which two actions must an LTM Specialist take to ensure the sessions are maintained between the client and server during an LTM device failover event while maintaining maximum uptime?

An application is sensitive to packet loss and unexpected session termination. A pair of LTM devices is configured in an Active/Standby high availability configuration. SNATS are NOT used and the virtual server contains a Universal Persistence profile. which two actions must an LTM Specialist take to ensure the sessions are...

February 6, 2021 No Comments READ MORE +

How should the ITM Specialist block the attempts without affecting other users?

An unwanted IP address tries to connect to the configuration utility via Self IP An LTM Specialist needs to block the attempts based on the IP address. How should the ITM Specialist block the attempts without affecting other users?A . SSH IP allow listB . Port lockdownC . Device trustD...

February 6, 2021 No Comments READ MORE +

Which process can be eliminated by terminating SSL communication on the LTM device rather than the backend pool members?

Which process can be eliminated by terminating SSL communication on the LTM device rather than the backend pool members?A . generating CSRSB . obtaining SSL certificates from a certificate authorityC . administering SSL on the web serversD . applying security patches on the backend pool membersView AnswerAnswer: C

February 6, 2021 No Comments READ MORE +

Which load balancing method should the LTM Specialist use?

Four members in a server pool have similar hardware platforms. An LTM Specialist needs the load balancing method that can select the server with the fewest entries in the persistence table. Which load balancing method should the LTM Specialist use?A . ObservedB . Dynamic RatioC . Least SessionsD . Leas...

February 6, 2021 No Comments READ MORE +

What must be selected in the Source Address Affinity persistence profile?

An LTM Specialist needs to create two virtual servers. The application has links for both HTTP and HTTPS version of application. The client must be persistence to a pool member, no matter which virtual server is accessed. What must be selected in the Source Address Affinity persistence profile?A . Match...

February 6, 2021 No Comments READ MORE +

Which configuration item is required?

An LTM device needs an additional traffic group. Which configuration item is required?A . Default deviceB . Group nameC . MAC Masquerade AddressD . Auto Fallback TimeoutView AnswerAnswer: B

February 6, 2021 No Comments READ MORE +

Which two AVR reporting options should the LTM Specialist enable to measure the delay?

AN LTM Specialist needs to determine the delay between an LTM device and the internal web server for a specific client. Which two AVR reporting options should the LTM Specialist enable to measure the delay? (Choose two.)A . User agentsB . MethodsC . Response codesD . Server latencyE . Client...

February 5, 2021 No Comments READ MORE +

In an iApp, which configuration protects against accidental changes to an application Services configuration?

In an iApp, which configuration protects against accidental changes to an application Services configuration?A . ComponentsB . Strict UpdatesC . NameD . TemplateView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

Which setting should be changed to reduce the memory usage on the BIG-IP device?

An LTM Specialist upgrades the switching infrastructure and the backend servers on the LAN segments. The LTM Specialist notices a 20% memory usage increase on the BIG-IP device while handling the same number of concurrent connections. A comparison of statistics pre-upgrade and post-upgrade shows a significant reduction on the following:...

February 5, 2021 No Comments READ MORE +

Which tmsh command should the LTM Specialist use to permit access from the desired networks only?

An LTM Specialist has detected that a brute force login attack is occurring against the SSH service via a BIG-IP management interface. Login attempts are occurring from many IPs within the internal company network. BIG-IP SSH access restrictions are in place as follows: The LTM Specialist has determined that SSH...

February 5, 2021 No Comments READ MORE +