1.
Which three statements are true about SNATs? (Choose three.)
Correct Answer(s)
B. SNATs support UDP, TCP and ICMP traffic
C. SNATs provide a many-to-one mapping between IP addresses.
D. SNAT addresses can be identical to virtual server IP addresses.
Explanation
SNATs support UDP, TCP, and ICMP traffic, meaning they can handle all three types of network traffic. SNATs provide a many-to-one mapping between IP addresses, allowing multiple private IP addresses to be mapped to a single public IP address. Additionally, SNAT addresses can be identical to virtual server IP addresses, meaning the public IP address used for SNAT can be the same as the IP address of the virtual server.
2.
A BIG-IP has two SNATs, a pool of DNS servers and a virtual server configured to load-balance UDP traffic to the DNS servers. One SNAT's address is 64.100.130.10; this SNAT is defined for all addresses. The second SNAT's address is 64.100.130.20; this SNAT is defined for three specific addresses, 172.16.3.54, 172.16.3.55, and 172.16.3.56. The virtual server's destination is 64.100.130.30:53. The SNATs and virtual server have default VLAN associations. If a client with IP address 172.16.3.55 initiates a request to the virtual server, what is the source IP address of the packet as it reaches the chosen DNS server?
Correct Answer
B. 64.100.130.20
Explanation
The source IP address of the packet as it reaches the chosen DNS server is 64.100.130.20. This is because the client with IP address 172.16.3.55 falls into the range of addresses defined for the second SNAT, which has an address of 64.100.130.20. Therefore, when the client initiates a request to the virtual server, the packet will be SNATed with the address 64.100.130.20 before reaching the DNS server.
3.
Which persistence method will always recognize a client when the client returns to the same virtual server?
Correct Answer
E. No persistence method works in all situations
4.
Which three files/data items are included in a BIG-IP backup file? (Choose three.)
Correct Answer(s)
A. The BIG-IP license
C. The BIG-IP host name
E. The BIG-IP administrative addresses
Explanation
A BIG-IP backup file includes the BIG-IP license, the BIG-IP host name, and the BIG-IP administrative addresses. The license is important for maintaining the functionality of the BIG-IP system. The host name is necessary for identifying the specific BIG-IP device. The administrative addresses are crucial for accessing and managing the BIG-IP system. The other options, such as the log files and default traps, are not included in a BIG-IP backup file.
5.
Which statement is true regarding OneConnect processing?
Correct Answer
D. Client-side requests can utilize existing server-side connections.
Explanation
OneConnect processing allows client-side requests to utilize existing server-side connections. This means that instead of establishing a new connection for each client request, the server can reuse an existing connection, which improves efficiency and reduces the overhead of establishing new connections. This feature is particularly useful in scenarios where there are a large number of client connections and helps optimize resource utilization.
6.
The partial configuration below includes an iRule, a virtual server, and pools. When traffic from the client at 160.10.10.10:2056 connects to the virtual server Test_VS and sends an HTTP request, what will the client's source address be translated to as the traffic is sent to the chosen pool member?pool Test_Pool {member 10.10.10.10:80member 10.10.10.11:80}snatpool lower_range {member 10.10.10.1}snatpool upper_range {member 10.10.10.2}rule Test_iRule {when CLIENT_ACCEPTED {if { [TCP::local_port] < 2024 } {snatpool lower_range}else { snatpool upper_range}}}virtual Test_VS {destination 200.10.10.1:httppool Test_Poolrule Test_iRule}
Correct Answer
A. 10.10.10.1
Explanation
The iRule in the configuration checks the local port of the client's connection. If the local port is less than 2024, the client's source address will be translated to the IP address 10.10.10.1 using the snatpool lower_range. Therefore, when the client at 160.10.10.10:2056 connects to the virtual server Test_VS and sends an HTTP request, its source address will be translated to 10.10.10.1 as the traffic is sent to the chosen pool member.
7.
Which tool is used on BIG-IP systems to capture data packets?
Correct Answer
C. Tcpdump
Explanation
Tcpdump is a tool used on BIG-IP systems to capture data packets. It is a command-line packet analyzer that allows users to capture, filter, and display network packets. Tcpdump provides detailed information about the packets, including the source and destination IP addresses, protocol information, and packet payload. It is commonly used for network troubleshooting, monitoring, and analysis purposes.
8.
The following iRule is being used within a persistence profile on a virtual server. Assuming the following HTTP requests are made within the same timeout window, what is the maximum number of persistence records that will be created?iRule:rule Persist_Universal {when HTTP_REQUEST {persist uie [ findstr [HTTP::uri] "?" 8 3 ]}}Requests:#1 http://www.test.com/input.html?test145ABR80#2 http://www.test.com/input.html?test135PDC72#3 http://www.test.com/input.html?test125ABR76#4 http://www.test.com/input.html?test145MNO88#5 http://www.test.com/input.html?test155ABR98#6 http://www.test.com/input.html?test145PDC60#7 http://www.test.com/input.html?test175ABC50#8 http://www.test.com/input.html?test125MNO55#9 http://www.test.com/input.html?test145ABC70#10 http://www.test.com/input.html?test135PDC42
Correct Answer
D. 4
Explanation
The iRule uses the "persist" command with the "uie" persistence type. It extracts a substring from the HTTP URI using the "findstr" command and creates a persistence record based on that substring. Looking at the provided requests, there are four unique substrings extracted from the URI: "ABR", "PDC", "MNO", and "ABC". Therefore, the maximum number of persistence records that will be created is 4.
9.
Which are immediate results of entering the following command: b pool PoolA { lb method predictive member 10.10.1.1:80 member 10.10.1.2:80 }
Correct Answer
A. A new pool is available for association with any iRule or virtual server.
Explanation
The given command "b pool PoolA { lb method predictive member 10.10.1.1:80 member 10.10.1.2:80 }" creates a new pool named PoolA with two members, 10.10.1.1:80 and 10.10.1.2:80. By using this command, a new pool is created and it becomes available for association with any iRule or virtual server. This means that the pool can now be used for load balancing requests sent to the BIG-IP system with a destination port of 80.
10.
When a pool is created and saved to file, where is the default file and location for the pools configuration?
Correct Answer
A. /config/bigip.conf
Explanation
The default file and location for the pools configuration when a pool is created and saved to file is /config/bigip.conf.
11.
What does the Insert XForwarded For option in an HTTP profile do?
Correct Answer
A. The client IP addresses are inserted into an HTTP header.
Explanation
The Insert XForwarded For option in an HTTP profile allows the client IP addresses to be inserted into an HTTP header. This is useful for load balancing scenarios where the client IP address needs to be preserved and passed along to the backend servers. By inserting the client IP addresses into the HTTP header, the backend servers can access this information and use it for various purposes such as logging or security checks.
12.
A steaming profile will do which of the following?
Correct Answer
C. Search and replace all occurences of a specified string in requests and responses processed by a virtual server.
Explanation
A steaming profile is used to search and replace all occurrences of a specified string in both requests and responses processed by a virtual server. This means that any instance of the specified string found in the requests sent to the virtual server and the responses received from the virtual server will be replaced with a different string. This allows for efficient and effective manipulation of data within the virtual server environment.
13.
A monitor has been defined with an alias port of 443. All other options are left at their defaults. The adminstrator wishes to assign it to a pool of members where the members' ports vary. Which is the result?
Correct Answer
B. For each member, the monitor will test the members node at port 443.
Explanation
The given correct answer states that for each member, the monitor will test the member's node at port 443. This means that even though the members' ports may vary, the monitor will still only test them at port 443. This suggests that the assignment of the monitor to the pool of members is allowed, regardless of the varying ports.
14.
Which is a potential result when a trunk is configured on a BIG-IP?
Correct Answer
B. Packets flowing to the VLAN could arrive on any of the interfaces in the trunk.
Explanation
When a trunk is configured on a BIG-IP, packets flowing to the VLAN could arrive on any of the interfaces in the trunk. This means that the trunk allows for load balancing and distribution of traffic across multiple interfaces, increasing network efficiency and resiliency. By allowing packets to arrive on any interface, the BIG-IP can optimize traffic flow and ensure that the VLAN receives packets from multiple sources, improving network performance.
15.
A site is designing a virtual server, SNAT, and iRule such that all traffic using the virtual server from employee networks will have the source addresses translated to 10.10.1.30 but external customer traffic will not have it's source address translated. In either case, traffic should be load balanced to a member of the pool web_pool. Employees are from either 192.168.0.0/16 or 172.16.12.0/24 networks. Assuming a virtual server is associated with this rule and has no default pool, which iRule will fulfill these requirements?
Correct Answer
D. Rule Test_iRule {
when CLIENT_ACCEPTED {
if { [[IP::remote_addr] starts_with 192.168] or [[IP::remote_addr] starts_with 172.16.12.] } {
snatpool employee_snat
pool web_pool
}
else {
pool web_pool
}
Explanation
The correct answer is "rule Test_iRule {
when CLIENT_ACCEPTED {
if { [[IP::remote_addr] starts_with 192.168] or [[IP::remote_addr] starts_with 172.16.12.] } {
snatpool employee_snat
pool web_pool
}
else {
pool web_pool
}"
This iRule fulfills the requirements because it checks the client's remote address and if it starts with either 192.168 or 172.16.12, it performs SNAT using the employee_snat pool and load balances the traffic to the web_pool. If the remote address does not match these conditions, it only load balances the traffic to the web_pool without performing SNAT.
16.
A site wishes to use an external monitor. Other than what is coded in the monitor script, what information must be configured on the BIG-IP for the monitor to be functional? (Choose two.)
Correct Answer(s)
A. BIG-IP must know the name of the program.
D. BIG-IP must know which node or member the results are to be applied to.
Explanation
The BIG-IP must know the name of the program in order to properly identify and execute the monitor script. Additionally, the BIG-IP must know which node or member the results are to be applied to, so that it can accurately record and report the results of the monitor.
17.
Which two statements are true concerning capabilities of current BIG-IP platforms? (Choose two.)
Correct Answer(s)
D. All BIG-IP platforms have tri-speed Ethernet ports (10 / 100 / 1000 Mbit/sec).
E. All BIG-IP platforms have capacity to perform bulk encryption / decryption of SSL traffic independent of the CPU.
Explanation
The first statement, "All BIG-IP platforms have tri-speed Ethernet ports (10 / 100 / 1000 Mbit/sec)", is true because all BIG-IP platforms are equipped with Ethernet ports that support speeds of 10, 100, and 1000 Mbit/sec. This allows for flexible connectivity options depending on the network requirements.
The second statement, "All BIG-IP platforms have capacity to perform bulk encryption / decryption of SSL traffic independent of the CPU", is also true. BIG-IP platforms are designed to offload SSL processing from the CPU to dedicated hardware, such as SSL acceleration cards or cryptographic modules. This enables efficient and high-performance handling of SSL traffic, ensuring secure communication without overburdening the CPU.
18.
When defining a load-balancing pool using the command line, if the load-balancing method is not specified, what is the result?
Correct Answer
A. The default load-balancing method would be used.
Explanation
If the load-balancing method is not specified when defining a load-balancing pool using the command line, the default load-balancing method would be used. This means that the system would automatically apply the default method for distributing traffic across the servers in the pool.
19.
Which statement concerning virtual servers is true?
Correct Answer
D. Virtual servers can reuse connections between the BIG-IP and server for multiple HTTP GETs.
Explanation
Virtual servers can reuse connections between the BIG-IP and server for multiple HTTP GETs. This means that once a connection is established between the virtual server and the server, it can be used for multiple requests without having to establish a new connection each time. This helps to improve efficiency and reduce overhead in the communication between the BIG-IP and the server.
20.
A monitor has been defined using the HTTP monitor template. The send and receive strings were customized, but all other settings were left at their defaults. Which resources can the monitor be assigned to?
Correct Answer
A. Most pools
Explanation
The monitor can be assigned to most pools. This means that the monitor can be used to check the availability and health of a wide range of pools in the network. The customized send and receive strings allow for specific checks to be performed on the resources in these pools. However, it is important to note that the monitor cannot be assigned to all pools, nodes, or virtual servers, but only to most of them.
21.
Which statement is true concerning SNATs using SNAT pools and SNATs using automap?
Correct Answer
A. A SNAT pool can contain virtual server addresses.
Explanation
SNATs using SNAT pools can contain virtual server addresses. This means that when a SNAT is performed, the source address of the packet will be translated to one of the addresses in the SNAT pool, which may include virtual server addresses. This allows for more flexibility in the translation process, as different virtual servers can have different source addresses. On the other hand, SNATs using automap preferentially translate source addresses to non-floating self-IP addresses, which are the self-IP addresses that are not associated with virtual servers.
22.
Why would an administrator capture monitor traffic between a BIG-IP and servers?
Correct Answer
B. Viewing monitor traffic could help the administrator to define a more robust monitor.
Explanation
Capturing monitor traffic between a BIG-IP and servers can help the administrator to define a more robust monitor. By analyzing the monitor traffic, the administrator can gain insights into the performance and health of the servers. This information can be used to optimize the monitoring parameters and thresholds, ensuring that any issues or failures are detected accurately and promptly. Ultimately, capturing monitor traffic allows the administrator to improve the monitoring system and enhance the overall reliability and efficiency of the network.
23.
Which three processes are involved when BIG-IP systems issue traps? (Choose three.)
Correct Answer(s)
B. Alertd
D. Snmpd
E. Syslog-ng
Explanation
The three processes involved when BIG-IP systems issue traps are alertd, snmpd, and syslog-ng. alertd is responsible for generating and sending alert notifications. snmpd is the SNMP daemon process that handles SNMP requests and traps. syslog-ng is the syslog daemon process that collects and forwards system log messages. These processes work together to ensure that traps are generated, sent, and logged appropriately in the BIG-IP system.
24.
Which statement describes bigpipe shell access correctly?
Correct Answer
A. All users can be given bigpipe shell access.
25.
Which is the result when multiple monitors are assigned to a pool member?
Correct Answer
D. The member is marked available if sufficient monitors succeed, and as unavailable if
insufficient monitors succeed.
Explanation
When multiple monitors are assigned to a pool member, the member is marked as available if a sufficient number of monitors succeed. This means that if a minimum number of monitors required for the pool member to be considered available are successful, the member will be marked as available. However, if there are insufficient monitors that succeed, the member will be marked as unavailable. This ensures that the pool member is only considered available if it meets the required criteria for successful monitors.
26.
What occurs when a b load command is issued?
Correct Answer
B. The running configuration is replaced by the configuration in the files, but only if they are syntactically correct.
Explanation
When a "b load" command is issued, the running configuration is replaced by the configuration in the files, but only if they are syntactically correct. This means that if there are any errors or mistakes in the configuration files, the running configuration will not be replaced. This ensures that only valid and error-free configurations are loaded into memory.
27.
Which three parameters could be used to determine whether a connection request will have the source address translated as the request is processed? (Choose three.)
Correct Answer(s)
A. The client's TCP port
B. The client's IP address
F. The client's browser's preferred language
Explanation
The client's TCP port, IP address, and browser's preferred language can be used to determine whether a connection request will have the source address translated as the request is processed. The TCP port and IP address are essential parameters used in network communication to identify the source of a connection request. The browser's preferred language is not directly related to address translation, but it can be used as an additional parameter to determine the source of the request.
28.
Which action CANNOT be performed by an iRule?
Correct Answer
A. Change the virtual server's default pool.
Explanation
An iRule is a script that can be written to customize the behavior of a virtual server in a load balancer. It can perform various actions such as directing connection requests to a specific pool, discarding a client before connecting to a server, limiting a client's bandwidth, substituting a server's response, and directing a client's request based on the client's browser's language. However, it cannot change the virtual server's default pool. This means that the iRule cannot modify the default pool that is assigned to the virtual server, and it will continue to use the default pool set in the configuration.
29.
A BIG-IP has the following objects configured:
A SNAT pool with 2 members: 150.10.33.33 and 10.10.1.33A load-balancing pool with 5 members: 10.10.1.1-10.10.1.5:80The BIG-IP has two self-IP addresses: 150.10.10.10 and 10.10.1.10A virtual server at 150.10.30.30:80 that is associated with both the SNAT pool and the loadbalancing pool. If a client at IP address 200.10.10.10 initiates a connection to the virtual server, what will the source IP address be in the packets sent to the chosen pool member?
Correct Answer
B. 10.10.1.33
Explanation
The virtual server is associated with both the SNAT pool and the load-balancing pool. When the client initiates a connection to the virtual server, the source IP address in the packets sent to the chosen pool member will be the self-IP address of the BIG-IP that is associated with the SNAT pool, which is 10.10.1.33.
30.
Which statement is true concerning packet filters?
Correct Answer
A. Filters cannot prevent access to the management port.
Explanation
Packet filters are a type of network security mechanism that examine packets of data as they pass through a network device, such as a firewall or router, and determine whether to allow or block them based on predefined rules. In this case, the statement that "Filters cannot prevent access to the management port" is true. The management port is a specific port used for device administration and configuration, and it is typically not affected by packet filters. This means that even if packet filters are in place to block certain types of traffic, they will not prevent access to the management port.
31.
Which statement is true concerning iRule context?
Correct Answer
C. The iRule event declaration determines the context.
Explanation
The iRule event declaration determines the context. In iRules, the context refers to the part of the network traffic that the iRule is applied to. The iRule event declaration specifies when and where the iRule should be applied, thus determining the context. By defining the event, such as HTTP_REQUEST or CLIENT_ACCEPTED, the iRule is associated with specific events in the network traffic flow, allowing it to execute its commands and logic within that context.
32.
When a virtual server has an HTTP profile with compression enabled, which traffic is compressed by the BIG-IP?
Correct Answer
C. Selected traffic from the BIG-IP to the clients
Explanation
When a virtual server has an HTTP profile with compression enabled, the BIG-IP will only compress the selected traffic from the BIG-IP to the clients. This means that only the data sent from the BIG-IP to the clients will be compressed, while the data sent from the clients to the BIG-IP and the server-side traffic for that virtual server will not be compressed.
33.
Why is the context of an event significant in iRule processing?
Correct Answer
D. The context determines the values of commands that vary between client and server.
Explanation
The context of an event is significant in iRule processing because it determines the values of commands that vary between the client and server. Different commands may need to be executed depending on whether the event is occurring on the client side or the server side. Therefore, understanding the context allows for the appropriate commands to be executed based on the specific situation, ensuring proper functionality and performance in the iRule processing.
34.
What is the expected difference between two source address persistence profiles if profile A has a mask of 255.255.255.0 and profile B has a mask of 255.255.0.0?
Correct Answer
C. Profile B will have fewer persistence records for the same client base.
Explanation
Profile B will have fewer persistence records for the same client base because a larger mask (255.255.0.0) allows for a larger range of IP addresses to be included in the persistence records. In contrast, profile A with a smaller mask (255.255.255.0) will have a narrower range of IP addresses included in the persistence records. Therefore, profile B will have fewer records as it can cover a larger number of clients with a single persistence record.
35.
What occurs when a b save command is issued?
Correct Answer
A. The current configuration files are backed up.
Explanation
When a "b save" command is issued, the current configuration files are backed up. This means that a copy of the current configuration files is created and stored in a separate location, ensuring that the configuration settings are saved and can be restored if needed.
36.
How is traffic flow through transparent virtual servers different from typical virtual servers?
Correct Answer
B. Traffic flow through transparent virtual servers does not have IP address translation performed.
Explanation
Transparent virtual servers do not perform IP address translation, which means that the original IP addresses of the traffic are preserved. This is different from typical virtual servers, where IP address translation may be performed to hide the original IP addresses and provide additional security.
37.
Which statement describes advanced shell access correctly?
Correct Answer
B. Users with advanced shell access can always change, add, or delete LTM objects in all partitions.
Explanation
Users with advanced shell access have the ability to modify, add, or remove LTM (Local Traffic Manager) objects across all partitions. This means that they have unrestricted access and control over the LTM objects in every partition of the system. Unlike users with bigpipe shell access, who only have rights within a single partition, users with advanced shell access have the same privileges but with the added capability to make changes across all partitions.
38.
After editing and saving changes to the configuration file containing virtual servers, what is the immediate result?
Correct Answer
E. The new configuration is neither verified nor loaded.
Explanation
After editing and saving changes to the configuration file containing virtual servers, the immediate result is that the new configuration is neither verified nor loaded. This means that the changes made in the configuration file are not immediately applied or implemented. The verification and loading of the new configuration would need to be done separately or at a later time.
39.
Could an iRule perform persistence based on a cookie?
Correct Answer
C. Yes. An iRule could be designed to persist based on the contents of a cookie.
Explanation
An iRule could be designed to persist based on the contents of a cookie. This means that the iRule can be programmed to use the information stored in the cookie to determine the persistence of a session. However, it is important to note that the cookie must be set by the server for the iRule to be able to perform this persistence.
40.
Which two data points can be used to persist using an expression (universal persistence)? (Choose two.)
Correct Answer(s)
A. An IP address
B. Any text string within a cookie
Explanation
An IP address can be used to persist using an expression as it uniquely identifies a device on a network. Any text string within a cookie can also be used as it can be stored on the client-side and sent back to the server with subsequent requests, allowing the server to identify the user. The value in the tcp acknowledgement field and any bytes within the initial client request packet are not typically used for persistence purposes.