Wednesday, 9 September 2020

BIG-IP Questions

 1.Where do you enable MAC Masquerading?


1.Virtual Server

2.Self IP

3.Virtual Address

4.Traffic-Group


Ans:4(Traffic-Group)


===================================

2.What command line utility that allows you to capture and analyze network traffic going through system?


1.dig

2.tcpdump

3.analyzer

4.df


ans:2 (tcpdump)


======================================================


3.What is HTTP code 401?


1.Unauthorized

2.Bad Request

3.Not Found

4.Forbidden


Ans:-1 (Unauthorized)


========================================================

4.You need to configure a L2 switch interface to support multiple VLAN sending to another L2 interface.What do you need to enable?


1.Trunk

2.LACP

3.Tagging

4.802.1X


Ans:3 (Tagging)


================================================================

5.During BIG-IP Fail-over,the new active device sends IP-MAC mapping update to the connected switch.This message is called?


1.MAC Masquerade

2.ARP

3.Gratuitous ARP

4.Proxy ARP


Ans:3 (Gratuitous ARP)


================================================================

6.Which Commands performs DNS lookup and translates name to IP?


1.PIng

2.traceroute

3.lookup

4.dig


Ans: 4 (dig)


===========================================================


7.What causes network collison?


1.Speed mismatch

2.Half-duplex

3.Invalid interfcae media

4.VLAN related configuration


Ans:2 (Half-duplex)


===============================================================


8.What BIG-IP feature optimizes web request by reusing HTTP contents stored in BIG-IP system's memory to reduce traffic load on the web servers?

1.Compress

2.Persistence

3.HTTP Profile

4.Caching


Ans: 4 (Caching)

=========================================

9.What command line utility that allows you to display the amount of available disk space for file systems?


1.dm

2.dig

3.dp

4.df


Ans: 4(df)

===========================================================

10.Which feature of BIG-IP we can enable to optimize the flow of traffic during failover events?


1.Device Trust

2.MAC Masquerading

3.Enable Active/Active by creating multiple Traffic Groups

4.Enable Active/Active by creating multiple Virtual Addresses


Ans:2 (MAC Masquerading)

No comments:

Post a Comment

iRule

  iRule: -- o iRule is a powerful and flexible feature within the BIG-IP local traffic management (LTM). o IRule is a powerful & flexibl...