Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

201 F5 TMOS Administration Free Practice Exam Questions (2025 Updated)

Prepare effectively for your F5 201 TMOS Administration certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 254 questions

A BIG-IP Administrator is receiving intermittent reports from users that SSL connections to the BIG-IP device are failing. Upon checking the log files, the BIG-IP Administrator notices the following error message:

ere tmm[]: 01260008:3: SSL transaction (TPS) rate limit reached

After reviewing statistics, the BIG-IP Administrator notices there are a maximum of 1200 client-side SSL

TPS and a maximum of 800 server-side SSL TPS.

What is the minimum SSL license limit capacity the BIG-IP Administrator should upgrade to handle this

peak?

A.

2000

B.

400

C.

800

D.

1200

Which statement is true regarding failover?

A.

Hardware failover is disabled by default.

B.

Hardware failover can be used in conjunction with network failover.

C.

If the hardware failover cable is disconnected, both BIGIP devices will always assume the active role.

D.

By default, hardware fail over detects voltage across the failover cable and monitors traffic across the internal VLAN.

A BIG-IP Administrator reviews the log files to determine the cause of a recent problem and finds the

following entry.

Mar 27.07.58.48 local/BIG-IP notice mcpd {5140} 010707275 Pool member 172.16.20.1.10029 monitor

status down.

What is the cause of this log message?

A.

The pool member has been disabled.

B.

The pool member has been marked as Down by the BIG-IP Administrator.

C.

The monitor attached to the pool member needs a higher timeout value.

D.

The monitor attached to the pool member has failed.

A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection.

A.

172.16.20.1:80

B.

172.16.20.2:80

C.

172.16.20.3:80

D.

172.16.20.4:80

E.

172.16.20.5:80

The BIG-IP appliance fails to boot. The BIG-IP Administrator needs to run the End User Diagnostics (EUD)

utility to collect data to send to F5 Support.

Where can the BIG-IP Administrator access this utility?

A.

Console Port

B.

Internal VLAN interface

C.

External VLAN interface

D.

Management Port

Assume the bigd daemon fails on the active system. Which three are possible results? (Choose three.)

A.

The active system will restart the bigd daemon and continue in active mode.

B.

The active system will restart the tmm daemon and continue in active mode.

C.

The active system will reboot and the standby system will go into active mode.

D.

The active system will failover and the standby system will go into active mode.

E.

The active system will continue in active mode but gather member and node state information from the standby system.

Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are

left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?

A.

The BIG-IP would drop the request since the traffic didn’t arrive destined to the NAT address.

B.

The source address would not change, but the destination address would be changed to the NAT address.

C.

The source address would be changed to the NAT address and destination address would be left unchanged.

D.

The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP.

A BIG-IP device is configured with both an internal external and two Corporate VLANs. The virtual server

has SNAT enabled and is set to listen on all VLANs Auto Last Hop is disabled. The Corporate users are on

10.0.0.0./24 and 172.16.0.0/12. The BIG-IP has a Self-IP on the 1.0.0.0.0./24 subnet.

Internet users are able to access the virtual server. Only some of the Corporate users are able to connect

to the virtual server A BIG-IP Administrator performs a tcpdump on the BIG-IP and verifies that traffic is

arriving from users in 10.0.0.0/24.

What should the BIG-IP Administrator do to correct this behaviour?

A.

Disable the server on the internal VLAN

B.

Add a static route for the 172.16.0.0/12 subnet

C.

Change the default route to point to the extra firewall

D.

Modify the default route of the servers to point to the BIG-IP device

Refer to the exhibit.

A BIG-IP Administrator configures a now VLAN on an HA pair of devices that does NOT yet have any

traffic. This action causes the assigned traffic group to fail over to the standby device.

Which VLAN setting should be changed to prevent this issue?

A.

Auto Last Hop

B.

Fail-safe

C.

Customer Tag

D.

Source Check

A 8IG-IP Administrator configures a Virtual Server to load balance traffic between 50 webservers for an

ecommerce website Traffic is being load balanced using the Least Connections (node) method.

The webserver administrators report that customers are losing the contents from their shopping carts

and are unable to complete their orders.

What should the BIG-IP Administrator do to resolve the issue?

A.

Change Default Persistence Profile setting to cookie

B.

Change Load Balancing method to Ratio (member)

C.

Change Default Persistence Profile setting to sipjnfo

D.

Change Load Balancing method to Ratio (node)

A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)

A.

TCP

B.

HTTP

C.

HTTPS

D.

ClientSSL

E.

ServerSSL

Administrative user accounts have been defined on the remote LDAP server and are unable to log in to

the BIG-IP device.

Which log file should the BIG-IP Administrator check to find the related messages?

A.

/var/log/secure

B.

/var/log/messages

C.

/Nar/log/ltm

D.

/var/log/user.log

In the BIG-IP Configuration Utility, a user requests a single screen view to determine the status of all Virtual Servers and associated pool members, as well as any iRules in use. Where should the BIG-IP Administrator instruct the user to find this view?

A.

Local Traffic > Monitors

B.

Local Traffic > Virtual Servers

C.

Local Traffic > Network Map

D.

Statistics

Refer to the exhibit.

A BIG-IP Administrator configures the Virtual Server to pass HTTP traffic. Users report that they are

unable to access the application

What should the administrator do to resolve this issue?

A.

Change the Virtual Server name

B.

Disable .he State

C.

Reconfigure the Source Address

D.

Reconfigure the Pool Members

A BIG-IP Administrator is unable to connect to the management interface via HTTPS. What is a possible reason for this issue?

A.

The port lockdown setting is configured to Allow None.

B.

An incorrect management route is specified.

C.

The IP address of the device used to access the management interface is NOT included in the "P Allow" list in the Configuration Utility.

D.

The IP address of the device used to access the management interface is NOT included in the "httpd Allow" list in the CLI.

You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2?

A.

All changes to TEST1 are propagated to TEST2.

B.

Some of the changes to TEST1 may propagate to TEST2.

C.

Changes to TEST1 cannot affect TEST2 once TEST2 is saved.

D.

When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes to TEST2.

How is MAC masquerading configured?

A.

Specify the desired MAC address for each VLAN for which you want this feature enabled.

B.

Specify the desired MAC address for each selfIP address for which you want this feature enabled.

C.

Specify the desired MAC address for each VLAN on the active system and synchronize the systems.

D.

Specify the desired MAC address for each floating selfIP address for which you want this feature enabled.

A local user account (Users) on the BIG-IP device is assigned the User Manager role. Userl attempts to

modify the properties of another account (User2), but the action fails. The BIG-IP Administrator can

successfully modify the User2 account.

Assuming the principle of least privilege, what is the correct way to allow User 1 to modify User2

properties?

A.

Move User2 to the same partition as User1

B.

Grant User1 administrative privileges

C.

Move User to the same partition as User2.

D.

Modify the partition access for User 1

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the

management interface.

Where should this be accomplished?

A.

System > Configuration

B.

Network > Interfaces

C.

Network > Self IPs

D.

System > Platform

A 816-IP Administrator recently deployed an application Users are experiencing slow performance with

the application on some remote networks.

Which two modifications can the BIG-IP Administrator make to address this issue? (Choose two)

A.

Apply dest addr profile to the Virtual Server

B.

Apply f5-tcp-wan profile to the Virtual Server

C.

Apply f5-tcp-lan profile to the Virtual Server

D.

Apply source_addr profile to the Virtual Server

E.

Apply fasti_4 profile to the Virtual Server

Page: 1 / 4
Total 254 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved