F5 101 Exam (page: 10)
F5 Application Delivery Fundamentals Exam
Updated on: 25-Dec-2025

Viewing Page 10 of 93

Since F5 built GTM on the TMOS platform it can exist on the same BIGIP device as LTM:

  1. True
  2. False

Answer(s): A



An administrator is adding GTM to the network infrastructure. Which of the following requirements would lead them to select an Authoritative Screening architecture rather than Delegation?

  1. They want GTM to examine all DNS queries.
  2. They want GTM to make load balancing decisions based on metrics.
  3. They have data centers in several countries.
  4. They are using several operating systems for the local DNS servers.

Answer(s): C



The BIG-IP full proxy architecture has full visibility from the client to the server and from the server to the client.
What security benefit does this provide to customers?

  1. Offloads security functionality from other devices such as network firewalls and Intrusion
    Prevention Systems (IPS), which may experience performance degradation when inspecting DNS queries and responses.
  2. provides enhanced support for DNS servers.
  3. Establishes highly detailed policies based on your customer's business in requirements, performs multiple factors of authentication, detects corporate versus non-corporate devices, checks OS patch levels, and determines antivirus patch levels.
  4. Provides industry-leading knowledge of application behavior as it travels through a network, and it applies that knowledge to security because it knows how an application behaves at any point in the reply request process

Answer(s): D



Select the key reasons F5 is able to handle DNS DDoS attacks so effectively? Select two.

  1. F5 can ensure a DNS DDoS attack is not successful.
  2. F5 has high performance DNS services.
  3. F5 can answer the DNS queries directly.
  4. With Global Traffic Manager (GTM), F5 completely stops all DNS DDoS attacks.
  5. F5 can ensure a customer never faces a DNS DDoS attack.

Answer(s): C,E



Which of the following are the three main business drivers for placing LTM into a network? (Choose three.)

  1. Secure the connection between WAN sites.
  2. Improve application availability and scalability.
  3. Authenticate and authorize users.
  4. Boost application performance.
  5. Include application security.
  6. Act as a Web application firewall

Answer(s): B,D,E



Viewing Page 10 of 93



Share your comments for F5 101 exam with other users:

nITA KALE 8/22/2023 1:57:00 AM

i need dumps
Anonymous


Karan 5/17/2023 4:26:00 AM

need this dump
Anonymous