Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

101 Practice Questions Free

Table of Contents

Toggle
  • 101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full 101 Practice Questions Free

101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the 101 certification exam? Kickstart your success with our 101 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with 101 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free 101 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

The BIG-IP determines the lowest connection speed between the client and the server and then uses that for both connections.

A. True

B. False

 


Suggested Answer: B

 

 

Question 2

ARX can classify data based on all of the following EXCEPT:

A. Paths

B. File Size

C. Extensions

D. Security Level

E. File Name

 


Suggested Answer: D

 

 

Question 3

Similar to LTM monitors, GTM monitors use both an Interval and a Timeout value.

A. True

B. False

 


Suggested Answer: A

 

 

Question 4

Monitors can be assigned to which three resources? (Choose three.)

A. NATs

B. pools

C. iRules

D. nodes

E. SNATs

F. pool members

G. virtual servers

 


Suggested Answer: BDF

 

 

Question 5

A virtual server is defined using a source address based persistence profile. The last five connections were A, B, C, A, C. Given the conditions shown in the graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?
 Image

A. 10.10.20.1:80

B. 10.10.20.2:80

C. 10.10.20.3:80

D. 10.10.20.4:80

E. 10.10.20.5:80

 


Suggested Answer: B

Community Answer: C

 

Question 6

Select the best word or phrase to complete the following sentence.
Using the _______ feature in GTM, F5's Application Delivery Firewall solution can handle a significantly higher number of queries than traditional DNS servers.

A. DNS Express

B. BIND

C. Site availability request

D. Location-based routing

 


Suggested Answer: A

 

 

Question 7

Which two processes are involved when BIG-IP systems issue traps? (Choose two.)

A. bigd

B. alertd

C. smtpd

D. syslogng

 


Suggested Answer: BD

Community Answer: BD

 

Question 8

Monitors can be assigned to which three resources? (Choose three.)

A. Pools

B. Servers

C. Wide-IPs

D. Data Centers

E. Pool Members

 


Suggested Answer: ABE

 

 

Question 9

If your customer has a policy requirement that cannot be handled in the Visual Policy Editor, what would you use to supplement the Visual Policy Editor?

A. iApps

B. TMOS

C. iControl

D. iRules

 


Suggested Answer: D

Community Answer: D

 

Question 10

When using SNAT, which additional IP addresses will the BIG-IP system change? (Choose two.)

A. The source IP address on the client to BIG-IP request packet.

B. The source IP address on the BIG-IP to pool member request packet.

C. The destination IP address on the BIG-IP to pool member request packet.

D. The source IP address on the BIG-IP to client response packet.

E. The destination IP address on the BIG-IP to client response packet.

F. The destination IP address on the pool member to BIG-IP response packet.

 


Suggested Answer: BE

 

 

Question 11

When an optimized TCP connection exists between LTM and the pool member, LTM can accept server responses faster than the client. What is the name of this feature?

A. HTTP caching

B. OneConnect

C. TCP connection queuing

D. Content spooling

E. Priority activation

 


Suggested Answer: D

 

 

Question 12

Which of the following is not a configurable parameter data type?

A. Email

B. Array

C. Binary

D. Decimal

 


Suggested Answer: B

 

 

Question 13

Identifying users by their IP address is a sufficient method of performing authentication and authorization.

A. True

B. False

 


Suggested Answer: B

 

 

Question 14

What is the difference between primary and secondary DNS servers?

A. Only primary servers can issue authoritative responses.

B. Primary servers host the original copy of the zone database file.

C. Primary servers resolve names more efficiently than secondary servers.

D. Secondary servers act as backups and will respond only if the primary fails.

 


Suggested Answer: B

 

 

Question 15

Which of the following statements about cookie persistence is NOT true?

A. The cookie’s timeout value can be customized.

B. They are F5’spreferred persistence method.

C. No persistence information is placed on LTM.

D. Web servers must be configured to send cookies to clients.

E. They do not add a performance impact on LTM.

 


Suggested Answer: D

 

 

Question 16

Which of the following is correct regarding static parameters?

A. A static parameter is stored in a frame cookie.

B. A static parameter is predefined by the web application logic.

C. A static parameter is learned only by using the Deployment Wizard.

D. A static parameter is mapped once when creating the application flow model.

 


Suggested Answer: B

 

 

Question 17

In order to ensure that a specific file type is never moved down to a secondary file tier, the administrator should:

A. Set up an automated bot that accesses that file once a week.

B. This is not possible on the ARX.

C. Set a policy that the file type remains on primary storage.

D. Instruct the end users to put the file in a non-tiered directory.

 


Suggested Answer: C

 

 

Question 18

Which aspect of F5's Intelligent Services Platform helps you extend your security conversation to include F5professionals and customers?

A. Modular Functionality

B. iApps

C. TMOS

D. DevCentral

 


Suggested Answer: D

 

 

Question 19

Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?

A. Floating IPs

B. Fallback host

C. Auto last hop

D. SNAT automap

E. Pool offload

F. Priority group activation

 


Suggested Answer: D

Community Answer: B

http://support.f5.com/kb/en-us/products/bigip_ltm/manuals/product/ltm_configuration_guide_10_0_0/ltm_pools.html

 

Question 20

APM provides access control lists at which two OSI layers? (Choose two.)

A. Layer 5

B. Layer 4

C. Layer 7

D. Layer 6

E. Layer 2

 


Suggested Answer: BC

 

 

Question 21

Which of the following are four of the benefits of the TMOS architecture? (Choose four.)

A. User authentication

B. Server-side optimization

C. Dynamic DDoS protection

D. Web application security

E. Client-side optimization

F. Antivirus checking

 


Suggested Answer: BCDE

 

 

Question 22

Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)

A. Synchronization occurs via a TCP connection using ports 683 and 684.

B. Connection mirroring data is shared via a TCP connection using port 1028.

C. Persistence mirroring data is shared via a TCP connection using port 1028.

D. Connection mirroring data is shared through the serial failover cable unless network failover is enabled.

 


Suggested Answer: BC

 

 

Question 23

Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin.

A. True

B. False

 


Suggested Answer: A

 

 

Question 24

What are the best reasons for using the Deployment Wizard? (Choose three.)

A. Flow level parameters checking is required.

B. The application encoding scheme needs to be determined by the BIG-IP ASM System.

C. Sufficient time is available to allow completely automated policy building based on observing live traffic.

D. The application platform must be protected against known attacks for the specific operating system, web server, and database.

 


Suggested Answer: BCD

 

 

Question 25

Which two methods can be used to determine which BIG-IP is currently active? (Choose two.)

A. The bigtop command displays the status.

B. Only the active system’s configuration screens are active.

C. The status (Active/Standby) is embedded in the command prompt.

D. The ifconfig a command displays the floating addresses on the active system.

 


Suggested Answer: AC

 

 

Question 26

One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.

A. True

B. False

 


Suggested Answer: A

 

 

Question 27

What is the main business driver for bringing Enterprise Manager into the network infrastructure?

A. Consolidate management of administrator and user accounts

B. Consolidate management of licenses

C. Consolidate management of SSL certificates

D. Consolidate management of BIG-IP devices

E. Consolidate management of access policies

 


Suggested Answer: D

 

 

Question 28

The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C, E, D and B. Given the virtual server, pool, and persistence definitions and statistics shown in the above graphic, which member will be used for the next connection?
 Image

A. 10.10.20.1:80

B. 10.10.20.2:80

C. 10.10.20.3:80

D. 10.10.20.4:80

E. 10.10.20.5:80

F. It cannot be determined with the information given.

 


Suggested Answer: C

 

 

Question 29

Which action CANNOT be performed by an iRule?

A. Direct a connection request to a specific pool.

B. Substitute a server’s response with alternate data.

C. Chang the virtual server’s default pool.

D. Direct a client’s request to a pool based on the client’s browser’s language.

E. Limit a given client to a set amount of bandwidth.

F. Discard a client before connecting to a server.

 


Suggested Answer: C

 

 

Question 30

Which of the following are four of the security benefits of TMOS? (Choose four.)

A. It verifies traffic based on antivirus signatures.

B. It provides protection against DDoS.

C. It uses SYN cookies and dynamic connection reapers.

D. It supplies guidance for poorly developed applications.

E. It denies all traffic that hasn’t been defined.

F. It can hide confidential information from outbound traffic.

 


Suggested Answer: BCEF

 

 

Question 31

ASM provides antivirus protection by:

A. Extracting files being uploaded and sending them to an AV system via ICAP

B. Running a local antivirus program on the BIG-IP

C. None of the above

D. Using IP Penalty enforcement to block requests from hackers IPs

 


Suggested Answer: A

 

Supported ICAP Servers in TMOS 11.5:
<img src=”https://www.examtopics.com/assets/media/exam-media/04267/0006300001.jpg” alt=”Reference Image” />

 

Question 32

A pool is using Round Trip Time as its load balancing method (Alternate: Round Robin; Fallback:None). The last five resolutions have been C, D, C, D, C. Given the current conditions shown in the table below, which address will be used for the next resolution?
 Image

A. A

B. B

C. C

D. D

 


Suggested Answer: B

 

 

Question 33

Which VLANs must be enabled for a SNAT to perform as desired (translating only desired packets)?

A. The SNAT must be enabled for all VLANs.

B. The SNAT must be enabled for the VLANs where desired packets leave the BIG-IP.

C. The SNAT must be enabled for the VLANs where desired packets arrive on the BIG-IP.

D. The SNAT must be enabled for the VLANs where desired packets arrive and leave the BIG-IP.

 


Suggested Answer: C

Community Answer: B

 

Question 34

Which four of these scenarios will benefit from F5's WAN Optimization Module? (Choose four.)

A. An international organization with data centers in different countries.

B. An organization that does not want to rely on using tape backup.

C. An organization with one site but hundreds of Web servers.

D. An organization whose users create extremely large files.

E. An organization that expects their Web site usage to double in the next year.

F. An organization attempting to lower costs by reducing the number of data centers.

 


Suggested Answer: ABDF

 

 

Question 35

Select F5 platforms have which three certifications? (Choose three.)

A. FIPS

B. SECG

C. NEBS

D. IEEE

E. Common Criteria

F. AFSSI

 


Suggested Answer: ACE

 

 

Question 36

Which of the following is correct regarding User-defined Attack signatures?

A. User-defined signatures use an F5-supplied syntax

B. User-defined signatures may only use regular expressions

C. Attack signatures may be grouped within system-supplied signatures

D. User-defined signatures may not be applied globally within the entire policy

 


Suggested Answer: A

 

 

Question 37

An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?

A. They want GTM to examine all DNS queries.

B. They want GTM to make load balancing decisions based on metrics.

C. They have data centers in several countries.

D. They are using several operating systems for the local DNS servers.

 


Suggested Answer: C

 

 

Question 38

Using Fast Cache with ASM will:

A. Improve user experience

B. Improve server performance

C. All of the above

D. Improve BIG-IP ASM performance

 


Suggested Answer: C

 

 

Question 39

Which of the following is NOT a benefit of using SSL offload?

A. It increases the bandwidth between the client and LTM.

B. It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.

C. The organization requires far less SSL certificates.

D. The CPU processing load on backend servers is reduced.

E. It enables iRules to be used on traffic arriving to LTM that is encrypted.

 


Suggested Answer: A

 

SSL offload:
It enables LTM to decrypt traffic, examine the payload, and then re-encrypt before sending it to a pool member.
The organization requires far less SSL certificates.
The CPU processing load on backend servers is reduced.
It enables iRules to be used on traffic arriving to LTM that is encrypted.

 

Question 40

Select the question you would ask your customer related to DNS attacks. Based on the material, choose the most appropriate question.

A. How do you secure you DNS infrastructure against attacks?

B. Do you rely on your network firewall to protect you DNS server?

C. Do you over-provision your DNS infrastructure?

D. Do you regularly update BIND or some other DNS application to the latest release?

 


Suggested Answer: A

 

 

Question 41

What percentage of storage in a typical environment is actively used and modified?

A. 5%

B. 50%

C. 25%

D. 10%

E. 90%

 


Suggested Answer: D

 

 

Question 42

Which of the following statements best describes the ARX architecture?

A. The ARX’s split path architecture has a data path that handles the most common operations, and a control path that handles other operations requiring deeper inspection and updating of the index.

B. The ARX’s architecture has redundancy built in, allowing a single ARX to be deployed in most use cases which provides a huge cost savings to customers.

C. All of the above.

D. It is a software agent that installs on the storage device.

 


Suggested Answer: A

 

 

Question 43

In the following configuration, a virtual server has the following HTTP class configuration:
 Image
A request arriving for WWW.F5.COM will be matched by which class(es)?

A. Class 1

B. Class 2

C. Both Class 1 and Class 2

D. The request will be dropped

 


Suggested Answer: B

 

 

Question 44

By default, how frequently are log files rotated?

A. hourly

B. daily

C. weekly

D. There is no default; the administrator sets the frequency.

 


Suggested Answer: B

 

 

Question 45

When configuring monitors for individual pool members, which three options can be selected? (Choose three.)

A. inherit the pool’s monitor

B. choose a default monitor

C. inherit the Wide-IP’s monitor

D. assign a monitor to the specific pool member

E. do not assign any monitor to the specific pool member

 


Suggested Answer: ADE

 

 

Question 46

An LTM has the 3 virtual servers, four self IP addresses defined and the networks shown in the exhibit. Selected options for each object are shown below.
Settings not shown are at their defaults.
 Image
A connection attempt is made with a source IP and port of 10.20.100.50:2222 and a destination IP and port of 10.10.2.102:80.
When the request is processed, what will be the destination IP address?
 Image

A. Destination IP: 10.10.2.102

B. The request will be dropped.

C. Destination IP: pool member in the 192.168/16 network

D. Destination IP: pool member in the 172.16/16 network

 


Suggested Answer: C

 

 

Question 47

To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)

A. Visual Policy Editor

B. Policy Editor

C. Visual Editor

D. Policy creator

 


Suggested Answer: A

 

 

Question 48

When an administrator creates a new access policy in the Visual Policy Editor, which three options are included by default? (Choose three.)

A. A fallback option

B. An Allow Ad box

C. A Deny End box

D. An empty Resource Assign item

E. A Start box

F. A Block All option

 


Suggested Answer: ACE

 

 

Question 49

Which item is NOT a function of a properly deployed and configured ASM?

A. Detects attacks

B. Stops hackers from attacking

C. Provides protection visibility

D. Provides security agility

 


Suggested Answer: B

 

 

Question 50

When sizing a WebAccelerator deployment, you should base the WA capacity on the LTMcapacity.

A. True

B. False

 


Suggested Answer: B

 

 

Free Access Full 101 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of 101 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your 101 certification journey!

Share18Tweet11
Previous Post

XK0-005 Practice Test Free

Next Post

101-500 Practice Questions Free

Next Post

101-500 Practice Questions Free

102-500 Practice Questions Free

1V0-21.20 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.