Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

F5 F50-501 Exam - Cheat-Test.com

Free F50-501 Sample Questions:

1. Which of the following statements is true regarding nodes with a status of “DISABLED”?
A. All existing connections to the node are closed, and persistence sessions are removed.
B. All existing connections to the node are maintained, and new connections can be made only from clients with active persistence sessions.
C. All existing connections to the node are closed, but new connections can be from clients with active persistence sessions.
D. All existing connections to the node are maintained, but persistence sessions are removed.
Answer: B

2. Which of the following statements is true regarding nodes with a status of “DOWN”?
A. When the node comes back up, the administrator will have to re-enable it.
B. If the node is down for one hour, it will be automatically removed from BIG-IPs configuration file.
C. Persistent sessions will continue to be active to the node.
D. The monitor associated with the node will continue to check it at the defined interval.
Answer: D

3. What are three advantages of using a SSL Proxy over decrypting SSL traffic at the web server? The SSL Proxy is not using ServerSSL. (Choose three.)
A. reduces CPU utilization on web servers
B. allows for centralized certificate management
C. minimizes security concerns on the "internal" network
D. No SSL accelerator adapters need to be purchased for web servers
Answer: ABD

4. Which statement about the SSL Proxy option is true?
A. The SSL Proxy can send unencrypted traffic to a local Virtual Server or to an external Node.
B. The SSL Proxy can only send unencrypted traffic to a local Virtual Server.
C. After an SSL Proxy has been created, no encrypted traffic can be sent to any BIG-IP Virtual Servers.
D. Decrypting traffic at the BIG-IP allows use of Rules within pools, but also places increased demands on nodes.
Answer: A

5. Which two answers show the correct order of configuration used to configure a SSL Proxy? (Choose two.)
A. install a certificate, create a Proxy, create the associated Virtual Server
B. install a certificate, create the associated Virtual Server, create a Proxy
C. create a Proxy, create the associated Virtual Server, install a certificate
D. create a Proxy, install a certificate, create the associated Virtual Server
E. create the associated Virtual Server, create a Proxy, install a certificate
F. create the associated Virtual Server, install a certificate, create a Proxy
Answer: BF

6. What is the primary purpose of floating self IP addresses?
A. to define an address that represents either BIG-IP at any time for administrative access
B. to allow both BIG-IPs to communicate with each other using the same IP address, whether in the Active or Standby state
C. to add a third address for the pair of BIG-IPs so network devices have even more flexibility as to where to forward traffic
D. to provide a default gateway address for nodes that is always associated with an Active BIG-IP
Answer: D

7. While using the Setup Utility, after specifying that you are configuring a redundant pair, you are asked for the "failover IP address." What address is this?
A. an address of the other BIG-IP in a redundant pair configuration
B. the address used by the current BIG-IP to send messages to monitoring stations
C. a self-IP address of the current BIG-IP used to initiate mirroring and network failover heartbeat messages
D. the address used by the current BIG-IP to listen for failover messages when acting as the Standby system
Answer: A

8. Which statement is true about the configuration syncing process, as performed in the Configuration Utility or by typing bigpipe config sync all from the command line?
A. The process should always be run from the Standby system.
B. The process should always be run from the BIG-IP with the largest configuration file
C. The /config/bigip.conf file is copied from the BIG-IP you are syncing from to the BIG-IP you are syncing to.
D. Multiple files, including /config/bigip.conf and /config/bigip_base, are synchronized (made identical) each time the process is run.
Answer: C

9. Which three methods can be used to determine if a BIG-IP is in the Active state? (Choose three.)
A. view the Active/Standby status located on the System Statistics page
B. type the bigtop command and view the status in the upper left corner of the screen
C. select the System menu, click the Redundant Properties tab, and view the Active/Standby field
D. view the upper left corner of the Navigation Pane while on any page on the Configuration Utility
Answer: BCD

10. You currently have a single BIG-IP installed in your network, and you want to add a second BIG-IP unit and configure them as a redundant pair. Which of the following describes steps that will accomplish this?
A. Save a UCS file from the current BIG-IP and restore it on the new BIG-IP.
B. Save an image of the hard drive on the current BIG-IP and install it on the new BIG-IP.
C. Ensure both BIG-IPs are properly configured to be in a redundant pair, and perform a configuration sync from the current system.
D. Transfer the bigip.conf and bigip_base.conf files from the current BIG-IP to the new BIG-IP and reboot.
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved