Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

771-101 F5 Application Delivery Fundamentals Free Practice Exam Questions (2025 Updated)

Prepare effectively for your F5 771-101 Application Delivery Fundamentals certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 240 questions

What are the two primary functions of the OSI 7 layer model (Choose two)

A.

to guide interoperability between products made by different vendors

B.

to define protocol behavior

C.

to group communications into logical layers

D.

to define specifications of host-to-host communications

E.

to standardize HTTP communications between different vendors

Which security mode. functions by defining what traffic is allowed and rejecting all other traffic?

A.

context-based access control mode!

B.

role-based access control mode!

C.

negative security model

D.

positive security model

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH command to create this new VLAN on the BIG-IP?

A.

Create/net wan internal interfaces add {1 1 (tagged }} tag 706

B.

Create/net vlan internal trunk add (11 {tagged)}

C.

add /net vlan internal interfaces add (11) tag 705

D.

add / net vlan internal tunk add {1 1 (tagged)) tag 705

Where is the MAC masquerade address configured?

A.

Virtual Server

B.

Virtual Address

C.

Device Groups

D.

Traffic Groups

An administrator needs to prepare change control documents for operations staff To reduce possible errors the administrator killed number of default configuration options is choose from. Which F5 feature is intended to help with this task?

A.

icontrol

B.

iCatl

C.

iApp

D.

iRules

A BIG IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers?

A.

time

B.

ntpdate

C.

date

D.

ntpq

Which protocol data unit (POU) is associated with the OSI model’s Network layer

A.

Segment

B.

Datagram

C.

Bit

D.

Frame

An application has a mix of both and short and long lived connections. Which algorithm would provide and event distributionof all connections across the pool?

A.

Priority group activate

B.

Least connections

C.

Static ration

D.

Round robin

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

An administrator needs to selectively compress HTTP traffic based on geographical location Which FS Feature should the administrator use?

A.

One Connect

B.

iRules

C.

SPDY profile

D.

iSessions

A BIG IP administrator is testing a web server behind ADC. The connection to a Virtual Server is successful but the page is still not loading Where should the administrator test to determine if theserver is available?

A.

from server-side interface in ADC.

B.

from client side interface in ADC

C.

from Workstation client

D.

from switch connected to ADC and Server

What is used to establish trust relationships between BIG-IP devices?

A.

trust ID

B.

device group identification

C.

certificate-based authentication

D.

unit IDs

An administrator encounter an error while working on eBiG.IP device and contacts F5 Support to open a case. While opening the case Support of the administrator that a BIO-IP version update is required.

Which F5 Support policy requires the administrator to upgrade the BIG-IP version.

A.

End of Software Support

B.

End of Support Contact Renewal

C.

End of Technical Support

D.

End of Return to Manufacturing

Tl SISSL prides which functionary when a web browser connects to web site using the HTTPS protocol?

A.

delivers secure communication over a network connection

B.

prevents the web server from being compromised

C.

protects network packets from interception by intermedianes

D.

stop the web browser from automatically downloading malware

What is a common use of an iRule?

A.

to modify application traffic between the client and server

B.

to create a reuseable application delivery template

C.

to integrate a BIG IP into an enterprise orchestration tool

D.

to create an accelerated session between two BIG-IP devices

An administrator needs to create a structured application delivery configuration that will prevent individual objects from being modified directly

Which F5 technology should the administrator use?

A.

iRules

B.

iApps

C.

iSessions

D.

iContfol

The BIG-IP device has the following configured routes:

Which gateway will be chosen to send the packet to the destination 10 238 10 11?

A.

192. 168 10 20

B.

192. 168.10. 40

C.

192 168. 10. 30

D.

192. 168. 10. 10

ARP provides translation between which two address types?

A.

IP addresses and hardware addresses

B.

Hardware addresses and VLAN

C.

VLAN and IP addresses

D.

Hostnames and IP addresses

An administrator needs to lower .he amount of new TCP connections to help with network congest?

How should the administrator accomplish this?

A.

Use HTTP keep-alive

B.

set a larger receive window

C.

Enable delayed ACKs

D.

use an indefinite timeout

Page: 2 / 4
Total 240 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved