What is NOT a benefit of using a SNAT?
A. ASM can be deployed easily
B. No changes are needed on the servers
C. Fail open is easy to add
D. Higher performance than other configuration
Which of the following are default settings when using the Policy Builder to build a security policy based on the QA lab deployment scenario? (Choose two.)
A. All learned entities are placed in staging.
B. Attack signatures are not placed in staging
C. The security policy is placed in blocking mode
D. Tightening is enabled only on file types and parameters.
Replicating a large database between sites could take several hours without WOM, and only several minutes with WOM.
A. True
B. False
Brute force protection will:
A. Block a user after a specified number, unsuccessful login attempts
B. Block a user after a specified number of page requests are attempted
C. None of the above
D. Block a user from downloading too much content from the site
Monitors can be assigned to which three resources? (Choose three.)
A. Pools
B. Servers
C. Wide-IPs
D. Data Centers
E. Pool Members
Assume a virtual server has a ServerSSL profile. What SSL certificates are required on the pool members.
A. No SSL certificates are required on the pool members.
B. The pool members SSL certificates must only exist.
C. The pool members SSL certificates must be issued from a certificate authority.
D. The pool members SSL certificates must be created within the company hosting the BIG-IPs.
A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero What does this mean?
A. The client is trying to close the TCP connection
B. The server is trying to close the TCP connection
C. The server is temporary unable to receive any more data
D. The client is temporarily unable to receive any more data
An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer. Which type of solution is this?
A. packet forwarding architecture
B. delayed binding
C. switching
D. Full proxy architecture
Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?
A. measure usage
B. provide authentication
C. provide availability
D. provide session auditing
E. filter access
What does ICMP Time Exceeded'' mean?
A. The ping command exceeded the time limit.
B. The traceroute command exceeded the time limit
C. Remote host did not respond
D. TTL has reached zero