Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

771-101 Application Delivery Fundamentals Questions and Answers

Questions 4

A company is creating a new department for Security Engineering and needs to create a segregated network segment with only 24 IPS.

What should be configured?

Options:

A.

configure a new VLAN and assign a netmask of /29

B.

use an existing VLAN and assign a netmask of /28

C.

use an existing VLAN and assign a netmask of /30

D.

configure a new VLAN and assign a netmask of /27

Buy Now
Questions 5

What advantage does an active-standby configuration have over an active-active configurations?

Options:

A.

Active-standby configuration allows for the backup of the peer configuration

B.

Active-standby utilizes the hardware more efficiently

C.

Active standby Uses significantly less power consumption than active-active

D.

Active-standby is less complex to troubleshoot

Buy Now
Questions 6

Which protocol is used for control and session establishment for streaming media?

Options:

A.

RTP

B.

DTLS

C.

SMB

D.

RTSP

Buy Now
Questions 7

In the Network Map a red diamond appears next to the three member servers in the Virtual Server’s pool. The nodes in the pool each show a green circle. What is the most likely reason for this scenario?

Options:

A.

The pool members health monitor has been disable

B.

The pool members have been disabled

C.

The pool members have been powered off

D.

The pool member services have been shut down

Buy Now
Questions 8

How does file caching affect the web application?

Options:

A.

It reduces the load on the web application

B.

It speeds up traffic to the web application

C.

It slows traffic to the web application

D.

It increases the load on the web application

Buy Now
Questions 9

In IPv4 the loopback IP is 127 0.0.1. or IPv6, what is the loopback address?

Options:

A.

FEBO::1

B.

FF8Q 0.0 : :1

C.

2001 :: 127 : : 1

D.

: : 1

Buy Now
Questions 10

An administrator points the browser at h.tp://www mydomain com. The destination server listens on TCP port 8080 Which feature must be enabled on the virtual server for this configuration to work?

Options:

A.

HTTP persistence

B.

source NAT

C.

destination address affinity

D.

port translation

Buy Now
Questions 11

A BIO IP Administrator is troubleshooting a slow web application. A packet capture shows that some of the packets coming from a window size of zero A packet capture shows that som a window size of zero

What does this mean?

Options:

A.

The client is trying to close the TCP connection

B.

The server is trying to close the TCP connection

C.

The server is temporary unable to receive any more data

D.

The client is temporarily unable to receive any more data

Buy Now
Questions 12

Which IP subnet mask can be used to send traffic to all network nodes?

Options:

A.

192 168.0. 255/23

B.

192. 168. 1. 11/31

C.

172. 16. 1255/22

D.

192. 168. 0. 11/30

Buy Now
Questions 13

771-101 Question 13

An administrator sets up a web server for a new web application. The administrator cannot access the web server at is causing this issue?

Options:

A.

The HTTP service only listens on localhost

B.

The users IP needs to be allowed to access

C.

The server needs to be restarted

D.

The HTTPS service Is not running

Buy Now
Questions 14

What is a disadvantage of running a visualized load balancer

Options:

A.

more expensive than a hardware load balancer

B.

slower than a hardware load balancer

C.

less reliable than a hardware load balancer

D.

does not support high availability

Buy Now
Questions 15

What does HTTP status code 500 mean?

Options:

A.

Service unavailable

B.

Internal server error

C.

Gateway timeout

D.

Had gateway

Buy Now
Questions 16

AD VLAN must be created with an 802.19 tag of 705 on interface 11. What is the proper TSH command to create this new VLAN on the BIG-IP?

Options:

A.

Create/net wan internal interfaces add {1 1 (tagged }} tag 706

B.

Create/net vlan internal trunk add (11 {tagged)}

C.

add /net vlan internal interfaces add (11) tag 705

D.

add / net vlan internal tunk add {1 1 (tagged)) tag 705

Buy Now
Questions 17

What is an advantage of packet forwarding architecture?

Options:

A.

allows for SSL offload

B.

reduces latency

C.

allows for manipulation of HTTP headers

D.

handles larger packet sizes

Buy Now
Questions 18

What is an advantage of a packet forwarding architecture?

Options:

A.

allows for manipulation of HTTP headers

B.

allows for SSL offload

C.

reduces latency

D.

handles larger packet sizes

Buy Now
Questions 19

When using LDAP for authentication, what is the purpose of the base ON?

Options:

A.

the search context starting point

B.

the directory's simple name

C.

the base attribute in an LDAP directory

D.

the fundamental naming convention

Buy Now
Questions 20

An administrator deploys a site in which the load balancer only sees the ingress traffic from the client All egress traffic from the server bypasses the load balancer.

Which type of solution is this?

Options:

A.

packet forwarding architecture

B.

delayed binding

C.

switching

D.

Full proxy architecture

Buy Now
Questions 21

Which protocol could be used to provide AAA Accounting?

Options:

A.

karberos

B.

SAML

C.

DIAMETER

D.

LDAP

Buy Now
Questions 22

A new virtual server is being tested to replace http://myapp.mydomain.com. The original virtual server is still on use. And the new virtual server is on a different ip address. What should be done to test this new virtual server using the fully quailed domain name for this application?

Options:

A.

add a DNS record for the fully qualified domain name

B.

add the fully qualified domain name to the browser cache

C.

make an entry in the client host file

D.

make an entry in the web server services file

Buy Now
Questions 23

A BIG IP Administrator wants to add a new VLAN (VLAN 40) to an LACP trunk (named LACP01) connected to the BIG-IP device Mufti VLANS exist on LACPO1. Which TMSH command should the BIG IP Administrator issue to add the new VLAN to the existing LACP trunk?

Options:

A.

create net vlan VLAN40 (interfaces add (LACP01 {lagged)) tag 40}

B.

create net vlan VLAN40 {interfaces replace-all-with {LACP01{tagged}} tag 40}

C.

create net vlan VLAN40 interfaces replace all with {LACP01 {untagged)} tag 40}

D.

create net vlan VLAN40 {interfaces add {LACP01 {untagged}} tag 40}

Buy Now
Questions 24

What is a benefit of configuring BIG-IP devices in active-active high availability mode?

Options:

A.

avoid Overload on the BIG-P system in the event of a failover

B.

allows full utilization of hardware purchased

C.

reduces troubleshooting complexity

D.

provides ability to upgrade a member of the pair without disruption

Buy Now
Questions 25

What are Iwo examples of failover capabilities of BIG-IP? (Choose two )

Options:

A.

failing over based on an over temperature alarm

B.

failing over serial cable based on electric failure code

C.

II failing over network connection based on heartbeat detection

D.

fading over network connection based on SNMP error

E.

failing over serial cable based on voltage detection

Buy Now
Questions 26

What are two examples of network layer protocols? (Choose two)

Options:

A.

ARP

B.

TCP

C.

IPv4

D.

BGP

E.

ICMP

Buy Now
Questions 27

771-101 Question 27

What should the administrator investigate first to address this traffic slownes

Options:

A.

The virtual server indicates 14 slow connections killed

B.

The pool member is unchecked

C.

Interface 1.2 shows 9.2K errors

D.

The pool shows no current connections.

Buy Now
Questions 28

An administrator needs to load balance connections to the application server with the lowest number of

Which load balancing method meets these requirements?

Options:

A.

Least Sessions

B.

Ratio Least Connections (member)

C.

Least Connections (member)

D.

Least Connections (node)

Buy Now
Questions 29

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

Options:

A.

Positive

B.

Context-based

C.

Negative

D.

Role-based

Buy Now
Questions 30

What should the BIG-IP Administrator configure to perform SSL offloading when the certificate is already imported on the BIG-IP device?

Options:

A.

HTTP profile using client SSL profile

B.

Virtual server using client SSL profile configured to use the certificate

C.

Virtual server using server SSL profile configured to use the certificate

D.

HTTP profile using server SSL profile

Buy Now
Questions 31

Host A sends 10 TCP packets to Host B. All packets arrive at Host B quickly, but some arrive out of order.

What will Host B do?

Options:

A.

ACK only packets that are in order

B.

drop all packets and wait for arrival in order

C.

drop any packets that arrive out of order

D.

ACK all packets and place them in order

Buy Now
Questions 32

A BIG-IP Administrator needs to make sure that requests from a single user are directed to the server that was initially selected (unless that server is marked down). What should the administrator configure?

Options:

A.

caching profile

B.

TCP profile

C.

persistence profile

D.

security policy

Buy Now
Questions 33

Which type of certificate is pre-installed in a web browser’s trusted store?

Options:

A.

Root Certificate

B.

Server Certificate

C.

Client Certificate

D.

intermediate Certificate

Buy Now
Questions 34

The administrator wants client request to be directed to the same pool member through the session based on the client IP address.

Which persistence method should the administrator choose?

Options:

A.

SSL persistence

B.

destination address affinity persistence

C.

cookie persistence

D.

Source address affinity persistence

Buy Now
Questions 35

Which Datalink sublayer has the primary funcl.cn of proving node lo node flow and error control?

Options:

A.

LLC

B.

ARP

C.

MAC

D.

UDP

Buy Now
Questions 36

End users report widespread issues accessing multiple network resources

What tool should the BIG IP Administrator use to view the status of all virtual servers and associated resources in one place?

Options:

A.

Pool statistics

B.

Network Map

C.

System performance

D.

Virtual server statistics

Buy Now
Questions 37

ICMP is used by which command line tool?

Options:

A.

curt

B.

tcpdump

C.

traceroute

D.

nslookup

Buy Now
Questions 38

in which scenario would an SSL VPN solution have an advantage over an IPSec VPN?

Options:

A.

when users are unable to install software on their PC

B.

when users require a secure connection to the corporate network

C.

when users work remotely

D.

when users require the ability to RDP to internal resources

Buy Now
Questions 39

What command sends an "Echo Request' message and expects an "Echo Reply" message?

Options:

A.

ping

B.

netstal

C.

tcpdump

D.

echo

Buy Now
Questions 40

Which Transport Layer Security (TLS) extension can be used to enable a single virtual server to serve multiple HTTPS websites in different can be used to enable a single virtual server to server domains?

Options:

A.

Session Tickets

B.

OCSP Staping

C.

Server Name indication

D.

Certificate Status Request

Buy Now
Questions 41

A BIG IP administrator recently reset statistics for interfaces 1. 1 and 1. 2. The administrator notices that traffic appears on a data plane interface without receiving any client requests All nodes and pools have monitoring enabled, and all routes are locally defined on the device All management traffic is sent over the mgmt interface. What is the nature of this traffic?

Options:

A.

SNMP polling and traps

B.

Hearth checks for nodes and pool members

C.

Dynamic routing protocols

D.

TCP Keepalives for nodes and pool me

Buy Now
Questions 42

A BIG-IP Administrator needs to upgrade an HA pair to a more recent TMOS version. The administrator is unsure if the BlG-IP is currently supported How should the administrator verity that the HA pair is under a valid support contract?

Options:

A.

confirm that License OK" is set to yes in the applied license

B.

confirm that the "Service Check Date" specified in the applied license has not passed

C.

Check the status of the license under the Platform menu of the F5 Configuration Unity

D.

review /var/log/license for messages that indicate an expired license

Buy Now
Questions 43

ATP administrator recently added a new VLAN and needs to confirm that the BIG IP sees traffic on this VLAN. The VLAN is untagged on interface 1.1 and is named VLAN704 in the BIG IP Configuration Unity.

Which tool should be used to generate a packet capture that shows all traffic on this VLAN?

Options:

A.

netstat

B.

map

C.

tcpdump

D.

ifconsfig

Buy Now
Questions 44

A device needs to decrypt traffic and send unencrypted traffic to the web server. Which method should the BIG-IP Administrator use?

Options:

A.

SSL Optimization

B.

SSL Caching

C.

SSL Termination

D.

SSL Bridging

Buy Now
Questions 45

771-101 Question 45

An administrate receives an error message when attempting to create a self-IP address on a BIG-IP appliance Which address should the administrator use to resolve the issue?

A 2001 0db8.85a3 0000 0000 8a2e 0370 7334

B. 2001:db8:85a3 Bd3.Ba2e.370 7334

C. 2001:0db8:85i3:0000:0000: : 8a2i:0370:7334

Options:

Buy Now
Questions 46

What should a BIG-IP Administrator configure to minimize impact during a failure?

Options:

A.

MAC masquerading

B.

Clone pool

C.

External monitors

D.

One Connect profile

Buy Now
Questions 47

What does response code HTTP 302 represent?

Options:

A.

The server encountered an unexpected condition that prevented it from Milling the request.

B.

The server has not found anything matching the Request URI

C.

The request has succeeded.

D.

The requested resource resides temporary under a different URI

Buy Now
Questions 48

What is one way that a application delivery controller lowers the CPU-load on web servers?

Options:

A.

use SSL termination at the application delivery controller

B.

make the application delivery controller function as a Firewall

C.

make the application delivery controller a member of both external and internal VLANs

D.

use cookie persistence on the application delivery controller

Buy Now
Questions 49

in which scenario is a full proxy TCP connection required?

Options:

A.

when compression is actuated

B.

When Source NAT configured

C.

when a virtual server is configured

D.

When Source IP persistence is required

Buy Now
Questions 50

An administrator needs to allow secure access to application within the corporate data center for remote office, branch office and mobile employees.

Which F5 product provides this functionally?

Options:

A.

APM

B.

ASM

C.

GTM

D.

AFM

Buy Now
Questions 51

At which layer of the OSJ model does the DNS resolution process occur?

Options:

A.

Layer 7

B.

Layer 4

C.

Layer 2

D.

Layer 3

Buy Now
Questions 52

which version of SNMP can AuthPriv be used?

Options:

A.

2

B.

3

C.

2c

D.

3c

Buy Now
Questions 53

A company deploys F5 load balancers to manage a large number of secure applications. The company manage certificates. Which F5 provides this functionality?

Options:

A.

iHealthy

B.

BIG-IQ

C.

GTM

D.

LTM

Buy Now
Questions 54

The HTTP 1.1 standard is being used as part of communication to a server. The client fails to maintain the session within the maximum timeout defined by the server. Which device is responsible for ending the HTTP session?

Options:

A.

the load balancer

B.

the server

C.

the default gateway of the load balancer

D.

the client

Buy Now
Questions 55

An application has a mix of both and short and long lived connections. Which algorithm would provide and event distribution of all connections across the pool?

Options:

A.

Priority group activate

B.

Least connections

C.

Static ration

D.

Round robin

Buy Now
Questions 56

Which protocol data unit (PDU) is associated with the OSI model’s Physical layer?

Options:

A.

Frame

B.

Datagram

C.

Segment

D.

Bit

Buy Now
Questions 57

What is a primary reason to choose hardware over virtual devices?

Options:

A.

failure isolation

B.

HA capabilities

C.

management capabilities

D.

SSL performance

Buy Now
Questions 58

A BIG-IP Administrator needs to configure a MAC masquerade address for traffic-group 1.

Where on the GUI should this configuration be performed?

Options:

A.

System > Configuration Device General > lraffic-group-1

B.

Local Traffic > Traffic Class > traffic -group-1

C.

Device Management > Traffic Groups > traffic-group-1

D.

Network > ARP Static List > traffic-group-1

Buy Now
Questions 59

An administrator is performing a capture from a lagged port on an Ethernet SWITCH.

Which OSI layer should be inspected to determine with which VLAN a datagram is associated?

Options:

A.

Network layer

B.

Data-link layer

C.

Application layer

D.

Transport layer

Buy Now
Questions 60

A client is transmitting a large amount of data to a server During this process, the server sets the window size to zero What is the likely cause of this issue?

Options:

A.

The server is unable to accept more data

B.

The server resets the connection

C.

The client runs out of network buffers

D.

The server reaches its maximum segment size

Buy Now
Questions 61

An IPv4 client tries to access to http://www myserver com

Which type of DNS request should the client send to its configured DNS server?

Options:

A.

type NS

B.

type A

C.

type AAAA

D.

type MX

Buy Now
Questions 62

Which three security controls are used in an SSL transaction? (Choose three.)

Options:

A.

symmetric encryption

B.

network admission controls

C.

asymmetric encryption

D.

digital certificates

E.

database encryption

Buy Now
Questions 63

in which scenario is a full proxy TCP connection required?

Options:

A.

when IP Anycastmg is enabled

B.

when routing is enabled

C.

when the number of TCP connections to the server must be optimized

D.

when the client TCP connections options must be sent to the server

Buy Now
Questions 64

in which scenario is a full proxy TCP connection required?

Options:

A.

when SSL offloading is used

B.

when Traffic is routed

C.

when administrators manage the servers directly

D.

when 3 server responds directly to the client

Buy Now
Questions 65

Web application http://www example.com at 10.10.1.1.10 is unresponsive. A recent change installed new firewalls in the network. Which command should be used to locate where data loss has occurred within the network?

A)

771-101 Question 65

B)

771-101 Question 65

C)

771-101 Question 65

D)

771-101 Question 65

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 66

A BIG-IP Administrator wants to send packets from one subnet to another. What device is required to allow this to function?

Options:

A.

switch

B.

Router

C.

HUP

D.

Bridge

Buy Now
Questions 67

In which FTP mode is the serve, responsible for initiating the data correction back to the client?

Options:

A.

Protected FTP

B.

Active FTP

C.

Secure FTP

D.

Passive FTP

Buy Now
Questions 68

In which scenario does the client act as a server?

Options:

A.

During an active FTP session

B.

When an SMTP connection

C.

During an SMTP connection

D.

When browsing websites

Buy Now
Questions 69

Which method should an administrator of the BIG-IP use to sync the configuration to only certain other BIG-IPs?

Options:

A.

synchronize only certain folders

B.

exclude devices from certain Traffic Groups

C.

exclude devices from certain Sync Groups

D.

exclude devices from certain Device Groups

Buy Now
Questions 70

An administrator needs to provide access to corporate resources for remote users. The administrator also needs to verify that the remote use has anti-virus software installed. Which F5 product provides this functionality?

Options:

A.

ASM

B.

APM

C.

AFM

D.

TGM

Buy Now
Questions 71

Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?

Options:

A.

measure usage

B.

provide authentication

C.

provide availability

D.

provide session auditing

E.

filter access

Buy Now
Questions 72

A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers ?

Options:

A.

ntpdate

B.

time

C.

mpa

D.

date

Buy Now
Exam Code: 771-101
Exam Name: Application Delivery Fundamentals
Last Update: Apr 30, 2026
Questions: 240

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 771-101 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 771-101 pdf