Cryptographic hash functions can be used to provide which service?
A BIG-IP Administrator configures three Network Time Protocol servers to keep the time of the devices in sync. Which tool should the administrator use to show the synchronization status with the Network Time Protocol servers ?
An administrator notices the following log message generated by a BIG IP system " diskmonitor 011d005: Disk partition shared has less than 30% tree" Which command should the administrator use to troubleshoot the problem?
An administrator is designing a remote host connection using an ICMP based network troubleshooting utility and receive an ICMP error diagram with the following error code.
11. Times exceeded
What does this mean?
Host A sends 10 TCP packets to Host B. All packets arrive at Host B quickly, but some arrive out of order.
What will Host B do?
A new web server VLAN has been created and the IP address 10.1.1.1/24 has been assigned to the BIG IP device. The BIG IP Administrator needs to create the new Self IP and prevent administrator access to the BIG-IP device from the newly created network.
Which TMSH command should be used?
An administrator needs to protect a web application from cross-site scripting (CSS) exploits. Which F5 protocol provide this functionality
A messaging system digitally signs messages to ensure non-repudiation of the sender. Which component should the receiver use to validate the message?
Which two functions of AAA does Security Assertion Markup Language (SAML) identity Provider (IdP) offer (Choose two)?