List of questions
Related questions
Question 49 - 201 discussion
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the management interface.
Where should this be accomplished?
A.
System > Configuration
B.
Network > Interfaces
C.
Network > Self IPs
D.
System > Platform
Your answer:
0 comments
Sorted by
Leave a comment first