Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

F5 F50-101 Exam - Cheat-Test.com

Free F50-101 Sample Questions:

Q: 1
What are the best reasons for using the Deployment Wizard? (Choose 3)
A. Flow-level parameters checking is required.
B. The application encoding scheme needs to be determined by the BIG-IP ASM System.
C. Sufficient time is available to allow completely automated policy building based onobserving live traffic.
D. The application platform must be protected against known attacks for the specificoperating system, web server, and database.
Answer: B,C,D

Q: 2
When building a policy based on live traffic using the automated policy builder, which of the following elements will not be taken into account when analyzing the traffic?
A. The size of the response
B. The requested resource (URI)
C. The response code from the web server
D. The parameter values of static based parameters
Answer: A

Q: 3
Which method of protection is not provided by the Rapid Deployment policy template?
A. Data leakage
B. Buffer overflow
C. HTTP protocol compliance
D. Dynamic parameter validation
Answer: D

Q: 4
Which of the following are properties of an ASM logging profile? (Choose 2)
A. storage type
B. storage filter
C. storage policy
D. web application
Answer: A,B

Q: 5
Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check
Answer: B

Q: 6
The Web Application Security Administrator user role can perform which of the following functions? (Choose 2)
A. Modify HTTP class profiles.
B. Create new HTTP class profiles.
C. Create new Attack signature sets.
D. Assign HTTP class profiles to virtual servers.
E. Configure Advanced options within the BIG-IP ASM System.
Answer: C,E

Q: 7
The following request is sent to the BIG-IP ASM System:
GET http://www.example.local/financials/week1.xls? display=yes&user=john&logon=true
Which of the following components in this requests line represent the query string?
A. .xls
B. /week1.xls
C. /financials/week1.xls
D. display=yes&user=john&logon=true
Answer: D

Q: 8
Which level of parameter assumes the highest precedence in BIG-IP ASM System processing logic?
A. Flow
B. Object
C. Global
D. URL
Answer: A

Q: 9
Which of the following storage type combinations are configurable in an ASM logging profile?
A. Local and Syslog
B. Local and Remote
C. Remote and Syslog
D. Remote and Reporting Server
Answer: B

Q: 10
When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose 2)
A. All client requests
B. All server responses
C. Specific client requests
D. Specific server responses
Answer: B,D

Q: 11
When initially configuring the GTM System using the config tool, which two parameters can be set? (Choose two.)
A. System hostname
B. IP Address of management port
C. IP Address of the external VLAN
D. Default route for management port
E. Port lockdown of management port
Answer: B,D

Q: 12
Without creating a user-defined region, what is the most specific group a topology record can identify?
A. city
B. country
C. continent
D. state/province
E. region of country
Answer: D

Q: 13
The SNMP monitor can collect data based on which three metrics? (Choose three.)
A. packet rate
B. memory utilization
C. content verification
D. current connections
E. hops along the network path
Answer: A,B,D

Q: 14
Could an iRule perform persistence based on a cookie?
A. Yes An iRule could be designed to persist based on the contents of a cookie.
B. No. iRules cannot affect persistence.
C. Yes. An iRule could be desiged to persist based on the contents of a cookie.
D. No. Cookie persistence is only is based on a cookie persistence profile.
Answer: C

Q: 15
How is traffic flow through transparent virtual servers different from typical virtual servers?
A. Traffic flow through transparent virtual servers must be forwarded through a single routingdevice.
B. Traffic flow through transparent virtual servers does not have IP address translationperformed.
C. Traffic flow through transparent virtual severs is not load balabced.
D. Traffic flow through transparent virtual servers is bridged ( leave IP and lMAC.addressesintact) rather than routed (leave IP address intact but change the MAC.addresses).
Answer: B

Q: 16
You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1.
If additional changes are made to TEST1, what is the effect on TEST2?
A. All changes to TEST1 are propagated to TEST2.
B. Some of the changes to TEST1 may propagate to TEST2.
C. Changes to TEST1 cannot affect TEST2 once TEST2 is saved.
D. When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes toTEST2.
Answer: B

Q: 17
If a client's browser does not accept cookies, what occurs when the client connects to a virtual server using cookie persistence?
A. The connection request is not processed.
B. The connection request is sent to a server.
C. The connection request is load-balanced to an available pool member.
D. The connection request is refused and the client is sent a "server not available" message.
Answer: C

Q: 18
What is the purpose of MAC masquerading?
A. to prevent ARP cache errors
B. to minimize ARP entries on routers
C. to minimize connection loss due to ARP cache refresh delays
D. to allow both BIG-IP devices to simultaneously use the same MAC address
Answer: C

Q: 19
Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in a redundant pair configuration?
A. bandwidth utilization
B. duplicate IP address
C. CPU utilization percentage
D. VLAN communication ability
Answer: D

Q: 20
Which two statements are true concerning the default communication between a redundant pair of BIG-IP systems? (Choose two.)
A. Synchronization occurs via a TCP connection using ports 683 and 684.
B. Connection mirroring data is shared via a TCP connection using port 1028.
C. Persistence mirroring data is shared via a TCP connection using port 1028.
D. Connection mirroring data is shared through the serial fail-over cable unless network fail-over is enabled.
Answer: B,C


© 2014 Cheat-Test.com, All Rights Reserved