A BIG-IP Administrator needs to restore a UCS file to an F5 device using the Configuration Utility.
Which section of the Configuration Utility should the BIG-IP Administrator access to perform this task? (Choose one answer)
The BIG-IP Administrator runs the command:
netstat -an | grep 443
and sees the following output:
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN
What does this output indicate about the service on port 443? (Choose one answer)
Users are unable to reach an application. The BIG-IP Administrator checks the Configuration Utility and observes that the Virtual Server has a red diamond in front of the status.
What is causing this issue? (Choose one answer)
A BIG-IP Administrator defines a device Self IP. The Self IP is NOT reachable from the network. What should the administrator verify first?
A BIG-IP Administrator is unable to connect to the management interface via HTTPS. What is a possible reason for this issue?
A BIG-IP Administrator needs to update the list of configured NTP servers. In which area of the Configuration Utility should the BIG-IP Administrator perform this update?
The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into. What should the BIG-IP Administrator do to verify if the iRule works correctly?
A BIG-IP Administrator needs to fall over the active device. The administrator logs into the Configuration Utility and navigates to Device Management > Traffic Group. However, "Force to Standby" is greyed out. What is causing this issue?
A BIG-IP administrator is troubleshooting inconsistent configuration objects on devices in a device group. The administrator uses the command:
tmsh run /cm watch-devicegroup-device
and observes the following output:
devices
20:21 sync_test bigip_a 3273 bigip_a 14:27:00
20:21 sync_test bigip_b 1745 bigip_b 13:52:34 13:42:04
20:21 sync_test bigip_c 1745 bigip_a 13:52:34 13:42:04
What two conclusions can be made about this output? (Choose two answers)
A BIG-IP Administrator is setting up a new BIG-IP device. The network administrator reports that the interface has an incompatible media speed. The BIG-IP Administrator needs to change this setting manually. From which location should the BIG-IP Administrator perform this task?14
A BIG-IP Administrator runs the initial configuration wizard and learns that the NTP servers were invalid.
In which area of the Configuration Utility should the BIG-IP Administrator update the list of configured NTP servers? (Choose one answer)
As an organization grows, more people have to log into the BIG-IP. Instead of adding more local users, the BIG-IP Administrator is asked to configure remote authentication against a central authentication server.
Which two types of remote server can be used here? (Choose two answers)
The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system.
Which log file would contain details of these attempts? (Choose one answer)
Administrative user accounts have been defined on the remote LDAP server and are unable to log in to the BIG-IP device.
Which log file should the BIG-IP Administrator check to find the related messages? (Choose one answer)
A BIG-IP Administrator needs to check the memory utilization on a BIG-IP system. Which two methods can the BIG-IP Administrator use? (Choose two.)
A BIG-IP Administrator needs to verify system time synchronization. Where should this be checked?
New Syslog servers have been deployed in an organization. The BIG-IP Administrator must reconfigure the BIG-IP system to send log messages to these servers.
In which location in the Configuration Utility can the BIG-IP Administrator make the needed configuration changes to accomplish this? (Choose one answer)
A local user account (Users) on the BIG-IP device is assigned the User Manager role. User1 attempts to modify the properties of another account (User2), but the action fails. The BIG-IP Administrator can successfully modify the User2 account. Assuming the principle of least privilege, what is the correct way to allow User1 to modify User2 properties?
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface. Where should this be accomplished?
A BIG-IP Administrator receives an RMA replacement for a failed F5 device. The Administrator tries to restore a UCS taken from the previous device, but the restore fails. The following error appears in the /var/log/ltm:
insufficient pool members. 01070608:3: License is not operational
(expired, digital signature does not match contents)
What should the BIG-IP Administrator do to avoid this error? (Choose one answer)