Which security model provides protection from unknown attacks?
Correct Answer:
D
https //www.owasp.org/index.php/Posilrve_security_model
HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.
What is the F5-recommended persistence method in this situation?
Correct Answer:
A
What is the primary function of a certificate authority?
Correct Answer:
D
https:/enWikipedia.org/wiki/Certificale_authority
Which support service is required to synchrony the time stamps in system logs from these devices?
Correct Answer:
B
An application uses a proprietary protocol running over TCP
Which FS BIG-IP feature should the administrator use to modify the protocol?
Correct Answer:
D