An administrator configures a custom MAC masquerade address on a redundant BIG-IP system What will be the result?
Correct Answer:
C
https://support.f5.com/cp/article/K13502
Which protocol Authenticates network traffic between hosts end without encryption?
Correct Answer:
C
https//developer.ibmxom/answers.questions/37253/what-is-the-difference-between-the-ah-and- esp-port/
A BIG-IP Administrator needs to create a route to send traffic destined to 10.1.1 1 to another router with an address of 192 168 1 1 Which TMSH command should the administrator use?
Correct Answer:
A
A company recentlyopened a new branch site. The site needs to access the internet through a link to HQ.Therouter at the branch Branch1 the router at HQ is Called core1. The computers at the branch site reside on the network 192 168 1 0/24 directly connected to Branch1 Users at HQ can already access the Internet.What routing must be configured to achieve the required internet connectivity for the branch site?
Correct Answer:
A
Which three security controls are used in an SSL transaction? (Choose three.)
Correct Answer:
AD