F5-101 Application Delivery Fundamentals
Welcome to the F5 Networks 101 – Application Delivery Fundamentals compiled Study Guide. The purpose of this guide is to help you prepare for the F5 101 – Application Delivery Fundamentals exam. The contents of this document are based on the 101 – Application Delivery Fundamentals Blueprint Guide.
This study guide provides students with some of the basic foundational knowledge required to pass the exam.
This study guide is a collection of information and therefore not a completely original work. The majority of the information is compiled from sources that are located on the Internet. All of the information locations are
referenced at the top of each topic instead of in an Appendix of this document. This was done to help the reader access the referenced information easier without having to search through a formal appendix. This
guide also references a book that should be basic reading for some of the topics on this exam.
The F5 Certified team provides an official 101 – Application Delivery Fundamentals Study Guide to all candidates. The F5 Certified Study Guide is a list of reading material that will help any student build a broad
base of general knowledge that can assist in not only their exam success but also in becoming a well-rounded systems engineer. The Resource Guide will be available to the candidate through the certification.f5.com
website once they are qualified for the Application Delivery Fundamentals exam.
There are not any pre-requisite to this exam.
This guide was prepared by an F5 employee but is not an official F5 document and is not supported by F5 Networks.
Section 1 – OSI 5
Objective – 1.01 Explain, compare, and contrast the OSI layers
Objective – 1.02 Explain Protocols and Technologies Specific to the Data Link Layer
Objective – 1.03 Explain protocols and apply technologies specific to the network layer
Objective – 1.04 Explain the features and functionality of protocols and technologies specific to the transport layer
Objective – 1.05 Explain the features and functionality of protocols and technologies specific to the application layer
Section 2 – F5 Solutions and Technology
Objective – 2.01 Articulate the role of F5 products
Objective – 2.02 Explain the purpose, use, and advantages of iRules
Objective – 2.03 Explain the purpose, use, and advantages of iApps
Objective – 2.04 Explain the purpose of and use cases for full proxy and packet forwarding/packet based architectures
Objective – 2.05 Explain the advantages and configurations of high availability (HA)
Section 3 – Load Balancing Essentials
Objective – 3.01 Discuss the purpose of, use cases for, and key considerations related to load balancing
Objective – 3.02 Differentiate between a client and server
Section 4 – Security
Objective – 4.01 Compare and contrast positive and negative security models
Objective – 4.02 Explain the purpose of cryptographic services
Objective – 4.03 Describe the purpose and advantages of authentication
Objective – 4.04 Describe the purpose, advantages, and use cases of IPsec and SSL VPN
Section 5 – Application Delivery Platforms
Objective – 5.01 Describe the purpose, advantages, use cases, and challenges associated with hardware based application delivery platforms and virtual machines
Objective – 5.02 Describe the purpose of the various types of advanced acceleration techniques
QUESTION: 1
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)
A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator
Answer: A
QUESTION: 2
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)
A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard
Answer: A
QUESTION: 3
The Policy Builder benefits include:
A. Doesn’t require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact
Answer: C
QUESTION: 4
APM administrators can configure access policies granting users which two types of access?
A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access
Answer: D
QUESTION: 5
Which of the following is a benefit of using iRules?
A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects
Answer: B
QUESTION: 6
APM provides access control lists at which two OSI layers? (Choose two.)
A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2
Answer: B,C
QUESTION: 7
TMOS is an F5 software module that runs on the BIG-IP platform.
A. True
B. False
Answer: B
Actualkey F5 Certification F5-101 exam pdf, Certkingdom F5 Certification F5-101 PDF
Best F5 Certification F5-101 Certification, F5 Certification F5-101 Training at certkingdom.com