New Syslog servers have been deployed in an organization. The BIG-IP Administrator must reconfigure the BIG-IP system to send log messages to these servers.
In which location in the Configuration Utility can the BIG-IP Administrator make the needed configuration changes to accomplish this? (Choose one answer)
A local user account (Users) on the BIG-IP device is assigned the User Manager role. User1 attempts to modify the properties of another account (User2), but the action fails. The BIG-IP Administrator can successfully modify the User2 account. Assuming the principle of least privilege, what is the correct way to allow User1 to modify User2 properties?
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface. Where should this be accomplished?
A BIG-IP Administrator receives an RMA replacement for a failed F5 device. The Administrator tries to restore a UCS taken from the previous device, but the restore fails. The following error appears in the /var/log/ltm:
insufficient pool members. 01070608:3: License is not operational
(expired, digital signature does not match contents)
What should the BIG-IP Administrator do to avoid this error? (Choose one answer)