Welcome to the F5 Networks 101 - Application Delivery Fundamentals compiled
Study Guide. The purpose of this guide is to help you prepare for the F5 101 -
Application Delivery Fundamentals exam. The contents of this document are based
on the 101 - Application Delivery Fundamentals Blueprint Guide.
This study guide provides students with some of the basic foundational knowledge
required to pass the exam.
This study guide is a collection of information and therefore not a completely
original work. The majority of the information is compiled from sources that are
located on the Internet. All of the information locations are
referenced at the top of each topic instead of in an Appendix of this document.
This was done to help the reader access the referenced information easier
without having to search through a formal appendix. This
guide also references a book that should be basic reading for some of the topics
on this exam.
The F5 Certified team provides an official 101 - Application Delivery
Fundamentals Study Guide to all candidates. The F5 Certified Study Guide is a
list of reading material that will help any student build a broad
base of general knowledge that can assist in not only their exam success but
also in becoming a well-rounded systems engineer. The Resource Guide will be
available to the candidate through the certification.f5.com
website once they are qualified for the Application Delivery Fundamentals exam.
There are not any pre-requisite to this exam. This guide was prepared by an F5 employee but is not an official F5 document
and is not supported by F5 Networks.
Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers
Objective - 1.02 Explain Protocols and Technologies Specific to the Data Link
Layer
Objective - 1.03 Explain protocols and apply technologies specific to the
network layer
Objective - 1.04 Explain the features and functionality of protocols and
technologies specific to the transport layer
Objective - 1.05 Explain the features and functionality of protocols and
technologies specific to the application layer
Section 2 - F5 Solutions and Technology Objective - 2.01 Articulate the role of F5 products
Objective - 2.02 Explain the purpose, use, and advantages of iRules
Objective - 2.03 Explain the purpose, use, and advantages of iApps
Objective - 2.04 Explain the purpose of and use cases for full proxy and packet
forwarding/packet based architectures
Objective - 2.05 Explain the advantages and configurations of high availability
(HA)
Section 3 – Load Balancing Essentials Objective - 3.01 Discuss the purpose of, use cases for, and key
considerations related to load balancing
Objective - 3.02 Differentiate between a client and server
Section 4 – Security Objective - 4.01 Compare and contrast positive and negative security models
Objective - 4.02 Explain the purpose of cryptographic services
Objective - 4.03 Describe the purpose and advantages of authentication
Objective - 4.04 Describe the purpose, advantages, and use cases of IPsec and
SSL VPN
Section 5 – Application Delivery Platforms Objective - 5.01 Describe the purpose, advantages, use cases, and challenges
associated with hardware based application delivery platforms and virtual
machines
Objective - 5.02 Describe the purpose of the various types of advanced
acceleration techniques
QUESTION: 1 To make complex access policies easier to manage, an administrator can
create a _______ containing several policy actions, and then add instances of it
within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator
Answer: A
QUESTION: 2 To make complex access policies easier to manage, an administrator can
create a policy containing several policy actions, and then add instances of it
within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
Answer: A
QUESTION: 3 The Policy Builder benefits include:
A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
Answer: C
QUESTION: 4 APM administrators can configure access policies granting users which two
types of access?
A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access
Answer: D
QUESTION: 5 Which of the following is a benefit of using iRules?
A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects
Answer: B
QUESTION: 6 APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
Answer: B,C
QUESTION: 7 TMOS is an F5 software module that runs on the BIG-IP platform.
No comments:
Post a Comment