What happens when the data center that GTM recommends f…
What happens when the data center that GTM recommends for a client is
unavailable
Which four of the monitoring methods listed below can G…
Which four of the monitoring methods listed below can GTM use to determine the status and performance of BIG-IP and servers?
(Fill in)
GTM uses the F5………….protocol to synchronize performance metrics between GTM
devices. (Fill in)
True or false?
True or false? DNSSEC is a GTM add-on licensing feature.
Which three of the following must be done in order for …
Which three of the following must be done in order for GTM to properly communicate LTM?
(Fill in)
……..object maps a FQDN to virtual servers. (Fill in)
Which of the following is an example of a sub-zone?
A top-level DNS zone uses a CNAME record to point to a sub-zone. Which of the following is an example of a sub-zone?
(Fill in)
The layer 3 security feature….. Cookies protects against SYN floods, DoS, and DDoS attacks. (Fill in)
True or false? The least connections load balancing met…
True or false? The least connections load balancing method functions best when all pool members share similar characteristics.
Which two of the following options can LTM use when all…
Which two of the following options can LTM use when all of the pool members are not available or if the pool is overloaded?