题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-05-11 21:39:40

[多选题]An LTM Specialist decides to offload SSL traffic on the LTM device instead of just passing it through. The LTM Specialist needs to change the configure from a Performance (Layer 40 virtual server to a Standard virtual server with SSL offload.
Which two element the LTM Specialist consider when performance this task? (Choose two.)
A. CPU load
B. Sensitive connections
C. Port exhaustion
D. Memory load
E. Connection mirroring

更多"[多选题]An LTM Specialist decides to o"的相关试题:

[单选题]Exhibit.
The LTM devices LTM1 and LTM2 are configured in a Device Group (Sync Failover) with Network Failover configured on both the management and HA and Internal VLANS. and ConfigSync is confined in a Device Group (Sync Failover) with Network Failover and internal are tagged on a single trunk with subnets Connection Mirroring is configured on both the HA interlace directly connected between LTM1 and LTM2, and the management interlace is connected to a management switch. The LTM devices have four Traffic Groups defined, and both LTM devices are healthy and capable of passing traffic for any of the Traffic Groups.
An LTM Specialist disconnects the cable for the HA network in an effort to test failover. Which HA functionality works in this case?
A. ConfigSync does NOT work. Connection Mirroring floes NOT work.
B. ConfigSync works Connection Mirroring works
C. ConfigSync works. Connection Mirroring docs NOT work
D. ConfigSync does NOT work; Connection Mirroring works
[单选题]One LTM device in an HA pair of LTM devices is unable to reach its default gateway. An HA Failover event needs to happen.
Which configuration item enables this behavior?
A. iRule
B. Gateway Fail Safe
C. Gateway pool monitor
D. Gateway pool
[单选题]Refer to the exhibit.
The LTM devices LTM3 and LTM2 have four Traffic Groups defined with approximately the sar of failover objects defined in each group.
- Traffic Groups A and C have Default Device set to LTM1
- Traffic Groups Band D have Default Device set to LTM2.
- Traffic Groups B and C do NOT have Auto Failback enabled. Traffic Groups A and D have Auto Failback
Enabled with a timeout value of 60 seconds.
- Traffic Groups A and D have Auto Fallback enabled with a timeout value of 60 seconds. Both LTM devices are healthy and able to pass traffic for any Traffic Group.
LTM1 loses connectivity on interface 1.4. The LTM Specialists notified 60 seconds after the interface goes down.
What is the state of the Traffic Groups on each LTM device?
A.LTM1: Traffic Group CLTM2: Traffic Groups
A,
B, and 0
B.LTM1: No Traffic GroupsLTM2: Traffic Groups
A,B.
C, and DC.
[单选题]An LTM Specialist regularly provides analytics reports that show that traffic generated by different subnets within the organization. The LTM Specialist needs show the associate department names next the IP addresses in the reports.
Which step should the LTM Specialist take to meet this requirement?
A. use an iRule to change the output of the report
B. export the report and add the department names manually
C. create VLANs for each subnet and set the name accordingly
D. define active subnets and assign a name to certain subnets
[单选题]An LTM Specialist needs to provide statistics regarding the round-trip time between the clients and the servers.
Which metric should be part of the analytics profile to provide that information?
A. Page Load Time
B. User Sessions
C. Max TPS and Throughout
D. Response Codes
[单选题]An LTM Specialist needs to provide access to a 8BG-IP to device for a company's support person access to the BIG IP device, but are NOT allowed to change any settings All support the support remote access to the BIG-IP device, but are NOT allowed to change ant settings. All support have accounts in the
Company's Active Directory
Which method is appropriate to provide access for the support personnel to the BIG-JP device?
A. configure remote authentication for all users with a default user role of Guest
B. configure remote authentication and map support personnel users to the Guest user role
C. configure remote authentication and map support personnel users to the Operator user role
D. configure remote authentication for all users with a default user role of Operator
[单选题]An LTM Specialist needs to enable TCP connection re-use for a non-HTTP application. The application uses a simple request response protocol where each request and response is contained within a single packet.
Which configuration option should the LTM Specialist adjust?
A. increase the connection limit for pool members
B. increase the idle Timeout in a custom TCP profile
C. use a Performance (Layer 4) Virtual Server
D. assign a OneConnect profile
[单选题]An LTM device configured with a management IP address and route and a series of self-IPs and TMM routes. Both management and TMM have a routing entry for 101 10/24 Application traffic is being load balanced and sent to pool member 10.1.1.123 with SNAT Automap and configured.
Which route will the LTM device use?
A. TMM route regardless of the management port status
B. both routes, which will duplicate traffic on both management and TMM interface
C. equal cost multipath load balancing via both routes
D. management route when TMM interface is down or TMM is offline
E. management route regardless of the management port status
[单选题]An LTM Specialist configures a new virtual server with a single pool member. The LTM Specialist has NOT defined a health monitor for the pool, pool member or node.
What is the status of the virtual server?
A. Available (Enabled)
B. Offline (Disabled)
C. Unavailable (Enabled)
D. Unknown (Enabled)
[单选题]An LTM Specialist is the administrator of an HA pair that contains two BIG IP units and one floating traffic group (TG1). A new project requires the creation of 30 virtual servers. The Specialist decides to create a new floating traffic group (TG2) to handle this requirement. Objects for this project created by the BIG-IP Managers must appears in the correct traffic group.
Which configuration should the LTM Specialist use to meet the requirement?
A. Move the BIG-IP Managers from TG1 to TG2
B. Create a new partition and set the default traffic group to TG2
C. Modify the default traffic group of the Common partition to TG2
D. Restrict the Traffic Group Access of BIG-I Managers to TG2
[单选题]( )You have permission to enter the traffic lane, traffic clearance granted
A.You can enter the traffic lane because you are given the traffic clearance
B.You can enter the traffic lane because your berth is clear
C.You must arrive at the waypoint because you are given the traffic clearance
D.You must arrive at the waypoint because your berth is clear
[单选题]An LTM specialist needs to upgrade a VCMP quest in an HA Setup with minimum interruption for all VCMP guest instances.
In which should the LTM Specialist perform this upgrade?
A. Relicense the host. Failover all guest’s active traffic-groups to the other host, copy image to gest, create guest UCS install and set boot location to new volume, reboot
B. Failover this specific guest’s active traffic-group to the other Host, Relicense the guest, copy image to
Guest , create guest UCS, install and set boot location to new volume, reboot
C. Failover all guests’ active traffic-group to the other Host, Relicense the host, copy image to guest, create guest UCS, install and set boot location to new volume , reboot
D. Failover all guests’ active traffic-group to the other host, copy image to guest, create guest UCS install and set boot location to new volume, reboot, Relicense the host
Explanation:
Switch guest, reactive, license first and then upgrade.
[多选题]An LTM Specialist needs to configure a setup for antivirus scanning of HTTP traffic with an internet Contact adaption Protocol (ICAP) server.
Which two server type should be used? (Choose two.)
A. Standard
B. Internal
C. Performance HTTP
D. Forwarding IP
E. Stateless
[单选题]An LTM specialist needs to create a new account with the admin role called "newadmin' and access to all partitions.
Which tmsh command should be executed?
A. create /auth user newadmin partition-access add {all-partitions {role admin }} prompt for-password.
B. create /users newadmin partition-access add {all-partitions {role admin JJ prompt for-password.
C. create /user newadmin partition-access add (all-partitions {role admin }} prompt- for-password.
D. create / sys user newadmin partition-access add (all-partitions {role admin )} prompt-for-password.
Explanation:
Examining the use of commands, the creation of user is subordinate to auth
[单选题]Refer to the Exhibit.
An LTM Specialist notices that two members in a pool are overloaded. To relive the existing members a
Fourth member (10.128.20.14) is brought up.
How many member will receive and process new connections?
A. 4
B. 3
C. 2
D. 1
[单选题]A LTM device needs to load balance active and passive FTP traffic while using only a single virtual server.
Which virtual server type should an LTM Specialist configure on the LTM device?
A. Forwarding (Layer 2)
B. Standard
C. Stateless
D. DHCP relay
E. Forwarding (IP)
[单选题]An LTM Specialist needs to apply SNAT using currently used SNAT pool to a new virtual server. What needs to be completed before applying that configuration change?
A. Review connection for the selected SNAT pool and enlarge it if appropriate
B. Make sure that the BIG-IP device is NOT operating under heavy load during peak times
C. Verify that the IP address of the SNAT pool are in the same subnet as the pool members
D. Verify that the IP address of the SNAT pool are in the same VLAN as the pool members.
Explanation:
SNAT does not need to in the same vlan or same network segment as the pool member, as long as the route is reachable, excluding C and D he connection information of the SNAT pool to avoid port exhaustion under high concurrency
[单选题]An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device.
How should the LTM Specialist block these attempts?
A. add the permitted source IP addresses to the httpd allow list via tmsh
B. add the suspicious source IP addresses to the httpd deny list via tmsh
C. add the suspicious source IP addresses to the httpd deny list via Configuration Utility
D. add the permitted source IP addresses to the allow list via Configuration Utility

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码