Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > F5 > F5-CA > 201

201 TMOS Administration Question and Answers

Question # 4

The 8IG-IP Administrator generates a qkview using "qkview -SO" and needs to transfer the output file via

SCP.

Which directory contains the output file?

A.

/var/log

B.

/var/tmp

C.

/var/local

D.

/var/config

Full Access
Question # 5

A BIG-IP Administrator is checking the BIG-IP device for known vulnerabilities. What should the 8IG-IP Administrator upload to BIG-IP iHealth for further analysis?

A.

QKView

B.

EUD

C.

UCS

D.

tcpdump

Full Access
Question # 6

Which log file should the BIG-IP Administrator check to determine if a specific user tried to log in to the 8IG-IP Configuration by utility?

A.

/var/log/pam/tally/log

B.

/ver/log/secure

C.

/var/log/trn

D.

/var/log/http.d

Full Access
Question # 7

A BIG-IP Administrator reviews the log files to determine the cause of a recent problem and finds the

following entry.

Mar 27.07.58.48 local/BIG-IP notice mcpd {5140} 010707275 Pool member 172.16.20.1.10029 monitor

status down.

What is the cause of this log message?

A.

The pool member has been disabled.

B.

The pool member has been marked as Down by the BIG-IP Administrator.

C.

The monitor attached to the pool member needs a higher timeout value.

D.

The monitor attached to the pool member has failed.

Full Access
Question # 8

A BIG-IP Administrator adds new Pool Members into an existing, highly utilized pool. Soon after, there are reports that the application is failing to load for some users. What pool level setting should the BIG-IP Administrator check?

A.

Availability Requirement

B.

Allow SNAT

C.

Action On Service Down

D.

Slow Ramp Time

Full Access
Question # 9

Which statement is true regarding failover?

A.

Hardware failover is disabled by default.

B.

Hardware failover can be used in conjunction with network failover.

C.

If the hardware failover cable is disconnected, both BIGIP devices will always assume the active role.

D.

By default, hardware fail over detects voltage across the failover cable and monitors traffic across the internal VLAN.

Full Access
Question # 10

The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned custom monitors. The pool is marked available. If a pool is marked available (green) which situation is sufficient to cause this?

A.

All of the pool member nodes are responding to the ICMP monitor as expected.

B.

Less than 50% of the pool member nodes responded to the ICMP echo request.

C.

All of the members of the pool have had their content updated recently and their responses no longer match the monitor.

D.

Over 25% of the pool members have had their content updated and it no longer matches the receive rule of the custom monitor. The other respond as expected.

Full Access
Question # 11

Refer to the exhibit.

During a planned upgrade lo a BIG-IP HA pair running Active/Standby, an outage to application traffic is reported shortly after the Active unit is forced to Standby Reverting the flower resolves the outage. What should the BIG-IP Administrator modify to avoid an outage during the next for over event?

A.

The Tag voice on the Standby device

B.

The interface on the Active device to 1.1

C.

The Tag value on the Active device

D.

The Interface on the Standby device to 1.1

Full Access
Question # 12

Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If a client were to initiate traffic to the NAT address, what changes, if any, would take place when the BIG-IP processes such packets?

A.

The source address would not change, but the destination address would be translated to the origin address.

B.

The destination address would not change, but the source address would be translated to the origin address.

C.

The source address would not change, but the destination address would be translated to the NAT's address.

D.

The destination address would not change, but the source address would be translated to the NAT's address.

Full Access
Question # 13

A site wishes to perform source address translation on packets from some clients but not others. The determination is not based on the client's IP address, but on the virtual servers their packets arrive on. What could best accomplish this goal?

A.

A SNAT for all addresses could be defined, and then disable the SNAT processing for select VLANs.

B.

Some virtual servers could be associated with SNAT pools and others not associated with SNAT pools.

C.

The decision to perform source address translation is always based on VLAN. Thus, the goal cannot be achieved.

D.

The decision to perform source address translation is always based on a client's address (or network). Thus, this goal cannot be achieved.

Full Access
Question # 14

Refer to the exhibit.

How are new connections load balanced?

A.

To the first two members listed with the same priority group

B.

To the pool member with the least number of connections

C.

To the pool member with a high priority group value defined

D.

To the pool member with a low priority group value defined

Full Access
Question # 15

A BIG-IP Administrator needs to configure the BIG-IP system to perform load balancing for FTP servers

running passive mode FTP.

How should the administrator configure the Virtual Server to perform this load balancing?

A.

A Standard Virtual Server + FTP profile

B.

A Forwarding Virtual Server

C.

A Performance Layer 4 Virtual Server + FTP profile

D.

A Message Routing Virtual Server

Full Access
Question # 16

All pool members are online. All other virtual server settings are at default What might after the load balancing behavior?

A.

enabing SNAT automap

B.

enabing a falback host in the http profile

C.

adding a oneconnect profile

D.

adding a persistence profile

Full Access
Question # 17

A VLAN has the following objects configured:

Self-IP 10.10.10.100 with port lockdown set to Allow default

Virtual server 10.10.10.100:443 with UDP profile enabled

Virtual server 10.10.10.0/24 port forwarding virtual server

Global destination NAT forwarding 10.10.10.100 to internal server 172.168.10.100

Which object will process this request when https://10.10.10.100 is entered into a browser?

A.

self-IP 10.10.10.100 with port lockdown set to Allow default

B.

virtual server 10.10.100/24 port o forwarding virtual server

C.

global destination NAT forwarding 10.10.10.100 to internal server 172.168.10.100

D.

virtual server 10.10.10.100.443 with UDP profile enabled

Full Access
Question # 18

A pool of four servers has been partially upgraded for two new servers with more memory and CPU capacity. The BIG-IP Administrator must change the load balance method to consider more connections for the two new servers. Which load balancing method considers pool member CPU and memory load?

A.

Round Robin

B.

Dynamic Ratio

C.

Ratio

D.

Least Connection

Full Access
Question # 19

A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection.

A.

172.16.20.1:80

B.

172.16.20.2:80

C.

172.16.20.3:80

D.

172.16.20.4:80

E.

172.16.20.5:80

Full Access
Question # 20

Active connections to pool members are unevenly distributed. The load balancing method is Least Connections (member) Priority Group Activation is disabled. What is a potential cause of the event distribution?

A.

Priority Group Activation is disabled

B.

SSL Profile Server is applied

C.

Persistence profile is applied

D.

incorrect load balancing method

Full Access
Question # 21

New Syslog servers have been deployed in an organization. The BIG-IP Administrator must reconfigure the BIG-IP system to send log messages to these servers.

In which location in the Configuration Utility can the BIG-IP Administrator make the needed configuration changes to accomplish this?

A.

System > Logs > Configuration

B.

System > Configuration > Local Traffic

C.

System > Logs > Audit

D.

System > Configuration > Device

Full Access
Question # 22

A BIG-IP Administrator needs to apply a license to the BIG-IP system to increase the user count from the

base license.

Which steps should the BIG-IP Administrator?

A.

System License > Re-activate> Add-On Registration> Edit

B.

System > License > Re-activate > Base Registration> Edit

C.

Device Management > Devices > Select BIG-IP System > Update

D.

System > Configuration >Device > General

Full Access
Question # 23

How is MAC masquerading configured?

A.

Specify the desired MAC address for each VLAN for which you want this feature enabled.

B.

Specify the desired MAC address for each selfIP address for which you want this feature enabled.

C.

Specify the desired MAC address for each VLAN on the active system and synchronize the systems.

D.

Specify the desired MAC address for each floating selfIP address for which you want this feature enabled.

Full Access
Question # 24

Refer to the exhibit.

The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator

notices there is NO traffic on the BIG-IP device in which they are logged into.

What should the BIG-IP Administrator do to verify if the iRule works correctly?

A.

Push configuration from this device to the group and start to monitor traffic on this device

B.

Pull configuration to this device to the cluster and start to monitor traffic on this device

C.

Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device

D.

Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device

Full Access
Question # 25

A BIG-IP Administrator plans to resolve a non-critical issue with a BIG-IP device in 2 weeks. What Severity level should be assigned to this type of F5 support ticket?

A.

4

B.

2

C.

3

D.

1

Full Access
Question # 26

A BIG-IP Administrator suspects that one of the BIG-IP device power supplies is experiencing power

outages.

Which log file should the BIG-IP Administrator check to verify the suspicion?

A.

/war /log/daemon.log

B.

/var/log/kern.log

C.

/var/log/ltm

D.

/var/log/audit

Full Access
Question # 27

A BIGJP Administrator needs to load a UCS file but must exclude the license file. How should the administrator perform this task?

A.

From the CLI with command U tmsh load /$ys ucs no-license

B.

From the GUI, select the UCS file, unchcck the license box, and click restore

C.

From the CLI with command(tmos)« tmsh load /sys ucs no-license

D.

From the GUI, select the UCS file and click restore

Full Access
Question # 28

A BIG-IP Administrator finds the following log entry after a report of user issues connecting to a virtual server:

01010201: 2: Inet port exhaustion on 10.70.110.112 to 192.28.123.250:80 (proto 6)

How should the BIG-IP Administrator modify the SNAT pool that is associated with the virtual server?

A.

Remove the SNAT pool and apply SNAT Automap.

B.

Remove an IP address from the SNAT pool.

C.

Add an address to the SNAT pool.

D.

Increase the timeout of the SNAT addresses.

Full Access
Question # 29

Assuming there are open connections through an active system's NAT and a fail over occurs, by default, what happens to those connections?

A.

All open connections will be lost.

B.

All open connections will be maintained.

C.

The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the connection establishment.

D.

Longlived connections such as Telnet and FTP will be maintained while shortlived connections such as HTTP will be lost.

E.

All open connections are lost, but new connections are initiated by the newly active BIG IP, resulting in minimal client downtime.

Full Access
Question # 30

An IT support engineer needs to access and modify Virtual Servers in three partitions (Common /Banking and Dev) daily on a BIG-IP device. The company operates a Least Privilege access policy. What level of access does the IT support engineer need to ensure completion of daily roles?

A.

Manager in /common/Banking, and /Dev partitions

B.

Application Editor in /Common, /Banking, and /Dev partitions

C.

Manager in all partitions

D.

Application Editor in all partitions

Full Access
Question # 31

A 8IG-IP Administrator configures a Virtual Server to load balance traffic between 50 webservers for an

ecommerce website Traffic is being load balanced using the Least Connections (node) method.

The webserver administrators report that customers are losing the contents from their shopping carts

and are unable to complete their orders.

What should the BIG-IP Administrator do to resolve the issue?

A.

Change Default Persistence Profile setting to cookie

B.

Change Load Balancing method to Ratio (member)

C.

Change Default Persistence Profile setting to sipjnfo

D.

Change Load Balancing method to Ratio (node)

Full Access
Question # 32

A BIG-IP Administrator wants to add the ASM Module to an HA pair of BIG-IP devices. The BIG-IP Administrator has already installed a new Add-On License on both devices in the HA pair. What should the BIG-IP Administrator do next to use the module?

A.

Provision the new module on both BIG-IP device's

B.

Synchronize both BIG-IP devices

C.

Reboot both BIG-IP devices

D.

Reactivate the Licenses on both BIG IP devices

Full Access
Question # 33

A BIG-IP Administrator is performing maintenance on the active BIG-IP device of an HA pair. The BIG-IP

Administrator needs to minimize traffic disruptions.

What should the BIG-IP Administrator do to start the maintenance activity?

A.

Reboot the BIG-IP device.

B.

Move resources to a new Traffic Group.

C.

Force the BIG-IP device to standby.

D.

Disable switch ports of the BIG-IP device.

Full Access
Question # 34

Which method is recommended for creating a new user from the CLI?

A.

Run f5adduser username' then 'f5passwd username' from bash or tmsh

B.

Run tmsh create auth user username prompt for password' from bash

C.

edit bigip.conf to add the new user and the user's clear-text password

D.

Run useradd username' then 'passwd username' from bash tmsh

Full Access
Question # 35

A BIG-IP Administrator needs to install a HotFix on a standalone BIG-IP device, which has HD1.1 as the Active Boot Location. The BIG-IP Administrator has already re-activated the license and created an UCS archive of the configuration. In which sequence should the BIG-IP Administrator perform the remaining steps?

A.

Install HotFix in HD 1.1, Reboot the BIG-IP device. Install UCS Archive

B.

Install HotFix in HO 1.2, Install base Image in HD 1.2, Activate HD1.2

C.

Install base Image in HD1.2, Install HotFix in HD1.2, Activate HD 1.2

D.

Activate HD 1.2, Install base image in HD 1.2. Install HotFix in HD 1.2

Full Access
Question # 36

Which statement is true concerning cookie persistence?

A.

Cookie persistence allows persistence independent of IP addresses.

B.

Cookie persistence allows persistence even if the data are encrypted from client to pool member.

C.

Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.

D.

If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system.

Full Access
Question # 37

The current status of a given pool is offline (red). Which condition could explain that state? Assume the descriptions below include all monitors assigned for each scenario.

A.

No monitors are currently assigned to any pool, member or node.

B.

The pool has a monitor assigned to it, and none of the pool members passed the test.

C.

The pool has a monitor assigned to it, and only some of the pool's members passed the test.

D.

A monitor is assigned to all nodes and all nodes have passed the test. The pool's members have no specific monitor assigned to them.

Full Access
Question # 38

The BIG-IP Administrator generates QKView using tmsh command "qkview -SO". In which directory does the BIG-IP appliance save the QKView?

A.

/etc/tmp

B.

/var/tmp

C.

/shared/qkview

D.

/var /tmp/qkview

Full Access