Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

101 Mock Test Free

Table of Contents

Toggle
  • 101 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 101 Mock Test Free

101 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 101 certification exam? Start your preparation the smart way with our 101 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 101 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 101 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

When initially configuring the BIG-IP system using the config utility, which two parameters can be set. (Choose two.)

A. the netmask of the SCCP

B. the IP address of the SCCP

C. the port lockdown settings for the SCCP

D. the netmask of the host via the management port

E. the IP address of the host via the management port

F. the port lockdown settings for the host via the management port

 


Suggested Answer: DE

 

 

Question 2

The BIG-IP ASM System sets two types of cookies to enforce elements in the security policy. The two types are main and frame cookies. What is the purpose of the frame cookie? (Choose two.)

A. Validates domain cookies

B. Detects session expiration

C. Stores dynamic parameters and values

D. Handles dynamic parameter names and flow extractions

 


Suggested Answer: CD

 

 

Question 3

Which action CANNOT be performed by an iRule?

A. Direct a connection request to a specific pool.

B. Substitute a server’s response with alternate data.

C. Chang the virtual server’s default pool.

D. Direct a client’s request to a pool based on the client’s browser’s language.

E. Limit a given client to a set amount of bandwidth.

F. Discard a client before connecting to a server.

 


Suggested Answer: C

 

 

Question 4

The following iRule is being used within a persistence profile on a virtual server. Assuming the following HTTP requests are made within the same timeout window, what is the maximum number of persistence records that will be created iRule:
 Image

A. 4

B. 3

C. 10

D. It cannot be determined from the given data.

E. 5

F. 1

G. 0

 


Suggested Answer: A

 

 

Question 5

One reason APM beats the competition is its ability to perform both user authentication and authorization on a single device.

A. True

B. False

 


Suggested Answer: A

 

 

Question 6

What are two advantages of the Quality of Service (QoS) load balancing method? (Choose two.)

A. It resolves requests to the site with the highest QoS value in the IP header.

B. It combines multiple load balancing metric values in a single load balancing method.

C. It allows the GTM administrator to place relative values on each metric used to determine the optimum site.

D. It allows the GTM System to select the optimum virtual server based on all available path and server metrics.

 


Suggested Answer: BC

 

 

Question 7

You need to terminate client SSL traffic at the BIG-IP and also to persist client traffic to the same pool member based on a BIG-IP supplied cookie. Which four are profiles that would normally be included in the virtual server's definition? (Choose four.)

A. TCP

B. HTTP

C. HTTPS

D. ClientSSL

E. ServerSSL

F. CookieBased Persistence

 


Suggested Answer: ABDF

 

 

Question 8

A monitor has been defined using the HTTP monitor template. The send and receive strings were customized, but all other settings were left at their defaults.
Which resources can the monitor be assigned to?

A. only specific pool members

B. most virtual severs

C. most nodes

D. most pools

 


Suggested Answer: D

 

 

Question 9

An administrator is planning on solving latency issues by placing the backup data center in a neighboring city to the primary data center. Why isn't this effective solution?

A. It does not provide an acceptable disaster recovery solution.

B. It won’t improve latency between the data centers.

C. It won’t improve the backup time from the primary data center to the backup data center.

D. Users near the data centers will find their connections going back and forth between the two site

E. It costs more to have the data centers close together than further apart.

 


Suggested Answer: A

 

It does not provide an acceptable disaster recovery solution, it is too close in proximity

 

Question 10

Which two of the following statements are accurate descriptions of the ARX index? (Choose two.)

A. The ARX index stores the bulk of its data as bit arrays and answers most questions by performing bitwise logical operations on these bitmaps.

B. The ARX index contains the index keys in sorted order, with the leaf level of the index containing the pointer to the page and the row number in the data page.

C. The ARX index is the key enabler of transparent data mobility because the ARX tracks where files reside at all times, from creation through migration and deletion.

D. The ARX index is 100% disposable and can be rebuilt at any point in time without disrupting client or application access to data.

 


Suggested Answer: BD

 

 

Question 11

What is the purpose of the GTM Systems Address Exclusion List concerning local DNS servers?

A. to prevent probing of specific local DNSs

B. to prevent name resolution to specific Virtual Servers

C. to prevent name resolution for requests from specific local DNSs

D. to prevent probing of any local DNS servers by specific F5 devices

 


Suggested Answer: A

 

 

Question 12

Which of the following is a language used for content provided by a web server to a web client?

A. FTP

B. TCP

C. HTTP

D. HTML

 


Suggested Answer: D

 

 

Question 13

The following request is sent to the BIG-IP ASM System:
GET http://www.example.local/financials/week1.xls?display=yes&user=john&logon=true
Which of the following components in this requests line represent the query string?

A. .xls

B. /week1.xls

C. /financials/week1.xls

D. display=yes&user=john&logon=true

 


Suggested Answer: D

 

 

Question 14

FastCache will NOT work with compressed objects.

A. True

B. False

 


Suggested Answer: A

Community Answer: B

 

Question 15

When configuring a Virtual Server to use an iRule with an HTTP_REQUEST event, which lists required steps in a proper order to create all necessary objects?

A. create profiles, create the iRule, create required pools, create the Virtual Server

B. create the Virtual Server, create required pools, create the iRule, edit the Virtual Server

C. create a custom HTTP profile, create required pools, create the Virtual Server, create the iRule

D. create required pools, create a custom HTTP profile, create the iRule, create the Virtual Server

 


Suggested Answer: B

Community Answer: D

 

Question 16

Which three of these scenarios should you identify as being an APM opportunity? (Choose three.)

A. An organization using Novell Netware for authentication.

B. An organization that has been recently fined for failing security compliance.

C. An organization with a traveling sales force.

D. An organization with a single location and no remote employees.

E. An organization that needs to ensure users are using Symantec antivirus software.

F. An organization sharing a public Web site for all Internet users.

 


Suggested Answer: BCE

 

 

Question 17

Which statement accurately describes the difference between two load balancing modes specified as "member" and "node"?

A. There is no difference; the two terms are referenced for backward compatibility purposes.

B. When the load balancing choice references “node”, priority group activation is unavailable.

C. Load balancing options referencing “nodes” are available only when the pool members are defined for the “any” port.

D. When the load balancing choice references “node”, the addresses’ parameters are used to make the load balancing choice rather than the member’s parameters.

 


Suggested Answer: D

 

 

Question 18

Over the years, F5 has led the industry in which of the four following areas? (Choose three.)

A. Security

B. Acceleration

C. Application availability

D. Application scalability

E. Application design

F. Remote access

 


Suggested Answer: ABD

 

 

Question 19

Which three of the following must be done in order for GTM to properly communicate LTM? (Choose three.)

A. Connect the GTM and LTM with a network crossover cable.

B. Synchronize the big3d versions between GTM and LTM.

C. Add the LTM object to the GTM configuration.

D. Configure the GTM and LTM to we MAC masquerading.

E. Ensure that GTM and LTM use the same floating IP address.

F. Exchange SSL certificates between the two devices.

 


Suggested Answer: BCF

 

Integrating LTM systems with GTM systems on a network
Running the bigip_add utility –
Determine the self IP addresses of the BIG-IP LTM systems that you want to communicate with BIG-IP GTM.
Run the bigip_add utility on BIG-IP GTM. This utility exchanges SSL certificates so that each system is authorized to communicate with the other.
When the LTM and GTM systems use the same version of the big3d agent, you run the bigip_add utility to authorize communications between the systems. http://support.f5.com/kb/en-us/products/big-ip_gtm/manuals/product/gtm-implementations11-3-0/7.html
Note:
The BIG-IP GTM and BIG-IP LTM systems must have TCP port 4353 open through the firewall between the systems. The BIG-IP systems connect and communicate through this port.

 

Question 20

Which HTTP response code ranges indicate an error condition? (Choose two.)

A. 1xx

B. 2xx

C. 3xx

D. 4xx

E. 5xx

 


Suggested Answer: DE

 

 

Question 21

TMOS is an F5 software module that runs on the BIG-IP platform.

A. True

B. False

 


Suggested Answer: B

 

TMOS is multi-module OS on Big-IP platform

 

Question 22

A site has six members in a pool. All of the servers have been designed, built, and configured with the same applications. It is known that each client's interactions vary significantly and can affect the performance of the servers. If traffic should be sent to all members on a regular basis, which load balancing mode is most effective if the goal is to maintain a relatively even load across all servers.

A. Ratio

B. Priority

C. Observed

D. Round Robin

 


Suggested Answer: C

 

 

Question 23

The APM Dashboard enables administrators to monitor which two of these metrics? (Choose two.)

A. Number of active sessions

B. Number of new sessions

C. Number of denied users

D. Number of users from each country

 


Suggested Answer: AB

 

 

Question 24

With standard DNS, assuming no DNS request failures, which process describes the normal resolution process on a "first time" DNS request?

A. Client requests address from root server, root server returns IP address to Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

B. Client requests address from LDNS, LDNS requests from GTM, GTM requests from Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

C. Client requests address from LDNS, Authoritative DNS receives request from root server, root server returns LDNS address, LDNS returns client address, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

D. Client requests address from LDNS, LDNS requests from root server, root server returns Authoritative DNS address, LDNS requests from Authoritative DNS, Authoritative DNS returns requested IP address, LDNS returns requested IP address to client.

 


Suggested Answer: D

 

 

Question 25

Which of the following is NOT a profile type on the BIG-IP?

A. Protocol

B. Application

C. Persistence

D. Authentication

E. SSL

 


Suggested Answer: B

 

 

Question 26

What will likely happen if you were to define a LTM System in the wrong Data Center?

A. There would be no effect if the LTM System is defined in the wrong Data Center.

B. The GTM System would not be able to communicate with that LTM System.

C. Data from probes from that LTM System might result in inaccurate path metrics and load balancing decisions.

D. The GTM System would not be able to resolve Wide-IPs to the addresses associated with that LTM System’s Virtual Servers.

 


Suggested Answer: C

 

 

Question 27

A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all other factors are equal and traffic should be sent to all members, which two load balancing methods are most appropriate? (Choose two.)

A. Ratio

B. Priority

C. Observed

D. Round Robin

 


Suggested Answer: AC

 

 

Question 28

When configuring monitors for individual pool members, which three options can be selected? (Choose three.)

A. inherit the pool’s monitor

B. choose a default monitor

C. inherit the Wide-IP’s monitor

D. assign a monitor to the specific pool member

E. do not assign any monitor to the specific pool member

 


Suggested Answer: ADE

 

 

Question 29

The PCI compliance report is proof that a company is secure.

A. True

B. False

 


Suggested Answer: B

 

 

Question 30

Which of these statements about a stream profile is false?

A. It is applied to an HTTP class profile.

B. It is not recommended for telnet traffic.

C. It can replace one data string for another for all traffic going through a virtual server.

D. It applies to both inbound and outbound traffic.

E. It will not inspect HTTP headers when an HTTP profile is present.

 


Suggested Answer: A

 

 

Question 31

Which of the following is NOT a logging option within an APM access control entry?

A. Packet

B. Verbose

C. Nominal

D. Summary

E. None

 


Suggested Answer: C

 

 

Question 32

Which of the following is a client-side action in the Visual Policy Editor that prevents external access and deletes any files created during a secure access session?

A. Windows Group Policy

B. Resource Assign

C. Protected Workspace

D. Virtual Keyboard

E. Browser Cache and Session Control

 


Suggested Answer: C

 

 

Question 33

In the next few years, 75% of new storage capacity will shift to unstructured data (also known as file data). Which two of the following are examples of unstructured data? (Choose two.)

A. CAD drawings

B. Location data in a GIS (geographic information system)

C. Customer records and product records in a CRM (customer relationship management) database

D. Microsoft Office and PDF documents

 


Suggested Answer: AD

 

 

Question 34

Which three parameters could be used to determine whether a connection request will have the source address translated as the request is processed? (Choose three.)

A. the client’s router’s IP address

B. the client’s browser’s preferred language

C. the client’s IP netmask

D. the client’s TCP port

E. the client’s IP address

F. the client IP fragment offset

 


Suggested Answer: BDE

Community Answer: CDE

 

Question 35

The least connections load balancing method functions best when all pool members share similar characteristics.

A. True

B. False

 


Suggested Answer: A

 

 

Question 36

Using file virtualization, what can the ARX do for customers?

A. Match data to the most appropriate tier of storage (e.g. critical data on tier 1 storage; older data on secondary storage tier).

B. All of the above.

C. Move individual files or entire file systems in real-time without disruption of down-time.

D. Automate many storage management tasks such as storage tiering, dynamic capacity balancing, and no disruptive data migration.

 


Suggested Answer: B

 

 

Question 37

A security audit has determined that your web application is vulnerable to a cross site scripting attack. Which of the following measures are appropriate when building a security policy? (Choose two.)

A. Cookie length must be restricted to 1024 bytes.

B. Attack signature sets must be applied to any user input parameters.

C. Parameter data entered for explicit objects must be checked for minimum and maximum values.

D. Parameter data entered for flow level parameters must allow some metacharacters but not others.

 


Suggested Answer: BD

 

 

Question 38

A standard virtual server is defined with a pool and a SNAT using automap. All other settings for the virtual server are at defaults. When client traffic is processed by the BIG-IP, what will occur to the IP addresses?

A. Traffic initiated by the pool members will have the source address translated to a self-IP address but the destination address will not be changed.

B. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address.

C. Traffic initiated by selected clients, based on their IP address, will have the source address translated to a self-IP address but the destination will only be translated if the traffic is destined to the virtual server.

D. Traffic initiated to the virtual server will have the destination address translated to a pool member address and the source address. Traffic initiated to the virtual server will have the destination address translated to a pool member. address and the source address translated to a self-IP address. Traffic arriving destined to other destinations will have the source translated to a self-IP address only.

 


Suggested Answer: B

 

 

Question 39

Which of the following methods of protection operates on server responses?

A. Dynamic parameter protection

B. Response code validation and response scrubbing

C. Response code validation and HTTP method validation

D. HTTP RFC compliancy check and metacharacter enforcement

 


Suggested Answer: B

 

 

Question 40

Which four of the following statements about LDNS probes are true? (Choose four.)

A. Only GTM devices can act as a prober.

B. They check each requesting LDNS that has made a request of the GTM.

C. They can determine available cache size on the client.

D. They are used to develop path metrics.

E. They verify the link between a data center and an LDNS.

F. Probing only takes place if GTM is configured to use dynamic load balancing.

 


Suggested Answer: BDEF

 

 

Question 41

Listeners that correspond to nonfloating self IP addresses are stored in which configuration file?

A. /config/BIG-IP.conf

B. /config/BIG-IP_base.conf

C. /config/gtm/wideip.conf

D. /config/BIG-IP_local.conf

 


Suggested Answer: D

 

 

Question 42

Which two processes are involved when BIG-IP systems issue traps? (Choose two.)

A. bigd

B. alertd

C. smtpd

D. syslogng

 


Suggested Answer: BD

Community Answer: BD

 

Question 43

A virtual server is listening at 10.10.1.100:any and has the following iRule associated with it:
 Image
If a user connects to 10.10.1.100 and port 22, which pool will receive the request?

A. ftp pool

B. telnet pool

C. None. The request will be dropped.

D. Unknown. The pool cannot be determined from the information provided.

 


Suggested Answer: D

 

 

Question 44

Which statement is true regarding OneConnect processing?

A. The virtual server must have UDP profile.

B. Server-side request can utilize existing client-side connections.

C. The number of client connection is reduced.

D. Client-side request can utilize existing server-side connections.

 


Suggested Answer: D

 

 

Question 45

Using IP Geolocation, an organization can always direct a client request from France to a datacenter in Dublin.

A. True

B. False

 


Suggested Answer: A

 

 

Question 46

Application templates save the time it typically takes to create nodes, pools, pool members, virtual servers, and monitors.

A. True

B. False

 


Suggested Answer: A

 

 

Question 47

Which four are GTM server static load balancing modes? (Choose four.)

A. Return to DNS

B. CPU

C. Packet Rate

D. Drop Packet

E. Round Robin

F. Static Persist

 


Suggested Answer: ADEF

 

Global Traffic Manager supports the following static load balancing modes:
Drop Packet –
Fallback IP –
Global Availability –
None –
Ratio –
Return to DNS –
Round Robin –
Static Persist –
Topology

 

Question 48

Which two of the following LTM load balancing methods require the least amount of resources? (Choose two.)

A. Round robin

B. Ratio

C. Observed

D. Fastest

E. Predictive

F. Least connections

 


Suggested Answer: AB

 

 

Question 49

Which of the following business benefits does storage tiering offer to customers?

A. Reduces time for backups because data on the secondary tier can have a less time intensive backup policed applied to it.

B. All of the above.

C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data.

D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage.

 


Suggested Answer: B

 

 

Question 50

Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)

A. Secure the connection between WAN sites.

B. Improve application availability and scalability.

C. Authenticate and authorize users.

D. Boost application performance.

E. Include application security.

F. Act as a Web application firewall

 


Suggested Answer: BDE

 

 

Access Full 101 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 101 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 101 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

XK0-005 Dump Free

Next Post

101-500 Mock Test Free

Next Post

101-500 Mock Test Free

102-500 Mock Test Free

1V0-21.20 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.