New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The BIG-IP Administrator uses Secure Copy Protocol (SCP) to upload a TMOS image to the/shared/images/directory in preparation for an upgrade.

After the upload is complete, what will the system dobeforethe image appears in the GUI under:

System » Software Management » Image List?

A.

The system performs a reboot into the new partition

B.

The system verifies the internal checksum

C.

The system copies the image to /var/local/images/

What will setting a Self IP to“Allow None”for Port Lockdown do?

A.

Block HA communications, causing the systems to report their peer as offline and go active-active.

B.

Block HA communications, causing the systems to report their peer as online ready.

C.

Default allow port 1026 access between peer devices and traffic processing across the network failover.

The BIG-IP Administrator received a ticket that an authorized user is attempting to connect to the Configuration Utility from a jump host and is being denied.

The HTTPD allow list is configured as:

sys httpd {

allow { 172.28.31.0/255.255.255.0 172.28.65.0/255.255.255.0 }

}

The jump host IP is172.28.32.22.

What command should the BIG-IP Administrator use to allow HTTPD access for this jump host?

A.

modify /sys httpd allow replace-all-with { 172.28.32.22 }

B.

modify /sys httpd allow delete { 172.28.31.0/255.255.255.0 172.28.65.0/255.255.255.0 }

C.

modify /sys httpd allow add { 172.28.32.22 }

Which command will display thecurrent active volumeon a BIG-IP system?

A.

tmsh show sys version

B.

tmsh show sys software status

C.

tmsh list sys software update

The Port Lockdown feature prevents unwanted connection attempts to a Self IP.

Which three types of connection attempts areunaffectedby Port Lockdown settings?

A.

Defined virtual server traffic, Secure Shell (SSH), Centralized Management Infrastructure (CMI)

B.

Centralized Management Infrastructure (CMI), Secure Shell (SSH), Internet Control Message Protocol (ICMP)

C.

Defined virtual server traffic, Internet Control Message Protocol (ICMP), Centralized Management Infrastructure (CMI)

A BIG-IP Administrator is responsible for deploying a new software image on an F5 BIG-IP HA pair and has scheduled a one-hour maintenance window.

With a focus on minimizing service disruption, which of the following strategies is the most appropriate?

A.

Update the active node first, reboot to the newly updated boot location and verify functionality, then push the update from the active to the standby node and reboot the standby node.

B.

Reset the Device Trust, apply the update to each node separately, reboot both nodes, then re-establish the Device Trust.

C.

Update the standby node first and reboot it to the newly updated boot location, failover to the newly updated node and verify functionality. Repeat the upgrade procedures on the next node, which is now in standby mode.

D.

Update both nodes in the HA pair, then reboot both nodes simultaneously to ensure they run the same software version.

The BIG-IP Administrator needs to update access to the Configuration Utility to include the172.28.31.0/24and172.28.65.0/24networks.

From the TMOS Shell (tmsh), which command should the BIG-IP Administrator use to complete this task?

A.

modify /sys httpd allow add { 172.28.31.0/255.255.255.0 172.28.65.0/255.255.255.0 }

B.

modify /sys httpd allow add { 172.28.31.0 172.28.65.0 }

C.

modify /sys httpd permit add { 172.28.31.0/255.255.255.0 172.28.65.0/255.255.255.0 }

Refer to the exhibit.

An organization has purchased a BIG-IP license that includes all available modules but has chosen to provision only the modules they require.

The exhibit displays the current resource allocation from theSystem → Resource Provisioningpage.

Based on the information provided, which F5 modules have been provisioned?

A.

LTM, APM

B.

DNS, APM

C.

LTM, DNS, APM

D.

TMM, DNS, APS

Which configuration file can a BIG-IP administrator use to verify theprovisioned modules?

A.

/config/bigip.license

B.

/config/bigip_base.conf

C.

/config/bigip.conf

D.

/var/local/ucs/config.ucs

What are the two options for securing a BIG-IP’s management interface?

(Choose two.)

A.

Limiting network access through the management interface to a trusted/secured network VLAN.

B.

Block all management-interface administrative HTTPS and SSH service ports to prevent access.

C.

Use the BIG-IP’s Self-IP addresses for administrative access rather than the management interface.

D.

Restrict administrative HTTPS and SSH access to specific IP addresses or IP ranges.