00:00

QUESTION 1

Which security model provides protection from unknown attacks?

Correct Answer: D
https //www.owasp.org/index.php/Posilrve_security_model

QUESTION 2

HTTPS traffic is being passed from behind a NAT router, through a load balancer, to servers without being decrypted.
What is the F5-recommended persistence method in this situation?

Correct Answer: A

QUESTION 3

What is the primary function of a certificate authority?

Correct Answer: D
https:/enWikipedia.org/wiki/Certificale_authority

QUESTION 4

Which support service is required to synchrony the time stamps in system logs from these devices?

Correct Answer: B

QUESTION 5

An application uses a proprietary protocol running over TCP
Which FS BIG-IP feature should the administrator use to modify the protocol?

Correct Answer: D