F5 Networks 201 TMOS Administration Exam Practice Test

Page: 1 / 14
Total 254 questions
Question 1

A BIG-IP Administrator suspects that one of the BIG-IP device power supplies is experiencing power

outages.

Which log file should the BIG-IP Administrator check to verify the suspicion?



Answer : C


Question 2

The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned custom monitors. The pool is marked available. If a pool is marked available (green) which situation is sufficient to cause this?



Answer : D


Question 3

An LTM device has a virtual server mapped to www.f5.com with a pool assigned. Users report that when browsing, they are periodically required to re-login to /resources/201.1.7.b.2_l.com. The objects are defined as follows:

Virtual server. Destination 192.168.245.100:443 netmask 255.255.255.0

Persistence: SSL session persistence

Profiles: HTTP/TCP

Which persistence method should the BIG-IP Administrator apply to resolve this issue?



Answer : A


Question 4

A custom HTTP monitor is failing to a pool member 10.10.3.75:8080 that serves up www.example.com.

A ping works to the pool member address.

The SEND string that the monitor is using is: GET/HTTP/l.l/r/n/Host.www.example.com/r/n/Connection

Close/r/n/r/n

Which CLI tool syntax will show that the web server returns the correct HTTP response?



Answer : B


Question 5

Refer to the exhibit.

During maintenance, the BIG-IP Administrator manually disables a pool member as shown.

What is the result?



Answer : A


Question 6

Users report that traffic is negatively affected every time a BIG-IP device fails over. The traffic becomes

stabilized after a few minutes.

What should the BIG-IP Administrator do to reduce the impact of future failovers?



Answer : C


Question 7

A BIG-IP Administrator makes a configuration change to the BIG-IP device. Which file logs the message regarding the configuration change?



Answer : B

About audit logging

Audit logging is an optional feature that togs messages whenever a BIG-IP system object, such as a virtual server or a load balancing pool, is confined (that is. created, modified, or deleted). The BiGIP system logs the messages for these auditing events in the file /var/log'audit

There are three ways that objects can be configured

* By user action

* By system action

* By loading configuration data

Whenever an object is configured in one of these ways, the BIG-IP system logs a message to the audit log


Page:    1 / 14   
Total 254 questions