00:00

QUESTION 16

An administrator configures a custom MAC masquerade address on a redundant BIG-IP system What will be the result?

Correct Answer: C
https://support.f5.com/cp/article/K13502

QUESTION 17

Which protocol Authenticates network traffic between hosts end without encryption?

Correct Answer: C
https//developer.ibmxom/answers.questions/37253/what-is-the-difference-between-the-ah-and- esp-port/

QUESTION 18

A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192 168 1 1 Which TMSH command should the administrator use?

Correct Answer: A

QUESTION 19

A company recentlyopened a new branch site. The site needs to access the internet through a link to HQ.Therouter at the branch Branch1 the router at HQ is Called core1. The computers at the branch site reside on the network 192 168 1 0/24 directly connected to Branch1 Users at HQ can already access the Internet.What routing must be configured to achieve the required internet connectivity for the branch site?

Correct Answer: A

QUESTION 20

Which three security controls are used in an SSL transaction? (Choose three.)

Correct Answer: AD