An LTM Specialist has noticed in the audit log that there are numerous attempts to log into the Admin account. Theses attempts are sourced from a suspicious IP address range to the Configuration Utility of the LTM device. How should the LTM Specialist block these attempts?
Questions and Answers PDF 19/71 A Client makes the request displayed below to the application server. Which virtual server type should an LTM Specialist use to load balance based on the URI? .
A virtual server with SNAT automap enabled selects pool member 10.20.0.10.443 for the server -side flow. The client side flow source IP is 192.168.0.10 . Which source IP should be expected in the server -side connection?
Refer to the following iRule: What is a complete list of profiles that must be applied to the virtual server for this iRule?
An LTM Specialist is removing some of the load off an existing cluster by adding a adding a third BIG- IP device to the device group. The new device can deliver twice the performance of the other two devices. The LTM Specialist needs to make sure that the BIG-IP device with the highest available capacity is always selected to take over a traffic group in the event of a failover. Which failover method is most appropriate?
Consider the monitor configuration displayed below. What is the status of a pool member that responds with ''200 OK''? Questions and Answers PDF 21/71