Free F5 Networks 201 Exam Actual Questions

The questions for 201 were last updated On Apr 27, 2024

Question No. 1

A Virtual Server uses an iRule to send traffic to pool members depending on the URI. The BIG-IP

Administrator needs to modify the pool member in the iRule.

Which event declaration does the BIG-IP Administrator need to change to accomplish this?

Show Answer Hide Answer
Correct Answer: C

According to the UR! distribution is the category of HTTP requests, need to trigger HTTP_REQUEST event.


Question No. 2

Refer to the exhibit.

A BIG-IP Administrator creates a new Virtual Server to load balance SSH traffic. Users are unable to log on to the servers.

What should the BIG-IP Administrator do to resolve the issue?

Show Answer Hide Answer
Correct Answer: B

Question No. 3

A BIG-IP Administrator uses backend servers to host multiple services per server. There are multiple virtual servers and pools defined, referencing the same backend servers.

Which load balancing algorithm is most appropriate to have an equal number of connections on each backend server?

Show Answer Hide Answer
Correct Answer: B

The same set of servers provides multiple services, that is, using different ports to provide different services at the same time. The stem requirement is based on server connection balancing, not server + port, so it is node.


Question No. 4

The BIG-IP Administrator needs to perform a BIG-IP device upgrade to the latest version of TMOS. Where can the administrator obtain F5 documentation on upgrade requirements?

Show Answer Hide Answer
Correct Answer: A

Question No. 5

A BIG-IP Administrator makes a configuration change to the BIG-IP device. Which file logs the message regarding the configuration change?

Show Answer Hide Answer
Correct Answer: B

About audit logging

Audit logging is an optional feature that togs messages whenever a BIG-IP system object, such as a virtual server or a load balancing pool, is confined (that is. created, modified, or deleted). The BiGIP system logs the messages for these auditing events in the file /var/log'audit

There are three ways that objects can be configured

* By user action

* By system action

* By loading configuration data

Whenever an object is configured in one of these ways, the BIG-IP system logs a message to the audit log