Assume the bigd daemon fails on the active system. Which three are possible results? (Choose
three.)
A.
The active system will restart the bigd daemon and continue in active mode
B.
The active system will restart the tmm daemon and continue in active mode.
C.
The active system will reboot and the standby system will go into active mode.
D.
The active system will fail-over and the standby system will go into active mode.
E.
The active system will continue in active mode but gather member and node state information
from thestandby system.
The active system will restart the bigd daemon and continue in active mode
The active system will reboot and the standby system will go into active mode.
The active system will fail-over and the standby system will go into active mode.
What is the purpose of MAC masquerading?
A.
to prevent ARP cache errors
B.
to minimize ARP entries on routers
C.
to minimize connection loss due to ARP cache refresh delays
D.
to allow both BIG-IP devices to simultaneously use the same MAC address
to minimize connection loss due to ARP cache refresh delays
Which process or system can be monitored by the BIG-IP system and used as a fail-over trigger in
a redundant pair configuration?
A.
bandwidth utilization
B.
duplicate IP address
C.
CPU utilization percentage
D.
VLAN communication ability
VLAN communication ability
Assuming there are open connections through an active system's NAT and a fail-over occurs, by
default, what happens to those connections?
A.
All open connections will be lost.
B.
All open connections will be maintained.
C.
The "Mirror" option must be chosen on the NAT and the setting synchronized prior to the
connectionestablishment.
D.
Long-lived connections such as Telnet and FTP will be maintained while short-lived
connections such asHTTP will be lost.
E.
All open connections are lost, but new connections are initiated by the newly active BIG-IP,
resulting inminimal client downtime.
All open connections will be maintained.
A virtual server is defined per the charts. The last five client connections were to members C, D, A, B, B. Given the conditions shown in the above graphic, if a client with IP address 205.12.45.52
opens a connection to the virtual server, which member will be used for the connection?
A.
172.16.20.1:80
B.
172.16.20.2:80
C.
172.16.20.3:80
D.
172.16.20.4:80
E.
172.16.20.5:80
172.16.20.4:80
Page 10 out of 86 Pages |
Previous |