When a virtual server has an HTTP profile with compression enabled, which traffic is compressed by the BIG-IP?
A. selected traffic from the BIG-IP to the client
B. all sever-side traffic for that virtual server
C. selected traffic from the pool member to the BIG-IP
D. all client-side traffic for that virtual server
A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all other factors are equal and traffic should be sent to all members, which two load balancing methods are most appropriate? (Choose two.)
A. Ratio
B. Priority
C. Observed
D. Round Robin
There are many user roles configurable on the BIG-IP ASM System. Which of the following user roles have access to make changes to ASM policies? (Choose three.)
A. Guest
B. Operator
C. Administrator
D. Web Application Security Editor
E. Web Application Security Administrator
When can a single virtual server be associated with multiple profiles?
A. Never. Each virtual server has a maximum of one profile.
B. Often. Profiles work on different layers and combining profiles is common.
C. Rarely. One combination, using both the TCP and HTTP profile does occur, but it is the exception.
D. Unlimited. Profiles can work together in any combination to ensure that all traffic types are supported in a given virtual server.
Which of these statements about a stream profile is false?
A. It is applied to an HTTP class profile.
B. It is not recommended for telnet traffic.
C. It can replace one data string for another for all traffic going through a virtual server.
D. It applies to both inbound and outbound traffic.
E. It will not inspect HTTP headers when an HTTP profile is present.
Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effectively than any other firewalls?
A. Because F5 has unlimited capacity to handle SSL traffic.
B. Because F5 has full visibility and control of SSL traffic.
C. Because F5 has a separate iApp to handle SSL traffic.
D. Because F5 supports large SSL key sizes.
Information leakage is a major obstacle to achieving PCI DSS compliance.
A. True
B. False
Which statement is true regarding OneConnect processing?
A. The virtual server must have UDP profile.
B. Server-side request can utilize existing client-side connections.
C. The number of client connection is reduced.
D. Client-side request can utilize existing server-side connections.
Which of the following is a valid IP address and prefix length?
A. 192. 168.:0 177/25
B. 192 168:0. 129/25
C. 192.168:0 128/25
D. 192 168 :0 255/25
In which layer of the OSI model is the data transported in the form of a packet?
A. Transport
B. Session
C. Network
D. Presentation