View all questions & answers for the BIG-IP Administration Install, Initial Configuration, and Upgrade (F5CAB1) exam
Question 37 Discussion
Comments
Selected Answers: D
View all questions & answers for the BIG-IP Administration Install, Initial Configuration, and Upgrade (F5CAB1) exam
Selected Answers: D
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface. Where should this be accomplished? (Choose one answer)
Brave-Dump Clients Votes