1.
Why is BIG-IP ASM ideally suited to protect against layer 7 attacks, including HTTP and HTTPS/SSL traffic, when compared to an intrusion prevention system (IPS)?
2.
Data centers often rely on either traditional firewalls or next generation firewalls. Select the core weakness of the traditional or next generation firewalls when it comes to DDoS attacks.
3.
Why does the F5 Application Delivery Firewall solution mitigate SSL attacks more effectively than any other firewalls?
4.
Assume a client's traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
5.
A site wishes to perform source address translation on packets arriving from the Internet for clients sing some pools but not others. The determination is not based on the client's IP address, but on the pool they are load balanced to. What could best accomplish this goal?
6.
Which parameters are set to the same value when a pair of BIG-IP devices are synchronized?
7.
As a part of the Setup Utility, the administrator sets the host name for the BIG-IP. What would be the result if the two systems in a redundant pair were set to the same host name?
8.
Where is persistence mirroring configured?
9.
Which process or system can be monitored by the BIG-IP system and used as a failover trigger in a redundant pair configuration.
10.
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?