Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Exam Prep Free

101 Exam Prep Free

Table of Contents

Toggle
  • 101 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
  • Access Full 101 Exam Prep Free

101 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day

Getting ready for the 101 certification? Our 101 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day

Effective 101 exam prep free is the key to success. With our free practice questions, you can:

  • Get familiar with exam format and question style
  • Identify which topics you’ve mastered—and which need more review
  • Boost your confidence and reduce exam anxiety

Below, you will find 50 realistic 101 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.

Question 1

How is persistence configured?

A. Persistence is an option within each pool’s definition.

B. Persistence is a profile type; an appropriate profile is created and associated with virtual server.

C. Persistence is a global setting; once enabled, load balancing choices are superseded by the persistence method that is specified.

D. Persistence is an option for each pool member. When a pool is defined, each member’s definition includes the option for persistence.

 


Suggested Answer: B

 

 

Question 2

What is the purpose of floating self-IP addresses?

A. to define an address that grants administrative access to either system at any time

B. to define an address that allows either system to initiate communication at any time

C. to define an address that allows network devices to route traffic via a single IP address

D. to define an address that gives network devices greater flexibility in choosing a path to forward traffic

 


Suggested Answer: C

 

 

Question 3

How is traffic flow through transparent virtual servers different from typical virtual servers? (Choose two.)

A. any text string within a cookie

B. any bytes within the initial client request packet

C. an IP address

D. the value in the tcp acknowledgement field

 


Suggested Answer: AC

 

 

Question 4

IP Enforcer blocks IP addresses that have repeatedly and regularly attacked the site.

A. True

B. False

 


Suggested Answer: A

 

 

Question 5

DRAG DROP -
Place the following items in the order that the BIG-IP device uses when processing a packet.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 6

Listeners that correspond to nonfloating self IP addresses are stored in which configuration file?

A. /config/BIG-IP.conf

B. /config/BIG-IP_base.conf

C. /config/gtm/wideip.conf

D. /config/BIG-IP_local.conf

 


Suggested Answer: D

 

 

Question 7

Assuming there are open connections through an active system's virtual servers and a failover occurs, by default, what happens to the connections?

A. All open connections are lost.

B. All open connections are maintained.

C. When persistence mirroring is enabled, open connections are maintained even if a failover occurs.

D. Long-lived connections such as Telnet and FTP are maintained, but short-lived connections such as HTTP are lost.

E. All open connections are lost, but new connections are initiated by the newly active BIG-IP, resulting in minimal client downtime.

 


Suggested Answer: A

 

 

Question 8

Which three of these file types work well with HTTP compression? (Choose three.)

A. MP4 videos

B. Digital photos

C. Text files

D. Static HTML Web pages

E. CD quality songs

F. Microsoft Word documents

 


Suggested Answer: CDF

 

 

Question 9

The partial configuration below includes an iRule, a virtual server, and pools. When traffic from the client at 160.10.10.10:2056 connects to the virtual server
Test_VS and sends an HTTP request, what will the client's source address be translated to as the traffic is sent to the chosen pool member?
 Image

A. 160.10.10.IOC.160.10.10.10

B. It could be either 10.10.10.10 or 10.10.10.11.

C. 10.10.10.2

D. 200.10.10.1

E. 10.10.10.1

 


Suggested Answer: E

 

 

Question 10

True or False, WOM speeds up large file data transfer across the WAN between a Windows client and a Windows file Server.

A. True

B. False

 


Suggested Answer: A

 

 

Question 11

Which statement is correct if a TOP-based monitor is assigned to an LTM System and an HTTP-based monitor is assigned to one of that LTM System's Virtual
Servers?

A. The Virtual Server status is based on the TCP monitor only.

B. The Virtual Server status is based on the HTTP monitor only.

C. GTM Systems do not allow monitors on both an LTM System and one of its Virtual Servers.

D. The Virtual Server status is based on both the TOP and HTTP monitor; if either fails, the Virtual Server is unavailable.

E. The Virtual Server status is based on both the TOP and HTTP monitor; if either succeeds, the Virtual Server is available.

 


Suggested Answer: B

 

 

Question 12

Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?

A. Modular Functionality

B. iApps

C. TMOS

D. DevCentral

 


Suggested Answer: D

 

 

Question 13

The Policy Builder benefits include:

A. Doesn’t require in depth web application knowledge

B. Only requires limited ASM knowledge

C. All of the above

D. Very low administrative impact

 


Suggested Answer: C

 

 

Question 14

An HTTP class is available -

A. on any BIG-IP LTM system

B. only when ASM is licensed.

C. only when ASM or WA are licensed.

D. only when a specific license key is required.

 


Suggested Answer: A

 

 

Question 15

Which of the following is NOT a benefit of using SSL offload?

A. It increases the bandwidth between the client and LTM.

B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.

C. The organization requires far less SSL certificates.

D. The CPU processing load on backend servers is reduced.

E. It enables iRules to be used on traffic arriving to LTM that is encrypted.

 


Suggested Answer: A

 

SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.

 

Question 16

The ARX saves customers time, money and frustration through a stub-based system that makes a slight modification to each file in order to more efficiently sort and store end user data.

A. True

B. False

 


Suggested Answer: B

 

 

Question 17

In the following configuration, a virtual server has the following HTTP class configuration:
 Image
A request arriving for WWW.F5.COM will be matched by which class(es)?

A. Class 1

B. Class 2

C. Both Class 1 and Class 2

D. The request will be dropped

 


Suggested Answer: B

 

 

Question 18

Which two can be a part of a pool's definition? (Choose two.)

A. rule(s)

B. profile(s)

C. monitor(s)

D. persistence type

E. load balancing mode

 


Suggested Answer: CE

 

 

Question 19

Which three can be a part of a pool's definition? (Choose three.)

A. Link

B. Monitors

C. Wide IPs

D. Persistence

E. Data Centers

F. Virtual Servers

 


Suggested Answer: BDF

 

 

Question 20

What occurs when a load command is issued?

A. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {170.16.20.1:80}

B. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80}

C. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{} }

D. rootBIG-IPsystem[Active][tmos.Itm.pool]#create pooh members add {172.16.20.1:80{priority group 2}}

 


Suggested Answer: A

 

 

Question 21

Which of the following can be accomplished using iRules?

A. Track inbound and outbound traffic

B. Perform deep packet inspection

C. Inspect traffic and drop it

D. All of the above

E. Intercept traffic and redirect it

 


Suggested Answer: D

 

 

Question 22

Replicating a large database between sites could take several hours without WOM, and only several minutes with WOM.

A. True

B. False

 


Suggested Answer: A

 

 

Question 23

When using the setup utility to configure a redundant pair, you are asked to provide a "Failover Peer IP". Which address is this?

A. an address of the other system in its management network

B. an address of the other system in a redundant pair configuration

C. an address on the current system used to listen for failover messages from the partner BIG-IP

D. an address on the current system used to initiate mirroring and network failover heartbeat messages

 


Suggested Answer: B

 

 

Question 24

Which is NOT a function of ASM?

A. Attack signature enforcement

B. HTTP protocol enforcement

C. Network security

D. Parameter value enforcement

 


Suggested Answer: C

 

 

Question 25

Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?

A. HTTP RFC compliancy checks

B. Length restrictions and attack signatures

C. Length restrictions and site cookie compliancy checks

D. Metacharacter enforcement and HTTP RFC compliancy check

 


Suggested Answer: B

 

 

Question 26

FILL BLANK -
GTM uses the F5 ___________ protocol to synchronize performance metrics between GTM devices. (Fill in)

 


Suggested Answer: iQuery

 

 

Question 27

A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)

A. TCP

B. HTTP

C. HTTPS

D. ClientSSL

E. ServerSSL

 


Suggested Answer: DE

 

Reference:
https://support.f5.com/csp/article/K12015

 

Question 28

ASM provides antivirus protection by:

A. Extracting files being uploaded and sending them to an AV system via ICAP

B. Running a local antivirus program on the BIG-IP

C. None of the above

D. Using IP Penalty enforcement to block requests from hackers IPs

 


Suggested Answer: A

 

Supported ICAP Servers in TMOS 11.5:
<img src=”https://www.examtopics.com/assets/media/exam-media/04267/0006300001.jpg” alt=”Reference Image” />

 

Question 29

When configuring a Virtual Server to use an iRule with an HTTP_REQUEST event, which lists required steps in a proper order to create all necessary objects?

A. create profiles, create the iRule, create required pools, create the Virtual Server

B. create the Virtual Server, create required pools, create the iRule, edit the Virtual Server

C. create a custom HTTP profile, create required pools, create the Virtual Server, create the iRule

D. create required pools, create a custom HTTP profile, create the iRule, create the Virtual Server

 


Suggested Answer: B

Community Answer: D

 

Question 30

Which three of the following are unique differentiators for F5 in the marketplace? (Choose three.)

A. VLANs

B. Load-balancing pools

C. Secure remote access

D. TMOS

E. OneConnect

F. iRules

 


Suggested Answer: DEF

 

 

Question 31

In the current version of BIG-IP, what happens if the GTM does not find a wide IP that matches the DNS request?

A. It sends a broadcast request to all GTM devices.

B. It uses iQuery to request the information from LTM.

C. It sends a request to its configured backup GTM device.

D. It sends an un-resolvable error to the client.

E. It sends the request to an external DNS.

 


Suggested Answer: E

 

 

Question 32

Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)

A. Connect the GTM and LTM with a network crossover cable.

B. Synchronize the big3d versions between GTM and LTM.

C. Add the LTM object to the GTM configuration.

D. Configure the GTM and LTM to we MAC masquerading.

E. Ensure that GTM and LTM use the same floating IP address.

F. Exchange SSL certificates between the two devices.

 


Suggested Answer: BCF

 

Integrating LTM systems with GTM systems on a network
Running the bigip_add utility –
Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM.
Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other.
When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems. http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm-implementations11-3-0/7.html
Note:
The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.

 

Question 33

To function properly, an Enterprise Manager device is required within each data center.

A. True

B. False

 


Suggested Answer: B

 

 

Question 34

Administrators can specify an APM access profile when defining a virtual server in LTM.

A. True

B. False

 


Suggested Answer: A

 

 

Question 35

Which of the following are default settings when using the Policy Builder to build a security policy based on the QA lab deployment scenario? (Choose two.)

A. All learned entities are placed in staging.

B. Attack signatures are not placed in staging

C. The security policy is placed in blocking mode

D. Tightening is enabled only on file types and parameters.

 


Suggested Answer: BC

 

 

Question 36

LTM can only load balance outbound traffic by using iRules

A. True

B. False

 


Suggested Answer: A

Community Answer: B

 

Question 37

A standard virtual server is defined with a pool and a SNAT using automap. All other settings for the virtual server are at defaults. When client traffic is processed by the BIG-IP, what will occur to the IP addresses?

A. Traffic initiated by the pool members will have the source address translated to a self-IP address but the destination address will not be changed.

B. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address.

C. Traffic initiated by selected clients, based on their IP address, will have the source address translated to a self-IP address but the destination will only be translated if the traffic is destined to the virtual server.

D. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address. Traffic arriving destined to other destinations will have the source translated to a self-IP address only.

 


Suggested Answer: B

 

 

Question 38

Which of the following is correct regarding User-defined Attack signatures?

A. User-defined signatures use an F5-supplied syntax

B. User-defined signatures may only use regular expressions

C. Attack signatures may be grouped within system-supplied signatures

D. User-defined signatures may not be applied globally within the entire policy

 


Suggested Answer: A

 

 

Question 39

Which of the following are properties of an ASM logging profile? (Choose three.)

A. storage type

B. storage filter

C. storage policy

D. web application

 


Suggested Answer: AB

 

 

Question 40

Which process or system can be monitored by the BIG-IP system and used as a failover trigger in a redundant pair configuration.

A. bandwidth utilization

B. duplicate IP address

C. CPU utilization percentage

D. VLAN communication ability

 


Suggested Answer: D

 

 

Question 41

With standard DNS, assuming no DNS request failures, which process describes the normal resolution process on a "first time" DNS request?

A. Client requests address from root server, root server returns IP address to Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

B. Client requests address from LDNS, LDNS requests from GTM, GTM requests from Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

C. Client requests address from LDNS, Authoritative DNS receives request from root server, root server returns LDNS address, LDNS returns client address, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

D. Client requests address from LDNS, LDNS requests from root server, root server returns Authoritative DNS address, LDNS requests from Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

 


Suggested Answer: D

 

 

Question 42

A GTM System would like to ensure that a given LTM System is reachable and iQuery communication is allowed prior to sending it client request. What would be the simplest monitor template to use?

A. TCP

B. ICMP

C. HTTP

D. BIG-IP

E. SNMP

 


Suggested Answer: D

 

 

Question 43

Which action will take place when a failover trigger is detected by the active system?

A. The active device will take the action specified for the failure.

B. The standby device also detects the failure and assumes the active role.

C. The active device will wait for all connections to terminate and then failover.

D. The standby device will begin processing virtual servers that have failed, but the active device will continue servicing the functional virtual servers.

 


Suggested Answer: A

 

 

Question 44

If the BIG-IP device is NOT always located between the client and the server, it will NOT provide full optimization and security.

A. True

B. False

 


Suggested Answer: A

 

 

Question 45

Which four of the following items are physical objects used by GTM?

A. Virtual servers

B. Links

C. Servers

D. Wide IPs

E. Data centers

F. Pools

 


Suggested Answer: ABCE

 

These components include:
Data centers, Servers, Links, Virtual servers
http://support.f5.com/kb/en-us/products/bigip_gtm/manuals/product/gtm_config_10_2/gtm_components_overview.html
Links –
+ Wide IPs + Data centers + Pools
Links –
+ Wide IPs + Data centers + Virtual servers
Links –
+ Servers + Virtual servers + Pools the physical network, such as data centers, servers, and links, and the components that comprise the logical network, such as wide IPs, pools, and global settings. Most of the configuration components you build using the Configuration utility are saved to the wideip.conf file.
Logical objects/components include: Listeners – Pools – Wide IPs – Distributed applications

 

Question 46

Which of the following statements about cookie persistence is NOT true?

A. The cookie’s timeout value can be customized.

B. They are F5’spreferred persistence method.

C. No persistence information is placed on LTM.

D. Web servers must be configured to send cookies to clients.

E. They do not add a performance impact on LTM.

 


Suggested Answer: D

 

 

Question 47

Which of the following statements about Web server offload is NOT true?

A. It performs rate shaping to reduce overflow.

B. It forces the client browser to use multiple connections streams.

C. It uses OneConnect to reduce multiple TCP connections.

D. It utilizes cached content to prevent unnecessary trips for the same content.

E. It uses specialized hardware for SSL offload.

 


Suggested Answer: B

 

 

Question 48

On a BIG-IP ASM 3600, in standalone mode, which of the following pool configurations is valid?

A. Pool named vs_pool with 1 pool member, no persistence, and no load balancing method

B. Pool named vs_pool with 1 pool member, cookie persistence, and ratio load balancing method

C. Pool named vs_pool with 2 pool members, cookie persistence, and ratio load balancing method

D. Pool named vs_pool with 3 pool members, source IP persistence, and least connections load balancing method

 


Suggested Answer: A

 

 

Question 49

GTM can load balance to LTM in addition to non-BIG-IP hosts.

A. True

B. False

 


Suggested Answer: A

 

 

Question 50

The following request is sent to the BIG-IP ASM System:
GET http://www.example.local/financials/week1.xls?display=yes&user=john&logon=true
Which of the following components in this requests line represent the query string?

A. .xls

B. /week1.xls

C. /financials/week1.xls

D. display=yes&user=john&logon=true

 


Suggested Answer: D

 

 

Access Full 101 Exam Prep Free

Want to go beyond these 50 questions? Click here to unlock a full set of 101 exam prep free questions covering every domain tested on the exam.

We continuously update our content to ensure you have the most current and effective prep materials.

Good luck with your 101 certification journey!

Share18Tweet11
Previous Post

XK0-005 Practice Exam Free

Next Post

101-500 Exam Prep Free

Next Post

101-500 Exam Prep Free

102-500 Exam Prep Free

1V0-21.20 Exam Prep Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.