Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

F5 F5CAB4 Dumps

Page: 1 / 7
Total 67 questions

BIG-IP Administration Control Plane Administration (F5CAB4) exam Questions and Answers

Question 1

The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into. What should the BIG-IP Administrator do to verify if the iRule works correctly?

Options:

A.

Push configuration from this device to the group and start to monitor traffic on this device

B.

Pull configuration to this device to the cluster and start to monitor traffic on this device

C.

Log in to the other device in the cluster, push configuration from it, and start to monitor traffic on that device

D.

Log in to the other device in the cluster, pull configuration to it, and start to monitor traffic on that device

Question 2

New Syslog servers have been deployed in an organization. The BIG-IP Administrator must reconfigure the BIG-IP system to send log messages to these servers. In which location in the Configuration Utility can the BIG-IP Administrator make the needed configuration changes to accomplish this?

Options:

A.

System > Logs > Configuration

B.

System > Configuration > Local Traffic

C.

System > Logs > Audit2

D.

System > Configuration > Device3

Question 3

Which log file should the BIG-IP Administrator check to determine if a specific user tried to log in to the BIG-IP Configuration Utility? (Choose one answer)

Options:

A.

/var/log/pam/tallylog

B.

/var/log/secure

C.

/var/log/ltm

D.

/var/log/httpd

Question 4

A BIG-IP Administrator needs to restore a UCS file to an F5 device using the Configuration Utility. Which section of the Configuration Utility should the BIG-IP Administrator access to perform this task?

Options:

A.

Local Traffic > Virtual Servers

B.

Local Traffic > Policies

C.

System > Archives

D.

System > Configuration

Question 5

A BIG-IP Administrator suspects that one of the BIG-IP device power supplies is experiencing power outages. Which log file should the BIG-IP Administrator check to verify the suspicion?

Options:

A.

/var/log/daemon.log

B.

/var/log/kern.log

C.

/var/log/ltm

D.

/var/log/audit

Question 6

One of the two members of a device group has been decommissioned. The BIG-IP Administrator tries to delete the device group, but is unsuccessful.

Prior to removing the device group, which action should be performed? (Choose one answer)

Options:

A.

Remove all members from the device group

B.

Make sure all members of the device group are in sync

C.

Remove the decommissioned device from the device group

D.

Disable the device group

Question 7

A BIG-IP device sends out the following SNMP trap: big-ipo.f5.com - bigipExternalLinkChange Link: 1.0 is DOWN. Where in the BIG-IP Configuration utility should the BIG-IP Administrator verify the current status of Link 1.0?

Options:

A.

System > Platform

B.

Network > Trunks > Trunk List

C.

Statistics > Performance > System

D.

Network > Interfaces > Interface List

Question 8

Users report that traffic is negatively affected every time a BIG-IP device fails over. The traffic becomes stabilized after a few minutes. What should the BIG-IP Administrator do to reduce the impact of future failovers?

Options:

A.

Enable Failover Multicast Configuration

B.

Set up Failover Method to HA Order

C.

Configure MAC Masquerade

D.

Configure a global SNAT Listener

Question 9

Administrative user accounts have been defined on the remote LDAP server and are unable to log in to the BIG-IP device.

Which log file should the BIG-IP Administrator check to find the related messages? (Choose one answer)

Options:

A.

/var/log/user.log

B.

/var/log/ltm

C.

/var/log/messages

D.

/var/log/secure

Question 10

A user needs to generate a QKView to upload to iHealth to determine any issues with upgrading TMOS. Where can the user generate the QKView in the Configuration Utility?

Options:

A.

System > Software Management

B.

System > Archives

C.

System > Configuration

D.

System > Support

Question 11

The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system.

Which log file would contain details of these attempts? (Choose one answer)

Options:

A.

/var/log/messages

B.

/var/log/secure

C.

/var/log/audit

D.

/var/log/ltm

Question 12

A BIG-IP administrator is troubleshooting inconsistent configuration objects on devices in a device group. The administrator uses the command:

tmsh run /cm watch-devicegroup-device

and observes the following output:

devices device clu_id cl_orig cl_time last_sync

20:21 sync_test bigip_a 3273 bigip_a 14:27:00

20:21 sync_test bigip_b 1745 bigip_b 13:52:34 13:42:04

20:21 sync_test bigip_c 1745 bigip_a 13:52:34 13:42:04

What two conclusions can be made about this output? (Choose two answers)

Options:

A.

bigip_a has the latest configuration.

B.

Two of the devices in the device group have a configuration that is out of date.

C.

The config from bigip_c was synced to the other devices in the device group during the most recent ConfigSync.

D.

The correct configuration exists on bigip_b and bigip_c because their cluster times match.

E.

The correct configuration exists on bigip_a and bigip_c because their cluster times match.

Question 13

A BIG-IP Administrator uses a device group to share the workload and needs to perform service on a BIG-IP device currently active for a traffic group. The administrator needs to enable the traffic group to run on another BIG-IP device in the device group.

What should the administrator do to meet the requirement? (Choose one answer)

Options:

A.

Create a new Traffic Group and then fail to Standby Unit

B.

Select Traffic Group and then select Failover

C.

Select Traffic Group and then select Force to Standby

D.

Select Traffic Group on Primary Unit and then select Demote

Question 14

A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface. Where should this be accomplished?

Options:

A.

System > Configuration

B.

Network > Interfaces

C.

Network > Self IPs

D.

System > Platform

Question 15

What can the BIG-IP Administrator do when restoring BIG-IP configuration files with a UCS archive? (Choose two answers)

Options:

A.

The BIG-IP Administrator can only restore the UCS archive to the same system from which it was saved.

B.

The BIG-IP Administrator can restore a UCS archive on a BIG-IP system running a later software version than the version of software the UCS archive was created on.

C.

The BIG-IP Administrator can restore a UCS archive on a BIG-IP system on a different platform.

D.

The BIG-IP Administrator can only restore a UCS archive on a BIG-IP system running the same version.

Question 16

A BIG-IP Administrator needs to verify system time synchronization. Where should this be checked?

Options:

A.

System > Platform

B.

System > Configuration > Device

C.

System > Logs

D.

System > Software Management

Question 17

A BIG-IP Administrator needs to check the memory utilization on a BIG-IP system. Which two methods can the BIG-IP Administrator use? (Choose two.)

Options:

A.

Run the tmsh show /sys memory command

B.

Run the tmsh show /sys traffic command

C.

Go to Statistics > Module Statistics > Traffic Summary in the configuration utility

D.

Go to Statistics > Module Statistics > Memory in the configuration utility

Question 18

A BIG-IP Administrator needs to view the CPU utilization of a particular Virtual Server. Which section of the Configuration Utility should the administrator use for this purpose?

Options:

A.

Statistics > Module Statistics > Local Traffic > Virtual Addresses

B.

Statistics > Module Statistics > Traffic Summary1

C.

Statistics > Analytics > Process CPU Utilization234

D.

Statistics > Module Statistics > Local Traffic > Virtual Servers567

Question 19

A BIG-IP Administrator needs to update the license on a BIG-IP device. Where can this be done?

Options:

A.

System > Software Management

B.

System > License

C.

System > Platform

D.

Device Management

Question 20

A local user account (Users) on the BIG-IP device is assigned the User Manager role. User1 attempts to modify the properties of another account (User2), but the action fails. The BIG-IP Administrator can successfully modify the User2 account. Assuming the principle of least privilege, what is the correct way to allow User1 to modify User2 properties?

Options:

A.

Move User2 to the same partition as User1

B.

Grant User administrator privileges

C.

Move User1 to the same partition as User2

D.

Modify the partition access for User1

Page: 1 / 7
Total 67 questions