F5

F5 101 Application Fundamental

  • 10 - 20 weeks
  • 102 Lectures
  • 10000 Student Enrolled

The 301a-LTM Specialist: Architect, Set-up & Deploy exam is one of two exams required to achieve Certified F5 Technology Specialist, LTM status...

4.7 3572 Reviews

About The 101-application Delivery Fundamentals Exam

The 101-Application Delivery Fundamentals exam is the first exam required to achieve Certified F5 BIG-IP Administrator status. Successful completion of the Application Delivery Fundamentals exam acknowledges the skills and understanding necessary for day-to-day management of Application Delivery Networks (ADNs).

What Is The 101-application Delivery Fundamentals Exam Blueprint?

F5 Certified Exam Blueprints list all the objectives an exam has to measure, much like a syllabus for the exam itself. The blueprint provides the detailed breakdown of the skills and knowledge a candidate should have to pass the exam. Blueprints can be used to identify areas for additional study, and are best used in conjunction with the Exam Study Guides.

Credential Awarded:

  • None (prerequisite to the TMOS Administration exam)

This Exam Is Based On V11.4. (Section 1: OSI)

  • Cognitive
  • Complexity

Objective 1.01

  • Explain, compare, and contrast the OSI layers U/A
  • Examples
  • Describe the function of each OSI layer
  • Differentiate between the OSI layers
  • Describe the purpose of the various address types at different OSI layers

Objective 1.02

  • Explain protocols and technologies specific to the data link layer U/A
  • Examples
  • Explain the purpose of a switch’s forwarding database
  • Explain the purpose and functionality of ARP
  • Explain the purpose and functionality of MAC addresses
  • Explain the purpose and functionality of a broadcast domain
  • Explain the purpose and functionality of VLANs
  • Explain the purpose and functionality of link aggregation

Objective 1.03

  • Explain protocols and technologies specific to the data link layer U/A
  • Examples
  • Explain the purpose and functionality of IP addressing and subnetting
  • Given an IP address and net mask, determine the network IP and the broadcast IP
  • Given a routing table and a destination IP address, identify which routing table entry the destination IP address will match
  • Explain the purpose and functionality of Routing protocols
  • Explain the purpose of fragmentation
  • Given a fragment, identify what information is needed for reassembly
  • Explain the purpose of TTL functionality
  • Given a packet traversing a topology, document the source/destination IP address/MAC address changes at each hop

Objective 1.04

  • Explain the features and functionality of protocols and technologies specific to the transport layer U/A
  • Examples
  • Compare/Contrast purpose and functionality of MTU and MSS
  • Explain the purpose and functionality of TCP
  • Explain the purpose and functionality of UDP
  • Explain the purpose and functionality of ports in general
  • Explain how retransmissions occur
  • Explain the purpose and process of a reset
  • Describe various TCP options
  • Describe a TCP checksum error
  • Describe how TCP addresses error correction
  • Describe how the flow control process occurs

Objective 1.05

  • Explain the features and functionality of protocols and technologies specific to the application layer
  • Explain the purpose and functionality of HTTP
  • Differentiate between HTTP versions
  • Interpret HTTP status codes
  • Determine an HTTP request method for a given use case
  • Explain the purpose and functionality of HTTP keepalives, HTTP headers, DNS, SIP, FTP
  • Differentiate between passive and active FTP
  • Explain the purpose and functionality of SMTP
  • Explain the purpose and functionality of a cookie
  • Given a situation in which a client connects to a remote host, explain how the name resolution process occurs
  • Explain the purpose and functionality of a URL

Section 2: F5 Solutions and Technology

  • Cognitive
  • Complexity

Objective 2.01

  • Articulate the role of F5 products U/A
  • Examples Explain the purpose, use, and benefits of APM, LTM, ASM, GTM

Objective 2.02

  • Explain the purpose, use, and advantages of iRules U/A
  • Examples
  • Explain the purpose of iRules
  • Explain the advantages of iRules
  • Given a list of situations, determine which would be appropriate for the use of iRules

Objective 2.03

  • Explain the purpose, use, and advantages of iApps U/A
  • Examples
  • Explain the purpose of iApps
  • Explain the advantages of iApps
  • Given a list of situations, determine which would be appropriate for the use of iApps

Objective 2.04

  • Explain the purpose of and use cases for full proxy and packet forwarding packet based architectures U/A
  • Examples
  • Describe a full proxy architecture
  • Describe a packet forwarding/packet based architecture
  • Given a list of situations, determine which is appropriate for a full proxy architecture
  • Given a list of situations, determine which is appropriate for a packet based architecture

Objective 2.05

  • Explain the advantages and configurations of high availability (HA) U/A
  • Examples
  • Explain active/active
  • Explain active/standby
  • Explain the benefits of deploying BIG-IP devices in a redundant configuration

Section 3: Load Balancing Essentials

  • Cognitive
  • Complexity

Objective 3.01

  • Discuss the purpose of, use cases for, and key considerations related to load balancing U/A
  • Examples
  • Explain the purpose of distribution of load across multiple servers
  • Given an environment, determine the appropriate load balancing algorithm that achieves a desired result
  • Explain the concept of persistence

Objective 3.01

  • Differentiate between a client and server U/A
  • Examples
  • Given a scenario, identify the client/server
  • Explain the role of a client
  • Explain the role of a server

Section 4: Security

  • Cognitive
  • Complexity

Objective 4.01

  • Compare and contrast positive and negative security models U/A
  • Examples
  • Describe the concept of a positive security model
  • Describe the concept of a negative security model
  • Given a list of scenarios, identify which is a positive security model
  • Given a list of scenarios, identify which is a negative security model
  • Describe the benefits of a positive security model
  • Describe the benefits of a negative security model

Objective 4.02

  • Explain the purpose of cryptographic services U/A
  • Examples
  • Describe the purpose of signing
  • Describe the purpose of encryption
  • Describe the purpose of certificates and the certificate chains
  • Distinguish between private/public keys
  • Compare and contrast symmetric/asymmetric encryption

Objective 4.03

  • Describe the purpose and advantages of authentication U/A
  • Examples
  • Explain the purpose of authentication
  • Explain the advantages of single sign on
  • Explain the concepts of multifactor authentication
  • Describe the role authentication plays in AAA

Objective 4.04

  • Describe the purpose, advantages, and use cases of IPsec and SSL VPN U/A
  • Examples
  • Explain the purpose, advantages, and challenges associated with IPsec
  • Explain the advantages of single sign onExplain the purpose, advantages, and challenges associated with SSL VPN
  • Given a list of environments/situations, determine which is appropriate for an IPsec solution
  • Given a list of environments/situations, determine which is appropriate for an SSL VPN solution

Section 5: Application Delivery Platforms

  • Cognitive
  • Complexity

Objective 5.01

  • Describe the purpose, advantages, use cases, and challenges associated with hardware based application delivery platforms and virtual machines U/A
  • Explain when a hardware based application deliver platform solution is appropriate
  • Explain when a virtual machine solution is appropriate
  • Explain the purpose, advantages, and challenges associated with hardware based application deliver platform solutions
  • Explain the purpose, advantages, and challenges associated with virtual machines
  • Given a list of environments/situations, determine which is appropriate for a hardware based application deliver platform solution
  • Given a list of environments/situations, determine which is appropriate for a virtual machine solution
  • Explain the advantages of dedicated hardware (SSL card, compression card)

Objective 5.02

  • Describe the purpose of the various types of advanced acceleration techniques U/A
  • Describe the purpose of TCP optimization
  • Describe the purpose of HTTP keepalives, caching, compression, and pipelining

How much do Certified exams cost?

  • $135 USD (not including local taxes and fees).

How long is the 101 exam and what is the passing score?

  • The 101 exam is 90 minutes long and the passing score is 69%.

How many questions are there?

  • The 101 exam has 80 questions. Some of the questions contain exhibits that you will have to view to answer the question.

What format is the 101 exam?

  • The 101 exam is multiple choice.

What is the retake policy?

  • 1st failure: Exam hold for 15 days.
  • 2nd failure: Exam hold for 30 days.
  • 3rd failure: Retake permission form and a 45-day exam hold.
  • 4th failure: Exam hold for two (2) years.

Exam day tips:

  • Make sure the name on your Pearson VUE account matches the name on your ID. To change your name and other personal information, see (insert URL).
  • If you need to reschedule your exam, you must contact Pearson VUE 24 hours before your exam time

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today