Latest 201 Dumps For TMOS Administration Certification

Want to know Actualtests 201 Exam practice test features? Want to lear more about F5-Networks TMOS Administration certification experience? Study Best Quality F5-Networks 201 answers to Latest 201 questions at Actualtests. Gat a success with an absolute guarantee to pass F5-Networks 201 (TMOS Administration) test on your first attempt.

Free 201 Demo Online For F5-Networks Certifitcation:

A site needs to terminate client HTTPS traffic at the BIG-IP and forward that traffic unencrypted. Which two are profile types that must be associated with such a virtual server? (Choose two.)

  • A. TCP
  • B. HTTP
  • C. HTTPS
  • D. ClientSSL
  • E. ServerSSL

Answer: AD

A BIG-IP Administrator is informed that traffic on Interface 1.1 is expected to increase over the maximum bandwidth capacity on the link. There is a single VLAN on the Interface. What should the 8IG-IP Administrator do to increase the total available bandwidth?

  • A. Assign two Interfaces to the VLAN
  • B. Set the media speed of Interface 1.1 manually
  • C. Create a trunk object with two Interfaces
  • D. Increase the MTU on the VLAN using Interface 1.1

Answer: C

A BIG-IP Administrator must configure the BIG-IP device to send system log messages to a remote syslog server In addition, the log messages need to be sent over TCP for guaranteed delivery. What should the BIG-IP Administrator configure?

  • A. syslog-ng
  • B. Request Logging Profile
  • C. HSL Logging
  • D. Remote Logging

Answer: D

Which statement is true concerning cookie persistence?

  • A. Cookie persistence allows persistence independent of IP addresses.
  • B. Cookie persistence allows persistence even if the data are encrypted from client to pool member.
  • C. Cookie persistence uses a cookie that stores the virtual server, pool name, and member IP address in clear text.
  • D. If a client's browser accepts cookies, cookie persistence will always cause a cookie to be written to the client's file system.

Answer: A

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the
management interface.
Where should this be accomplished?

  • A. System > Configuration
  • B. Network > Interfaces
  • C. Network > Self IPs
  • D. System > Platform

Answer: D

A virtual server is listening at and has the following iRule associated with it:
when HTTP_REQUEST { if {[HTTP::uri] ends_with "txt" } { pool pool1 } elseif {[HTTP::uri] ends_with "php" } { pool pool2 }
If a user connects to, which pool will receive the request?

  • A. pool1
  • B. pool2
  • C. Non
  • D. The request will be dropped.
  • E. Unknow
  • F. The pool cannot be determined from the information provided.

Answer: D

How is persistence configured?

  • A. Persistence is an option within each pool's definition.
  • B. Persistence is a profile type; an appropriate profile is created and associated with virtual server.
  • C. Persistence is a global setting; once enabled, loadbalancing choices are superceded by the persistence method that is specified.
  • D. Persistence is an option for each pool membe
  • E. When a pool is defined, each member's definition includes the option for persistence.

Answer: B

Assuming that systems are synchronized, which action could take place if the fail over cable is connected correctly and working properly, but the systems cannot communicate over the network due to external network problems?

  • A. If network failover is enabled, the standby system will assume the active mode.
  • B. Whether or not network failover is enabled, the standby system will stay in standby mode.
  • C. Whether or not network failover is enabled, the standby system will assume the active mode.
  • D. If network failover is enabled, the standby system will go into active mode but only until the network recovers.

Answer: B

Which is an advantage of terminating SSL communication at the BIGIP rather than the ultimate web server?

  • A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
  • B. Terminating SSL at IP the eliminates BIG all unencrypted traffic from the internal network.
  • C. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.
  • D. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.

Answer: A

You have a pool of servers that need to be tested. All of the servers but one should be tested every 10 seconds, but one is slower and should only be tested every 20 seconds. How do you proceed?

  • A. It cannot be don
  • B. All monitors test every five seconds.
  • C. It can be done, but will require assigning monitors to each pool member.
  • D. It cannot be don
  • E. All of the members of a pool must be tested at the same frequency.
  • F. It can be done by assigning one monitor to the pool and a different monitor to the slower pool member.

Answer: D

Refer to the exhibit.
201 dumps exhibit
An organization is reporting slow performance accessing their Intranet website, hosted in a public cloud. All employees use a single Proxy Server with the public IP of to connect to the Internet. What should the BIG-IP Administrator of the Intranet website do to fix this issue?

  • A. Change Source Address to
  • B. Change Load Balancing Method to Least Connection
  • C. Change Fallback Persistence Profile to source_addr
  • D. Change Default Persistence Profile to cookie

Answer: D

The current status of a given pool is offline (red). Which condition could explain that state? Assume the descriptions below include all monitors assigned for each scenario.

  • A. No monitors are currently assigned to any pool, member or node.
  • B. The pool has a monitor assigned to it, and none of the pool members passed the test.
  • C. The pool has a monitor assigned to it, and only some of the pool's members passed the test.
  • D. A monitor is assigned to all nodes and all nodes have passed the tes
  • E. The pool's members have no specific monitor assigned to them.

Answer: B

A BIG-IP Administrator wants to add the ASM Module to an HA pair of BIG-IP devices. The BIG-IP Administrator has already installed a new Add-On License on both devices in the HA pair. What should the BIG-IP Administrator do next to use the module?

  • A. Provision the new module on both BIG-IP device's
  • B. Synchronize both BIG-IP devices
  • C. Reboot both BIG-IP devices
  • D. Reactivate the Licenses on both BIG IP devices

Answer: A

A BIG-IP Administrator creates a new VLAN on BIG-IP Cluster Member A and attaches an Interface to it. Although the Auto Config Sync is in place, the new VLAN does NOT show up on Cluster Member B. What should the BIG-IP Administrator do to ensure the new VLAN is configured on each Cluster Member?

  • A. Configure the new VLAN manually on Cluster Member B.
  • B. Reset the Device Trust of the BIG-IP Cluster on either Cluster Member.
  • C. Configure a Default Route for the new VLAN on Cluster Member A.
  • D. Enable the Interface that is attached to the new VLAN on Cluster Member A.

Answer: A

A BIG-IP Administrator needs to apply a license to the BIG-IP system to increase the user count from the base license.
Which steps should the BIG-IP Administrator?

  • A. System License > Re-activate> Add-On Registration> Edit
  • B. System > License > Re-activate > Base Registration> Edit
  • C. Device Management > Devices > Select BIG-IP System > Update
  • D. System > Configuration >Device > General

Answer: A

Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If a client were to initiate traffic to the NAT address, what changes, if any, would take place when the BIG-IP processes such packets?

  • A. The source address would not change, but the destination address would be translated to the origin address.
  • B. The destination address would not change, but the source address would be translated to the origin address.
  • C. The source address would not change, but the destination address would be translated to the NAT's address.
  • D. The destination address would not change, but the source address would be translated to the NAT's address.

Answer: A


Thanks for reading the newest 201 exam dumps! We recommend you to try the PREMIUM 201 dumps in VCE and PDF here: (254 Q&As Dumps)