101試験無料問題集「F5 Application Delivery Fundamentals 認定」

The BIG IP device is connected to the same network as a server
Which communication protocol will the BIG IP device use to discover the link layer address of the server?

What is the nest hop used to send traffic to reach 192.168.1.50?

A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?

What is a disadvantage of running a visualized load balancer

An administrator needs to selectively compress HTTP traffic based on geographical location Which FS Feature should the administrator use?

An organization needs to cryptographically sign its domains. Which F5 product provides this functionality?

Which three security controls are used in an SSL transaction? (Choose three.)

A website is using source address persistence with a 30 second timeout A client is idle for 35 seconds What happens to their connection?

解説: (GoShiken メンバーにのみ表示されます)
An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?

Which IP subnet mask can be used to send traffic to all network nodes?

During a TCP three-way handshake, which packet indicates the serves maximum segment (MSS)?

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly Which F5 technology should the administrator use?

Why is it important that devices in a high availability pair share the same configuration?

A BIG IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers?

解説: (GoShiken メンバーにのみ表示されます)
Layer 2 mapping information is announced by an interface without receiving a request for the mapping first.
Which term describes this event?

A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?

An administrator finds a new vulnerability in a web application and needs to rapidly mitigate the threat. Which F5 feature provides this functionality?

An administrator is trying to debug why the 10.0.10.0/24 network is inaccessible from a certain server. The server is able to access the internet Successfully.
The administrator inspects the routing table and ARP table on the affected server.
Given the terminal output shown, what could be causing this issue?

An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality

解説: (GoShiken メンバーにのみ表示されます)