A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all other factors are equal and traffic should be sent to all members, which two load-balancing methods are most appropriate? (Choose two.)
A. Ratio
B. Priority
C. Observed
D. Round Robin
The current status of a given pool is offline (red). Which condition could explain that state? Assume the descriptions below include all monitors assigned for each scenario.
A. No monitors are currently assigned to any pool, member or node.
B. The pool has a monitor assigned to it, and none of the pool members passed the test.
C. The pool has a monitor assigned to it, and only some of the pool's members passed the test.
D. A monitor is assigned to all nodes and all nodes have passed the test. The pool's members have no specific monitor assigned to them.
Which three statements describe a characteristic of profiles? (Choose three.)
A. Default profiles cannot be created or deleted.
B. Custom profiles are always based on a parent profile.
C. A profile can be a child of one profile and a parent of another.
D. All changes to parent profiles are propagated to their child profiles.
E. While most virtual servers have at least one profile associated with them, it is not required.
Which is an advantage of terminating SSL communication at the BIG-IP rather than the ultimate web server?
A. Terminating SSL at the BIG-IP can eliminate SSL processing at the web servers.
B. Terminating SSL at the BIG-IP eliminates all UN-encrypted traffic from the internal network.
C. Terminating SSL at the BIG-IP eliminates the need to purchase SSL certificates from a certificate authority.
D. Terminating SSL at the BIG-IP eliminates the need to use SSL acceleration hardware anywhere in the network.
Which event is always triggered when the client sends data to a virtual server using TCP?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. VS_CONNECTED
What is the purpose of MAC masquerading?
A. to prevent ARP cache errors
B. to minimize ARP entries on routers
C. to minimize connection loss due to ARP cache refresh delays
D. to allow both BIG-IP devices to simultaneously use the same MAC address
Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in a redundant pair configuration?
A. bandwidth utilization
B. duplicate IP address
C. CPU utilization percentage
D. VLAN communication ability
The incoming client IP address is 195.64.45.52 and the last five connections have been sent to members A, C, E, D and B. Given the virtual server, pool, and persistence definitions and statistics shown in the above graphic, which member will be used for the next connection?
A. 10.10.20.1:80
B. 10.10.20.2:80
C. 10.10.20.3:80
D. 10.10.20.4:80
E. 10.10.20.5:80
F. It cannot be determined with the information given.
Assuming that systems are synchronized, which action could take place if the fail-over cable is connected correctly and working properly, but the systems cannot communicate over the network due to external network problems?
A. If network fail-over is enabled, the standby system will assume the active mode.
B. Whether or not network fail-over is enabled, the standby system will stay in standby mode.
C. Whether or not network fail-over is enabled, the standby system will assume the active mode.
D. If network fail-over is enabled, the standby system will go into active mode but only until the network recovers.
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52 opens a connection to the virtual server, which member will be used for the connection?
A. 172.16.20.1:80
B. 172.16.20.2:80
C. 172.16.20.3:80
D. 172.16.20.4:80
E. 172.16.20.5:80