A BIG-IP Administrator upgrades the BIG-IP LTM to a newer software version. After the administrator reboots into the new volume, the configuration fails to load.
Why is the configuration failing to load?
Answer : B
Which command will display the current active volume on a BIG-IP system?
Answer : B
The Port Lockdown feature prevents unwanted connection attempts to a self-ip.
Which types of three connection attempts are unaffected by the port lockdown settings?
Answer : C
Which two items demonstrate the creation of a new volume for software images? (Choose two.)
Answer : CE
An F5 BIG-IP administrator is asked to report which modules are provisioned on the BIG-IP. In which two ways can this be done? (Choose two.)
Answer : AB
How should the BIG-IP Administrator block connections to a Self IP on port 443 while allowing connections to other ports?
Answer : A
How can the BIG-IP Administrator tell when an unlicensed module has been provisioned?
Answer : C
Refer to the Exhibit.
An administrator is in the process of reactivating the license using the interface displayed in the exhibit.
What is the address of the license server to which the BIG-IP device must be able to establish an outbound connection in order to use the Automatic Activation Method?
Answer : B
The Service Check date on the license matches the date that the BIG-IP was installed two years ago.
Which of the following activities would require the BIG-IP Administrator to renew the license and update the Service Check date for it to work?
Answer : A
Refer to the Exhibit.
An organization has purchased a BIG-IP license that includes all available modules but has chosen to provision only the modules they require. The exhibit displays the current resource allocation from the "System > Resource Provisioning" page.
Based on the information provided, which F5 modules have been provisioned?
Answer : C
Which one of the following is a port and protocol combination allowed by the Allow Default setting for port lockdown?
Answer : C
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface.
Where should this be accomplished?
Answer : D
An organization is planning to upgrade a BIG-IP system from 16.1.x to 17.1.x. For a successful upgrade, the Service Check Date must be equal or newer than the License Check Date of 17.1.x.
Which command will show the Service Check Date on the BIG-IP system being upgraded?
Answer : A
For an upgrade of a standalone BIG-IP, a maintenance window is available in which brief interruptions are allowed. Actions with no impact can be done outside the maintenance window.
When should a license reactivation be performed?
Answer : A
Given that BIGIP-<version>.iso and Hotfix-BIGIP-<version>-ENG.iso have been uploaded to /shared/images of an F5 device.
What would be the appropriate tmsh command to prepare and update the F5 device with the hotfix of a software version on a new volume e.g. HD1.2?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us