Get Full Version of the Exam
http://www.EnsurePass.com/101.html
Question No.191
Which of the following is NOT a method that TMOS uses to improve the performance of applications?
-
Caching HTTP data
-
Optimizing the TCP connection between the client and the BIG-IP device
-
Offloading SSL decryption from downstream servers
-
Discarding unnecessary data from server responses before sending to the client
-
Compressing HTTP data
Correct Answer: D
Question No.192
Which statement is true concerning iRule context?
-
The iRule event declaration determines the context.
-
The context must be explicitly declared.
-
The rule command determines the context.
-
The results of the iRule#39;s conditional statement determines the context.
Correct Answer: A
Question No.193
When using the setup utility to configure a redundant pair, you are asked to provide a quot;Failover Peer IPquot;. Which address is this?
-
an address of the other system in its management network
-
an address of the other system in a redundant pair configuration
-
an address on the current system used to listen for failover messages from the partner BIG-IP
-
an address on the current system used to initiate mirroring and network failover heartbeat messages
Correct Answer: B
Question No.194
The main drawback to using an APM Deployment Wizard is that it is not possible to edit the resulting objects, including the access policy.
-
True
-
False
Correct Answer: B
Question No.195
Which three can be a part of a pool#39;s definition? (Choose three.)
-
Link
-
Monitors
-
Wide IPs
-
Persistence
-
Data Centers
-
Virtual Servers
Correct Answer: BDF
Question No.196
The Device Inventory option in Enterprise Manager can replace an organization#39;s static Excel spreadsheet containing similar data.
-
True
-
False
Correct Answer: A
Question No.197
Network Security personnel are entirely responsible for web application security.
-
True
-
False
Correct Answer: B
Question No.198
Which is a potential result when a trunk is configured on a BIG-IP?
-
No additional trunks can be configuration since each BIG-IP is limited to one trunk
-
Packets flowing to the VLAN could arrive on any of the interfaces in the trunk
-
Since any VLANs associated with the trunk are necessarily associated with multiple interfaces, the VLAN using the must use tagged packets.
-
VLAN failsafe is not available for any VLAN associated with any trunks.
Correct Answer: B
Question No.199
Which three methods can be used for initial access to a BIG-IP system. (Choose three.)
-
CLI access to the serial console port
-
SSH access to the management port
-
SSH access to any of the switch ports
-
HTTP access to the management port
-
HTTP access to any of the switch ports
-
HTTPS access to the management port
-
HTTPS access to any of the switch ports
Correct Answer: ABF
Question No.200
A network administrator tells you that they do NOT need WebAccelerator because their Web application is fine. What is your best response?
-
Challenge them to run performance testing on their Web site.
-
Access their Web site with them to display its response.
-
Request a follow up meeting within the next three months.
-
Ask for an opportunity to speak with the CIO or a member of their Web application team.
Correct Answer: D
Get Full Version of the Exam
101 Dumps
101 VCE and PDF