BIG-IP Administration Control Plane Administration (F5CAB4) exam Questions and Answers
The BIG-IP Administrator has modified an iRule on one device of an HA pair. The BIG-IP Administrator notices there is NO traffic on the BIG-IP device in which they are logged into. What should the BIG-IP Administrator do to verify if the iRule works correctly?
New Syslog servers have been deployed in an organization. The BIG-IP Administrator must reconfigure the BIG-IP system to send log messages to these servers. In which location in the Configuration Utility can the BIG-IP Administrator make the needed configuration changes to accomplish this?
Which log file should the BIG-IP Administrator check to determine if a specific user tried to log in to the BIG-IP Configuration Utility? (Choose one answer)
A BIG-IP Administrator needs to restore a UCS file to an F5 device using the Configuration Utility. Which section of the Configuration Utility should the BIG-IP Administrator access to perform this task?
A BIG-IP Administrator suspects that one of the BIG-IP device power supplies is experiencing power outages. Which log file should the BIG-IP Administrator check to verify the suspicion?
One of the two members of a device group has been decommissioned. The BIG-IP Administrator tries to delete the device group, but is unsuccessful.
Prior to removing the device group, which action should be performed? (Choose one answer)
A BIG-IP device sends out the following SNMP trap: big-ipo.f5.com - bigipExternalLinkChange Link: 1.0 is DOWN. Where in the BIG-IP Configuration utility should the BIG-IP Administrator verify the current status of Link 1.0?
Users report that traffic is negatively affected every time a BIG-IP device fails over. The traffic becomes stabilized after a few minutes. What should the BIG-IP Administrator do to reduce the impact of future failovers?
Administrative user accounts have been defined on the remote LDAP server and are unable to log in to the BIG-IP device.
Which log file should the BIG-IP Administrator check to find the related messages? (Choose one answer)
A user needs to generate a QKView to upload to iHealth to determine any issues with upgrading TMOS. Where can the user generate the QKView in the Configuration Utility?
The BIG-IP Administrator suspects unauthorized SSH login attempts on the BIG-IP system.
Which log file would contain details of these attempts? (Choose one answer)
A BIG-IP administrator is troubleshooting inconsistent configuration objects on devices in a device group. The administrator uses the command:
tmsh run /cm watch-devicegroup-device
and observes the following output:
devices
20:21 sync_test bigip_a 3273 bigip_a 14:27:00
20:21 sync_test bigip_b 1745 bigip_b 13:52:34 13:42:04
20:21 sync_test bigip_c 1745 bigip_a 13:52:34 13:42:04
What two conclusions can be made about this output? (Choose two answers)
A BIG-IP Administrator uses a device group to share the workload and needs to perform service on a BIG-IP device currently active for a traffic group. The administrator needs to enable the traffic group to run on another BIG-IP device in the device group.
What should the administrator do to meet the requirement? (Choose one answer)
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface. Where should this be accomplished?
What can the BIG-IP Administrator do when restoring BIG-IP configuration files with a UCS archive? (Choose two answers)
A BIG-IP Administrator needs to verify system time synchronization. Where should this be checked?
A BIG-IP Administrator needs to check the memory utilization on a BIG-IP system. Which two methods can the BIG-IP Administrator use? (Choose two.)
A BIG-IP Administrator needs to view the CPU utilization of a particular Virtual Server. Which section of the Configuration Utility should the administrator use for this purpose?
A BIG-IP Administrator needs to update the license on a BIG-IP device. Where can this be done?
A local user account (Users) on the BIG-IP device is assigned the User Manager role. User1 attempts to modify the properties of another account (User2), but the action fails. The BIG-IP Administrator can successfully modify the User2 account. Assuming the principle of least privilege, what is the correct way to allow User1 to modify User2 properties?