New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

F5 Networks 201 Exam - Topic 6 Question 29 Discussion

Actual exam question for F5 Networks's 201 exam
Question #: 29
Topic #: 6
[All 201 Questions]

A virtual server is listening at 10.10.1.100:80 and has the following iRule associated with it: when HTTP_REQUEST { if {[HTTP::uri] ends_with "txt" } { pool pool1 } elseif {[HTTP::uri] ends_with "php" } { pool pool2 }

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Janey
3 months ago
I'm not so sure about that, could be unknown too.
upvoted 0 times
...
Alexia
3 months ago
I think it would just drop the request, right?
upvoted 0 times
...
Shalon
4 months ago
Wait, what if the URI doesn't end with .txt or .php?
upvoted 0 times
...
Talia
4 months ago
Totally agree, that's how iRules work!
upvoted 0 times
...
Pete
4 months ago
Looks like pool1 for .txt files and pool2 for .php files.
upvoted 0 times
...
Simona
4 months ago
I think the answer might be D, but I'm not completely confident. The question doesn't specify what happens for other file types.
upvoted 0 times
...
Marsha
4 months ago
I feel like there was something about requests being dropped if they don't match any conditions, but I can't recall the exact details.
upvoted 0 times
...
Viola
4 months ago
This seems similar to a practice question we did about routing based on file types. I think it should go to pool1 for .txt files.
upvoted 0 times
...
Adria
5 months ago
I remember that the iRule checks the URI, but I'm not sure what happens if it doesn't match either condition.
upvoted 0 times
...
Delpha
5 months ago
I'm a bit confused on this one. I'll need to review my notes on encryption key management to make sure I understand the key considerations.
upvoted 0 times
...
Edwin
5 months ago
For evaluating an incident response program, I would gather the policy and procedures documentation to understand the planned processes. I would also review any training materials and assessment results to see how well the program is being executed. Interviewing staff could provide additional insights into the program's effectiveness.
upvoted 0 times
...
Loren
5 months ago
I think this is a pretty straightforward question. The key is to focus on the specific configuration for LDAP and Spam Quarantine End-User Authentication.
upvoted 0 times
...
Rima
5 months ago
I think a small branch really needs integrated network services because they often have limited resources.
upvoted 0 times
...

Save Cancel