A BIG-IP Administrator suspects that one of the BIG-IP device power supplies is experiencing power
outages.
Which log file should the BIG-IP Administrator check to verify the suspicion?
Answer : C
The ICMP monitor has been assigned to all nodes. In addition, all pools have been assigned custom monitors. The pool is marked available. If a pool is marked available (green) which situation is sufficient to cause this?
Answer : D
An LTM device has a virtual server mapped to www.f5.com with a pool assigned. Users report that when browsing, they are periodically required to re-login to /resources/201.1.7.b.2_l.com. The objects are defined as follows:
Virtual server. Destination 192.168.245.100:443 netmask 255.255.255.0
Persistence: SSL session persistence
Profiles: HTTP/TCP
Which persistence method should the BIG-IP Administrator apply to resolve this issue?
Answer : A
A custom HTTP monitor is failing to a pool member 10.10.3.75:8080 that serves up www.example.com.
A ping works to the pool member address.
The SEND string that the monitor is using is: GET/HTTP/l.l/r/n/Host.www.example.com/r/n/Connection
Close/r/n/r/n
Which CLI tool syntax will show that the web server returns the correct HTTP response?
Answer : B
Refer to the exhibit.
During maintenance, the BIG-IP Administrator manually disables a pool member as shown.
What is the result?
Answer : A
Users report that traffic is negatively affected every time a BIG-IP device fails over. The traffic becomes
stabilized after a few minutes.
What should the BIG-IP Administrator do to reduce the impact of future failovers?
Answer : C
A BIG-IP Administrator makes a configuration change to the BIG-IP device. Which file logs the message regarding the configuration change?
Answer : B
About audit logging
Audit logging is an optional feature that togs messages whenever a BIG-IP system object, such as a virtual server or a load balancing pool, is confined (that is. created, modified, or deleted). The BiGIP system logs the messages for these auditing events in the file /var/log'audit
There are three ways that objects can be configured
* By user action
* By system action
* By loading configuration data
Whenever an object is configured in one of these ways, the BIG-IP system logs a message to the audit log