A user needs to determine known security vulnerabilities on an existing BIG-IP appliance and how to remediate these vulnerabilities. Which action should the BIG-IP Administrator recommend?
A. Verify the TMOS version and review the release notes
B. Create a UCS archive and upload to Health
C. Create a UCS archive and open an F5 Support request
D. Generate a view and upload to Heath
Refer to the exhibit.
A BIG-IP Administrator configures a now VLAN on an HA pair of devices that does NOT yet have any traffic. This action causes the assigned traffic group to fail over to the standby device. Which VLAN setting should be changed to prevent this issue?
A. Auto Last Hop
B. Fail-safe
C. Customer Tag
D. Source Check
Which three methods can be used for initial access to a BIG-IP system? (Choose three.)
A. CLI access to the serial console port
B. SSH access to the management port
C. SSH access to any of the switch ports
D. HTTP access to the management port
E. HTTP access to any of the switch ports
F. HTTPS access to the management port
G. HTTPS access to any of the switch ports
You have created a custom profile named TEST2. The parent profile of TEST2 is named TEST1. If additional changes are made to TEST1, what is the effect on TEST2?
A. All changes to TEST1 are propagated to TEST2.
B. Some of the changes to TEST1 may propagate to TEST2.
C. Changes to TEST1 cannot affect TEST2 once TEST2 is saved.
D. When TEST1 is changed, the administrator is prompted and can choose whether to propagate changes to TEST2.
A BIG-IP Administrator explicitly creates a traffic group on a BIG-IP device.
Which two types of configuration objects can be associated with this traffic group? (Choose two.)
A. Pool Members
B. Virtual Addresses
C. iRules
D. VLANS
E. Application Instances
A BIG-IP Administrator upgrades the BIG-IP LTM to a newer software version. After the administrator reboots into the new volume, the Configuration fails to load. Why is the Configuration failing to load?
A. The license needs to be reactivated before the upgrade.
B. The upgrade was performed on the standby unit.
C. A minimum of at least two reboots is required.
D. Connectivity to the DNS server failed to be established.
Refer to the exhibit.
The BIG-IP Administrator is investigating disk utilization on the BIG-IP device.
What should the BIG-IP Administrator check next?
A. Large files on the / file system
B. Results from the EUD test
C. Results from the platform diagnostics test
D. Large files on /usr file system
Which statement is true concerning SNATs using automap?
A. Only specified self-IP addresses are used as automap addresses.
B. SNATs using automap will translate all client addresses to an automap address.
C. A SNAT using automap will preferentially use a floating self-IP over a nonfloating self-IP.
D. A SNAT using automap can be used to translate the source address of all outgoing traffic to the same address regardless of which VLAN the traffic is sent through.
Refer to the exhibit.
A BIG-IP Administrator configures the Virtual Server to pass HTTP traffic. Users report that they are unable to access the application What should the administrator do to resolve this issue?
A. Change the Virtual Server name
B. Disable .he State
C. Reconfigure the Source Address
D. Reconfigure the Pool Members
A BIG-IP Administrator needs to restore a UCS file to an F5 device using the Configuration Utility. Which section of the Configuration Utility should the BIG-IP Administrator access to perform this task?
A. Local Traffic > Virtual Servers
B. Local Traffic > Policies
C. System > Archives
D. System > Configuration