101試験無料問題集「F5 Application Delivery Fundamentals 認定」

An administrator is performing a capture from a lagged port on an Ethernet SWITCH.
Which OSI layer should be inspected to determine with which VLAN a datagram is associated?

What should a BIG-IP Administrator configure to minimize impact during a failure?

An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.
11. Times exceeded
What does this mean?

What is used to establish trust relationships between BIG-IP devices?

An administrator wants to insert per-session data in a users browser so that user requests are directed to Which session persistence method should the administrator use?
the same session

解説: (GoShiken メンバーにのみ表示されます)
A load balancer receives a TCP SYN packet from a client and immediately sends the packet on to a server.
This is an example of which type of solution?

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.
What is the F5-recommended persistence method in this situation?

in which scenario is a full proxy TCP connection required?

Web application http://www.example.com at 10.10.1.1.110, is unresponsive. A recent change migrated DNS to a new platform

What does the 5XX group of HTTP status codes indicate?

A client needs to learn if a web server supports POST
Which HTTP method is used?

In wh.ch layer of the OSI model is the data transported in the form of a packet?

in which scenario is a full proxy TCP connection required?

解説: (GoShiken メンバーにのみ表示されます)
A server is operating on the network 10.100/24. The BIG-IP device is operating on the 192.168.0.0/24 net. What is required to enable the several and BIG-IP device to communicate properly?

If there are multiple applications authenticated against a single identity store, which technology solution will simplify access to all applications?

BIG-IP Administrator performs the capture as shown in the image!
On which protocol is the application responding?

What is a benefit of configuring BIG-IP devices in active-active high availability mode?

What is a primary reason to choose hardware over virtual devices?

in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?