

System > Configuration Device General > lraffic-group-1

B.

Local Traffic > Traffic Class > traffic -group-1

C.

Device Management > Traffic Groups > traffic-group-1

D.

Network > ARP Static List > traffic-group-1