Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Exam Express EE0-512 Exam - Cheat-Test.com

Free EE0-512 Sample Questions:

1. A site wishes to use an external monitor. Other than what is coded in the monitor script, what information must be configured on the BIG-IP for the monitor to be functional? (Choose two.)
A. BIG-IP must know the name of the program.
B. BIG-IP must know which functions the program is going to test.
C. BIG-IP must know the IP addresses of the devices that will be tested.
D. BIG-IP must know which node or member the results are to be applied to.
E. BIG-IP must know all services that are running on the system to be tested.
Answer: AD

2. As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What would be the result if the two systems in a redundant pair were set to the same host name?
A. Host names do not matter in redundant pair communication.
B. In a redundant pair, the two systems will always have the same host name. The parameter is synchronized between the systems.
C. The first time the systems are synchronized the receiving system will be assigned the same self-IP addresses as the source system.
D. When the administrator attempts to access the configuration utility using the host name, they will always connect to the active system.
Answer: C

3. Which file contains the allowed IP addresses for SSH access?
A. /etc/hosts.deny
B. /etc/sshd_allow
C. /etc/hosts.allow
D. /etc/sshd_secure
Answer: C

4. Which statement is true concerning packet filters?
A. Filters cannot prevent application viruses.
B. Filters cannot prevent the BIG-IP synching process from taking place.
C. The order of filters does not affect which traffic is accepted or denied.
D. In addition to administrator-created filters, there always exists a "deny all" filter that processes traffic last.
Answer: A

5. If a self-IP's port lockdown is set to "allow 443", which statement describes allowed communication to that address?
A. Access is available to the Configuration Utility.
B. Serial console access is prevented since only port 443 access is allowed.
C. Access may be available via SSH dependent upon the /etc/host.allow settings.
D. The partner BIG-IP will be able to synchronize and mirror connection and persistence information.
Answer: A

6. If a self-IP port lockdown is set to "allow default", which three ports will accept administrative traffic? (Choose three.)
A. SSH
B. DNS
C. HTTP
D. SMTP
E. HTTPS
Answer: ABE

7. A BIG-IP has a virtual server at 150.150.10.10:80 that is associated with a load-balancing pool with a single pool member: 10.10.10.1:80. This BIG-IP also has a SNAT at 150.150.10.11 set for all addresses. All other settings are at their default states. If a client with the IP address 200.200.1.1 sends a request to the virtual server, what are the source and destination addresses when the associated packet is sent to the pool member?
A. Source: 200.200.1.1 Destination: 10.10.10.1
B. Source: 150.150.10.11 Destination: 10.10.10.1
C. Source: 200.200.1.1 Destination: 150.150.10.10
D. Source: 150.150.10.11 Destination: 150.150.10.10
Answer: B

8. Which are immediate results of entering the following command:
b pool TestPool { lb method predictive member 10.10.1.1:80 member 10.10.1.2:80 }
A. A new pool is available for association with any iRule or virtual server.
B. All existing virtual servers defined are associated with the new pool, TestPool.
C. The /config/bigip.conf file is updated to include a definition for the pool named TestPool.
D. Requests sent to this BIG-IP System with a destination port of 80 are load-balanced between the members of TestPool.
Answer: A

9. Which action CANNOT be performed by an iRule?
A. direct a connection request to a specific pool
B. discard a client before connecting to a server
C. limit a given client to a set amount of bandwidth
D. substitute a server's response with alternate data
E. direct traffic away from pool members by marking them as unavailable
F. direct a client's request to a pool based on the client's browser's language
Answer: E

10. Where are settings for user-defined monitors stored?
A. /config/bigd.conf
B. /config/bigip.conf
C. /etc/base_monitors.ha
D. /config/bigip_base.conf
E. /config/base_monitors.ha
Answer: B

11. Which result could come from running a single bigpipe command?
A. A monitor can be defined and associated with an existing pool.
B. A virtual server can be defined and associated with an existing pool.
C. An iRule can be define and associated with an existing virtual server.
D. A profile can be defined and associated with an existing virtual server.
Answer: B

12. What is a "three-way handshake"?
A. It is a process used by IP applications to establish a connection between a client and a server.
B. It is a process used by TCP applications to establish a connection between a client and a server.
C. It is a process used by all network applications to establish a connection between a client and a server.
D. It is a process used by TCP and UDP applications to establish a connection between a client and a server.
Answer: B

13. Why would an administrator use tcpdump to capture monitor traffic between a BIG-IP and servers?
A. Only client traffic can be monitored by tcpdump; monitor traffic is not captured.
B. Viewing monitor traffic could help the administrator to define a more robust monitor.
C. If client traffic to the servers was failing, viewing and analyzing monitor traffic would determine the reason.
D. If a client were having difficulty logging into a load-balanced SSH server, viewing and analyzing the connection process would determine the reason.
Answer: B

14. Which statement describes the function of the qkview tool?
A. The tool helps to capture the current traffic load of a BIG-IP.
B. The tool helps to capture traffic on the BIG-IP's management interface.
C. The tool helps to capture the current configuration and status of a BIG-IP.
D. The tool helps to capture the status of the BIG-IPs communication between the redundant pairs.
Answer: C

15. Which two parameters are displayed when bigtop is run? (Choose two.)
A. profile configuration
B. BIG-IP CPU utilization
C. virtual server status and traffic load
D. pool member status and traffic load
E. iRule configuration and utilization levels
F. monitor configuration and utilization levels
Answer: CD

16. A user-defined monitor has been created based on the TCP monitor template. Defaults are used for all parameters but the destination, which is defined as *:80.
If this monitor were assigned to the pool member at 10.10.10.10:443, what would be the result?
A. The assignment cannot be made due to the port conflict.
B. When the monitor performs a check, it will cause the member to be marked as unavailable.
C. When the monitor performs a check, it will be performed on the device at 10.10.10.10:80 and results will depend on the state of that device.
D. When the monitor performs a check, it will be performed on the member at 10.10.10.10:443 and results will depend on the state of that member.
Answer: C

17. How are Extended Application Verification (EAV) monitors different from other monitors?
A. If an administrator wishes to test multiple ports on the same node, an EAV is the only option.
B. If an administrator wishes to test multiple devices and aggregate the results, an EAV is the only option.
C. If an administrator wishes to test one port but assign the results to another port, an EAV is the only option.
D. If an administrator wishes to dynamically interact with a server before determining its status, an EAV is the only option.
Answer: D

18. Which are potential results when multiple monitors are assigned to a pool member?
A. The member is always marked as unavailable if any of the monitors fails.
B. The member is always marked as available if any of the monitors succeeds.
C. The member is marked available if all monitors succeed and marginal if one or more monitors fail.
D. The member is marked available if sufficient monitors succeed and unavailable if insufficient monitors succeed.
Answer: D

19. A site wishes to verify a given device through multiple monitors. Which statement accurately describes the relationship between these monitors?
A. All of the monitors must test the same IP address.
B. All of the monitors must be assigned to the device.
C. All of the monitors must be based on the same monitor template.
D. All of the monitors must test the same IP address : port combination.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved