VMware Avi Load Balancer 30.x Administrator 6V0-22.25 Exam Questions

Page: 1 / 14
Total 65 questions
Question 1

Which statement about Policies is true?



Answer : A

Avi Virtual Service policies are evaluated according to policy type and rule order. Broadcom documentation explains that Virtual Service policies customize network-layer and HTTP-layer behavior, and policy logs are visible through the Virtual Service Logs tab. Because policies contain match conditions and actions, their order matters: earlier matching rules or policy sets can affect whether later rules are reached or what traffic state later processing receives. Policies and DataScripts can both be used on the same Virtual Service when designed correctly; they are not mutually exclusive. Policies can use advanced match criteria, including pattern-based matching in applicable HTTP contexts, so the statement that policies do not support regex is incorrect. HTTP Response Policies also do not require a matching HTTP Request Policy. Therefore, the true statement is that policy order matters.


Question 2

Which element of the End-to-End Timing graph identifies the average time taken for a web server to process a request, fetch content from a database, and begin transferring the response?



Answer : D

The End-to-End Timing graph in Avi analytics breaks down request handling into latency components such as client round-trip time, server round-trip time, application response time, data transfer, and total time. Server RTT measures network latency between the Service Engine and the backend server. Data Transfer measures the time spent transferring response data. Total Time is the overall client transaction duration. App Response is the component that represents how long the application server takes to process the request and begin responding. If the web server must query a backend database before generating the response, that database wait and application processing time are included in App Response rather than Server RTT. Therefore, the element identifying server processing and database-content fetch time before response transfer begins is App Response.


Question 3

Which statement is true for Avi to compress an HTTP response?



Answer : D

HTTP compression depends on whether the client indicates support for compressed content. In Avi Load Balancer compression configuration, the Accept-Encoding request header is relevant because it tells the system what compression encodings the client can accept. Therefore, for Avi to compress an HTTP response, the client request must include an appropriate Accept-Encoding header.


Question 4

Which statement is true regarding EC versus RSA certificates?



Answer : C

VMware Avi Load Balancer documentation recommends elliptic-curve cryptography for strong security and better performance compared with traditional RSA key exchange and RSA certificates. ECC generally provides equivalent or stronger security with smaller key sizes, which reduces computational cost during SSL/TLS processing. Avi sizing and SSL guidance note that RSA keys, especially larger RSA keys, are more computationally expensive than elliptic-curve alternatives. Modern browsers still support RSA certificates, so option B is incorrect. Certificate price depends on certificate authority and commercial policy, not the cryptographic method itself, so option A is not a technical Avi answer. ECC is not weaker by default; properly selected ECC certificates and EC cipher suites are considered strong and efficient. Therefore, the correct statement is that ECC processing is less CPU-intensive than RSA.


Question 5

A Virtual Service is configured with both RSA and EC certificates. What action could be taken to increase SSL performance without compromising security?



Answer : B

Avi Load Balancer supports presenting both RSA and EC certificates on the same SSL/TLS Virtual Service. When both are available, certificate selection can influence SSL performance. EC certificates generally provide strong security with lower computational overhead than RSA, especially compared with larger RSA keys. VMware Avi documentation includes guidance for EC versus RSA Certificate Priority, which exists specifically because certificate ordering and preference matter when both certificate types are configured. Disabling SSL session reuse would usually hurt performance, not improve it. Scaling out to another Service Engine can improve capacity, but it does not specifically optimize SSL cryptographic efficiency. Disabling PFS would reduce security, so it violates the question's requirement. Therefore, preferring EC before RSA is the correct performance improvement without compromising security.


Question 6

Which persistence type does not consume memory on the Service Engine?



Answer : D

Avi supports several persistence methods, and some require persistence tables stored in Service Engine memory. Client IP persistence uses a persistence table that maps client addresses to selected backend servers, which consumes Service Engine memory. TLS persistence also relies on state associated with TLS session behavior. App Cookie Persistence depends on application cookies and persistence handling that Avi must interpret or track. HTTP Cookie Persistence, however, is different because Avi can insert or use a cookie value that identifies the selected server, allowing the client to carry the persistence information in subsequent requests. This avoids maintaining the same kind of server-side persistence table in Service Engine memory. Therefore, the persistence type that does not consume Service Engine memory is HTTP Cookie Persistence.


Question 7

Which three statements are true for Connection Multiplexing? Choose three.



Answer : A, B, D

Connection Multiplexing is an HTTP application-profile feature that allows Avi to reuse server-side TCP connections for multiple client requests. Because it is an HTTP request-switching and server TCP connection reuse function, it does not apply to UDP traffic. Avi documentation states that connection multiplexing controls HTTP/1.0 and HTTP/1.1 request switching and reuse of server TCP connections. The main performance benefit is that it reduces the number of server-side TCP connections, lowering connection setup overhead on backend servers. It is not compatible with NTLM authentication because NTLM depends on connection-oriented authentication semantics; reusing server connections for different client requests can break that assumption. Therefore, the true statements are that it does not support UDP, is not compatible with NTLM, and reduces server-side connections.


Page:    1 / 14   
Total 65 questions