Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "EE0-501" Exam

F5 BIG-IP V4

 Question 5.
Which IP address does the BIG-IP assign itself by default at startup, before the BIG-IP has been configured

A. 10.10.1.245 or 192.168.245.245
B. 192.168.1.127 or 192.168.1.245
C. 192.168.245.245 or 192.168.1.245
D. 172.16.1.245 or 172.16.245.245

Answer: C

Question 6.
When administrative users are created, which three access levels can they be granted through the BIG-IP Configuration Utility? (Choose three.)

A. CLI
B. Web Read Only
C. CLI + Web Read Only
D. CLI + Full Web Read / Write
E. CLI + Partial Web Read / Write

Answer: A, B, D

Question 7.
Which three methods are available for authentication of administrative users logging on to BIG-IP's web-based Configuration Utility? (Choose three.)

A. Local LDAP database
B. Local Radius database
C. Remote LDAP database
D. Remote Radius database
E. Local master.passwd database

Answer: A, C, D

Question 8.
With two BIG-IPs in a redundant pair, which statement best describes what happens when some event triggers a failover?

A. The Standby BIG-IP detects the failure and reboots itself.
B. The Active BIG-IP waits to receive a message from the Standby BIG-IP, then relinquishes  
     control to the Standby.
C. The Active BIG-IP stops sending the signal indicating it is active, whereupon the Standby BIG- 
    IP detects the loss of signal and assumes the Active role.
D. The Standby BIG-IP assumes control for Virtual Servers that are no longer functioning. Those  
    Virtual Servers that are still processing data continue to be served by the original active BIG-IP  
    until those connections are completed.

Answer: C

Question 9.
Which two are failover triggers that cause a BIG-IP to reboot when a failure is detected? 
(Choose two.)

A. Watchdog card
B. Gateway Failsafe
C. MAC masquerading
D. Arm Failsafe on VLANs

Answer: A, D

Question 10.
What happens if the serial failover cable is connected correctly and working, but the BIG-IPs cannot communicate over the network due to external network problems?

A. If Network Failover is enabled, the Standby BIG-IP will assume the Active role.
B. Regardless of whether Network Failover is enabled, the Standby BIG-IP will assume the Active 
    role.
C. Regardless of whether Network Failover is enabled, the Standby BIG-IP will maintain the 
     Standby role.
D. If Network Failover is enabled, the Standby BIG-IP will assume the Active role, but only until 
     the network recovers.

Answer: C

Question 11.
When Network Failover is enabled, what is the interaction with the serial failover cable?

A. The serial failover cable must be disconnected if Network Failover is enabled.
B. The serial failover cable status is ignored. Failover is determined by the Network Failover  
     status only.
C. Either a network failure or loss of voltage across the serial failover cable will cause a failover.
D. A network failure will not cause a failover as long as the voltage is sent across the serial 
     failover cable.

Answer: D

Question 12.
If an unexpected event occurs that causes both BIG-IPs to become Active, which recovery processes are valid? (Choose two.)

A. If the BIG-IPs are relying on the serial failover cable, once the voltage is restored the systems  
    will recover automatically by default.
B. If the BIG-IPs are relying on Network Failover, once the network is restored the systems will  
    recover automatically by default.
C. If the BIG-IPs are relying on Network Failover, the network must be restored and then the 
    administrator must force one system to become Standby.
D. If the BIG-IPs are relying on the serial failover cable, the voltage must be restored and then the  
    Administrator must force one BIG-IP to become Standby or pre-configure one BIG-IP to  
    become Standby.

Answer: B, D

Question 13.
Where is Connection Mirroring configured?

A. It is configured as a property of each Pool.
B. It is not configured. It is a default feature.
C. It is configured as a property of each Virtual Server.
D. It is configured as a property of each Node.

Answer: C

Question 14.
By default, what is true about active connections through Virtual Servers when failover occurs in a redundant BIG-IP configuration?

A. All connections are lost.
B. When persistence mirroring is enabled, active connections are maintained even on failover.
C. Long-lived connections such as telnet and FTP are maintained, but short-lived connections  
     such as HTTP are lost.
D. All active connections are lost, but new connections are initiated by the newly active BIG-IP, 
     resulting in minimal client downtime.

Answer: A

Question 15.
Where is Persistence Mirroring configured?

A. It is configured as a property of the Pool.
B. It is not configured. It is a default feature.
C. It is configured as a property of the Virtual Server.
D. It is configured as a property of the Node.

Answer: A

Question 16.
When using Cookie Persistence on a synchronized redundant pair of BIG-IPs, what configurations are necessary to ensure that persistence is not lost if a failover occurs?

A. Cookie Persistence will not be maintained if failover occurs.
B. Other than enabling Cookie Persistence, nothing needs to be done.
C. Within the Pool's persistence properties, Mirroring must be selected.
D. Select Cookie Persistence Mirroring under Advanced Properties/Cookie Persistence.

Answer: B

Question 17.
When Simple Persistence is configured and Persistence Mirroring is enabled, how frequently does the Active BIG-IP update the Standby BIG-IP concerning persistence table entries?

A. every second
B. at the frequency set on the Persistence Mirroring screen
C. at the same frequency that the Network Failover heartbeat occurs
D. every time a persistence record is created or deleted

Answer: D

Question 18.
What is the purpose of MAC masquerading?

A. to trigger a BIG-IP failover when the network is unreachable
B. to allow nodes to use just one default gateway address
C. to minimize connectivity loss due to ARP cache refresh delays after a failover occurs
D. to allow two BIG-IPs to be used in Active/Active mode

Answer: C

Question 19.
Which statement is true concerning the configuration of Pools?

A. Each Pool is configured with a primary load balancing method and a backup load balancing  
    method.
B. A Pool cannot be created unless the Virtual Server that will use it already exists.
C. Every Pool is configured with a load balancing method.
D. Once a node is added to one Pool, it cannot be added to any other Pools.

Answer: C

Question 20.
Which statement describes normal traffic through a Virtual Server on a BIG-IP?

A. source IP address translated in both initiating and responding packets
B. destination IP address translated in both initiating and responding packets
C. destination IP address translated in initiating packets; source IP address translated in 
    response packets
D. source IP address translated in initiating packets; destination IP address translated in 
    response packets

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-140 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-140" Exam

Certified Internet Associate (JNCIA-AC) 140 Exam

 Question 1.
Which two statements are true about applying Host Checker at the realm level? (Choose two.)

A. If Evaluate is checked then the client must pass policy to get the sign-in page.
B. If Evaluate is checked then the client can fail policy and still get the sign-in page.
C. If Require and Enforce is checked then the client must pass policy to get the sign-in page.
D. If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

Answer: B, C

Question 2.
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity?

A. Events log
B. System log
C. User Access log
D. Admin Access log

Answer: A

Question 3.
Which statement is correct about defining an Intranet Enforcer for use as a RADIUS Client?

A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Intranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Intranet Enforcer will belong.

Answer: A

Question 4.
Which configuration option can be set either in the initial console menu or the Admin UI of the Intranet Controller?

A. VLAN ID
B. Hostname
C. Domain name
D. Administrative timeout

Answer: C

Question 5.
What is the primary purpose of creating a Location Group Policy?

A. to associate more than one realm with an authentication server
B. to logically group network access devices and associate them with specific sign-in policies
C. to allow or prevent users from accessing resources in specific locations on the network
D. to define the URL that users of network access devices can use to access the Intranet 
    Controller

Answer: B

Question 6.
What is true about the operation of the Intranet Enforcer?

A. It assigns users a set of roles.
B. It allows access based on auth table entries.
C. It verifies whether an endpoint meets security requirements.
D. It configures the UAC agent to allow or deny access to resources.

Answer: B

Question 7.
On a pre-existing OAC, which three options can the Intranet Controller overwrite when the user accesses the Intranet Controller? (Choose three.)

A. SSID
B. login name
C. MAC address
D. wired adapters
E. encryption method

Answer: A, D, E

Question 8.
What must be updated regularly to detect the newest versions of personal firewalls on endpoints?

A. Intranet Enforcer firmware
B. Intranet Controller rollback software
C. Host Security Assessment Plug-in (HSAP)
D. Endpoint Security Assessment Plug-in (ESAP)

Answer: D

Question 9.
Which three statements about dynamic filtering are true? (Choose three.)

A. Dynamic filtering creates a query statement.
B. Dynamic filtering has an option to save query.
C. Dynamic filtering can select any log field to filter.
D. Dynamic filtering permanently removes other log entries.
E. Dynamic filtering redraws the log when you select a variable link.

Answer: A, B, E

Question 10.
A customer has installed UAC in their network. They have both Windows and Linux endpoints and must choose a deployment method that everyone can use. 

Which deployment method allows for multiple platforms?

A. IPsec enforcement
B. 802.1X enforcement
C. Source IP enforcement
D. Odyssey Access Client

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.