You are on page 1of 11

Exam Title

: Exam Express EE0-501 : F5 Big-Ip V4 Exam

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which three methods are available for authentication of administrative users logging on to BIG-IP's web-based Configuration Utility? (Choose three.) A. Local LDAP database B. Local Radius database C. Remote LDAP database D. Remote Radius database E. Local master.passwd database Answer: ACD 2. Which of the following parameters can be specified with the Setup Utility? (Choose three.) A. current time B. password of the "root" user C. IP address of an initial Virtual Server D. IP address restrictions for access to the Configuration Utility E. self IP addresses Answer: BDE 3. You are using the Setup Utility. Which two statements about the DNS Proxy section are true? (Choose two.) A. If the option is chosen, the IP address of a DNS server is entered here. B. If the option is chosen, it allows the BIG-IP System to resolve host names for nodes. C. If the option is chosen, the hostname of an available DNS server must be entered here. D. If the option is chosen, the IP address of a DNS server on the same subnet must be entered here. Answer: AB 4. Which IP address does the BIG-IP assign itself by default at startup, before the BIG-IP has been configured A. 10.10.1.245 or 192.168.245.245 B. 192.168.1.127 or 192.168.1.245 C. 192.168.245.245 or 192.168.1.245 D. 172.16.1.245 or 172.16.245.245 Answer: C 5. When administrative users are created, which three access levels can they be granted through the BIG-IP Configuration Utility? (Choose three.) A. CLI B. Web Read Only C. CLI + Web Read Only D. CLI + Full Web Read / Write
www.Prepking.com

E. CLI + Partial Web Read / Write Answer: ABD 6. Which statement is true concerning the configuration of Pools? A. Each Pool is configured with a primary load balancing method and a backup load balancing method. B. A Pool cannot be created unless the Virtual Server that will use it already exists. C. Every Pool is configured with a load balancing method. D. Once a node is added to one Pool, it cannot be added to any other Pools. Answer: C 7. When a Virtual Server is created, which VLANs are enabled for the Virtual Server by default? A. all existing VLANs B. the internal VLAN only C. the external VLAN only D. the VLAN used by the default route only E. None are associated by default. All assignments are explicit. Answer: A 8. Which statement describes normal traffic through a Virtual Server on a BIG-IP? A. source IP address translated in both initiating and responding packets B. destination IP address translated in both initiating and responding packets C. destination IP address translated in initiating packets; source IP address translated in response packets D. source IP address translated in initiating packets; destination IP address translated in response packets Answer: C 9. Which BIG-IP log file stores data concerning node status? A. Status Log (/var/log/status) B. BIG-IP Log (/var/log/bigip) C. Monitor Log (/var/log/bigd) D. System Log (/var/log/messages) Answer: C 10. Which statement describes the function of the Fallback Host setting in a Pool? A. If all members of a Pool are unavailable, the client is sent a HTTP redirect to the specified fallback host. B. If one member of a Pool becomes unavailable, the fallback host is temporarily added to the Pool as a member. C. The fallback host setting is where the DNS name of the Pool is configured. D. The fallback host setting is used by the administrator to specify another Pool to use in case all nodes are unavailable. Answer: A
www.Prepking.com

11. Click the Exhibit button. A Pool is using Least Connections (member) as its load balancing method. No persistence is being used. Given the conditions shown in the table, which node will be used for the next connection?

A. 10.1.1.1:80 B. 10.1.1.2:80 C. 10.1.1.3:80 D. 10.1.1.4:80 Answer: B 12. When using the Fastest load balancing method, how is the node address response time measured? A. Agent software is installed on the node which reports response times to BIG-IP. B. BIG-IP measures the node address response time to requests over the network. C. The administrator configures a speed for each node in the node properties. D. BIG-IP measures the node's response time to a ping, and adds to that the number of open connections. Answer: B 13. Which of the following statements best describes the function of the Minimum Active Members setting in a Pool? A. This setting determines how many nodes must be available in the Pool for persistent sessions. B. This setting is used to override the member ratio settings in order to achieve Round Robin load balancing. C. This setting determines when to activate nodes of lower priorities for use in the Pool. D. This setting is used to determine when the Pool should consider all nodes to be OWN Answer: C 14. Click the Exhibit button. The Pool FTP_Pool is configured to use Least Connections (node address) as the load balancing method. No persistence is being used. The only two Pools in use on this BIG-IP are Web_Pool and FTP_Pool. Given the conditions shown in the table, which node will be used for the next connection?

www.Prepking.com

A. 10.10.1.1:21 B. 10.10.1.2:21 C. 10.10.1.3:21 D. 10.10.1.4:21 Answer: A 15. Which two actions can be performed by a Rule? (Choose two.) A. Discard a connection. B. Direct a connection to a specific Pool. C. Direct a connection request to a specific member of a chosen Pool. D. Direct a connection to another Rule for further processing. Answer: AB 16. When defining a Virtual Server that uses a Rule to select a Pool, in what order must the configuration objects be created? A. Pools, Virtual Server, Rule B. Pools, Rule, Virtual Server C. Rule, Virtual Server, Pools D. Rule, Pools, Virtual Server E. Virtual Server, Pools, Rule F. Virtual Server, Rule, Pools Answer: B 17. Given the Rule below, which statement is true regarding how traffic will be processed by the Rule? if ( http_header "Accept-Language" equals "fr" ) { use pool french_pool } else { use pool english_pool } A. If a request's accept-Language header is not equal to fr or on that request will be discarded B. If all nodes in the Pool rench_pool are down, the rule would automatically redirect users to the Pool english_pool
www.Prepking.com

C. All HTTP NET frequests will be handled by the Pool english_pool D. If a request's accept-Language header was equal to p english_pool Answer: D 18. Which statement describes a functional limitation of Rules? A. Rules cannot be used in conjunction with Cookie Persistence. B. Rules cannot parse responses from nodes to client requests. C. Rules cannot reference more than two Pools. D. Rules cannot send clients HTTP redirects. Answer: B 19. If a client's browser does not accept cookies, what occurs when the client connects and the BIG-IP is configured to use cookie persistence? A. The connection request is not processed. B. The connection request is sent to the backup node. C. The connection request is load-balanced to an available node. D. The connection request is refused and the client is sent a "Server Not Available" message. Answer: C 20. Given the conditions shown in the table, if a client request to the virtual server at 150.150.10.10 is directed to the node 10.1.1.2:80 (based on persistence), what is the client's most likely IP address? that request would be sent to the Pool

A. 150.150.10.10 B. 200.11.15.67 C. 200.11.225.10 D. 205.68.17.10 Answer: B 21. Which statement is true about cookie persistence? A. It allows persistence independent of client IP addresses. B. If the client's browser accepts cookies, a cookie will always be written. C. It allows persistence even though the data are encrypted from client to node. D. It uses a cookie that stores the virtual server and node addresses in clear text. Answer: A 22. Click the Exhibit button.
www.Prepking.com

The Pool WebPool is configured with Round Robin as the load balancing method, and Simple Persistence is enabled with a timeout of 600 seconds. Given the connections shown in the exhibit, if a client with IP address 200.11.15.25 opens a connection to the Virtual Server at 150.150.10.10:80 that is associated with WebPool, what node will be used for the connection?

A. 192.168.10.1:80 B. 192.168.10.2:80 C. 192.168.10.3:80 D. 192.168.10.4:80 Answer: D 23. Which three statements are true about simple persistence? (Choose three.) A. It can be used in conjunction with SSL Session ID persistence. B. It allows persistence based on the SSL Session ID when the data are encrypted. C. It allows persistence based on client IP addresses originating from the same network. D. It allows persistence for long periods of time provided the client source IP address does not change. Answer: ACD 24. Which three statements describe limitations of various persistence methods? (Choose three.) A. Simple persistence is dependent on the traffic not being encrypted. B. Cookie persistence is dependent upon the client accepting cookies. C. Expression persistence is dependent upon the user typing specific commands. D. SSL Session ID persistence is dependent upon the SSL Session ID not changing. E. Simple persistence is dependent upon the client's IP address staying within a subnet, based on the configured netmask. Answer: BDE 25. What is an expected result if the Simple Persistence netmask is changed from 255.255.255.0 to 255.255.0.0? A. There would be no direct changes.
www.Prepking.com

B. More persistence records would be created. C. Larger groups of clients would persist to the same node. D. Fewer clients would match existing persistence records. Answer: C 26. Which of the following statements is true regarding nodes with a status of OWN? A. When the node comes back up, the administrator will have to re-enable it. B. If the node is down for one hour, it will be automatically removed from BIG-IPs configuration file. C. Persistent sessions will continue to be active to the node. D. The monitor associated with the node will continue to check it at the defined interval. Answer: D 27. What does the node status of "UNCHECKED" indicate? A. No monitors are checking that node. B. No monitors are checking that node address. C. At least one monitor that is configured for that node is failing. D. An associated monitor has a timeout period, but it has not been reached yet. Answer: A 28. What happens if an ICMP monitor fails for node address 192.168.10.10? A. node address 192.168.10.10 is marked "DISABLED" B. nodes at address 192.168.10.10 are marked "DISABLED" C. node address 192.168.10.10 is marked "UNAVAILABLE" D. nodes at address 192.168.10.10 are marked "ADDRESS DOWN" Answer: D 29. A user-defined monitor has been defined based on the TCP base monitor. Defaults are used for all parameters except the destination which is defined as *:80. If this monitor were assigned to the node 10.10.10.10:443, what would be the result? A. The assignment cannot be made due to the service conflict. B. When the monitor performs a check, it will cause the node to be marked "DOWN". C. When the monitor performs a check, it will be performed on the node 10.10.10.10:80 and results will depend on the state of that node. D. When the monitor performs a check, it will be performed on the node 10.10.10.10:443 and results will depend on the state of that node. Answer: C 30. Which of the following statements is true regarding nodes with a status of ISABLED? A. All existing connections to the node are closed, and persistence sessions are removed. B. All existing connections to the node are maintained, and new connections can be made only from clients
www.Prepking.com

with active persistence sessions. C. All existing connections to the node are closed, but new connections can be from clients with active persistence sessions. D. All existing connections to the node are maintained, but persistence sessions are removed. Answer: B 31. Which two answers show the correct order of configuration used to configure a SSL Proxy? (Choose two.) A. install a certificate, create a Proxy, create the associated Virtual Server B. install a certificate, create the associated Virtual Server, create a Proxy C. create a Proxy, create the associated Virtual Server, install a certificate D. create a Proxy, install a certificate, create the associated Virtual Server install a certificate

E. create the associated Virtual Server, create a Proxy,

F. create the associated Virtual Server, install a certificate, create a Proxy Answer: BF 32. Which statement about the SSL Proxy option is true? A. The SSL Proxy can send unencrypted traffic to a local Virtual Server or to an external Node. B. The SSL Proxy can only send unencrypted traffic to a local Virtual Server. C. After an SSL Proxy has been created, no encrypted traffic can be sent to any BIG-IP Virtual Servers. D. Decrypting traffic at the BIG-IP allows use of Rules within pools, but also places increased demands on nodes. Answer: A 33. What are three advantages of using a SSL Proxy over decrypting SSL traffic at the web server? The SSL Proxy is not using ServerSSL. (Choose three.) A. reduces CPU utilization on web servers B. allows for centralized certificate management C. minimizes security concerns on the "internal" network D. No SSL accelerator adapters need to be purchased for web servers Answer: ABD 34. You currently have a single BIG-IP installed in your network, and you want to add a second BIG-IP unit and configure them as a redundant pair. Which of the following describes steps that will accomplish this? A. Save a UCS file from the current BIG-IP and restore it on the new BIG-IP. B. Save an image of the hard drive on the current BIG-IP and install it on the new BIG-IP. C. Ensure both BIG-IPs are properly configured to be in a redundant pair, and perform a configuration sync from the current system. D. Transfer the bigip.conf and bigip_base.conf files from the current BIG-IP to the new BIG-IP and reboot.
www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/EE0-501.htm

You might also like