Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

101 F5 Application Delivery Fundamentals Free Practice Exam Questions (2025 Updated)

Prepare effectively for your F5 101 Application Delivery Fundamentals certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 240 questions

HTTP pool attached to a Virtual Server has three members

Pool member A default HTTP monitor in red

Pool member 6 custom HTTP monitor in green

Pool member C does not monitor

Which pool members participate in the load balancing?

A.

Pool members A and C

B.

Pool members A B and C

C.

Pool members B and C

D.

Pool members A and B

A BIG IP Administrator observes that the pool member status is a blue square What does this status indicate?

A.

The object is available

B.

The availability of the object is unknown.

C.

The object has reached its configured connection limit

D.

The object is unavailable.

Which HTTP response code indicates an OK status?

A.

302

B.

404

C.

200

D.

100

Which security model provides protection from unknown attacks?

A.

ACL Security model

B.

closed security model

C.

Negative security model

D.

Positive security model

In an administrator's environment, the administrator wants to inspect a high volume of SSL traffic

What should be used for this task?

A.

Big-IP Global Traffic Manager appliance

B.

Big-lP standard virtual edition

C.

Big-IP Local Traffic Manager appliance

D.

Big-IP virtual edition with FIPS

An administrator security policy defines allowed URLs, file types and parameter values Which security model is the administrator using?

A.

negative security model

B.

Closed security model

C.

positive Security model

D.

ACL Security model

What is a benefit of configuring BIG-IP devicesin active-active high availabilitymode?

A.

avoid Overload on the BIG-P system in theevent of a failover

B.

allows full utilization of hardware purchased

C.

reduces troubleshooting complexity

D.

provides ability to upgrade a member of the pair without disruption

An administrator connects two devices using an Ethernet cable. The link fails to come up on either device, which setting could prevent the link from being established?

A.

Proxy settings

B.

IP configuration

C.

Link speed

D.

DNS resolvers

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.

What is the F5-recommended persistence method in this situation?

A.

SSL session ID persistence

B.

source address persistence

C.

SIP persistence

D.

destination address persistence

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

A BIG-IP administrator is interested in using some of the vCMP

What should impact the administrator's decision?

A.

vCMP is available on all F5 hardware platforms.

B.

vCMP is only available on the virtual edition

C.

vCMP is hardware independent

D.

vCMP is only available on certain F5 platforms

An administrator is trying to debug why the 10.0.10.0/24 network is inaccessible from a certain server. The server is able to access the internet Successfully.

The administrator inspects the routing table and ARP table on the affected server.

Given the terminal output shown, what could be causing this issue?

A.

The default gateway is not sending ARP responses

B.

The static route for 10. 0.10.0/24 is misconfigured

C.

The local server is unable to receive ARP responses

D.

The default route (0. 0. 0. 0/0) is misconfigured

Which device group type allows a BIG IP system to automatically become active in the event that the current active system fails?

A.

Sync-active

B.

sync-failover

C.

sync-standby

D.

sync-only

in which scenario is a full proxy TCP connection required?

A.

when DNS load balancing is performed

B.

When source NAT is demanded

C.

when the client source IP address is sent to the server

D.

when the client and server connection are decoupled

A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192 168 1 1 Which TMSH command should the administrator use?

A.

create/net route 10. 11. 1/32 gw 192 168. 1. 1

B.

create met route 192 168. 1. 1/32 gw 10. 11. 1

C.

add met route 192. 168. 1. 1/32 gw 10. 1. 1. 1

D.

add inet route 10.11.1/32 gw 192. 168.1.1

What is the nest hop used to send traffic to reach 192.168.1.50?

A.

172. 17. 12. 51

B.

192. 168. 150

C.

172. 17. 12.254

D.

172. 17. 12/ 255

A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?

A.

switch

B.

Router

C.

HUP

D.

Bridge

In which scenario does the client act as a server?

A.

During an active FTP session

B.

When an SMTP connection

C.

During an SMTP connection

D.

When browsing websites

Which support service is required to synchrony the time stamps in system logs from these devices?

A.

SNMP

B.

Syslong

C.

SMTP

D.

DNS

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Page: 3 / 4
Total 240 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved